Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device

Khaled Zayed
{"title":"Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device","authors":"Khaled Zayed","doi":"10.1504/IJTCS.2016.10001478","DOIUrl":null,"url":null,"abstract":"Companies and their employees rely on information technology (IT) and internet-enabled technology to conduct their business and communications. This offers many advantages, but also introduces risks related to information security. The present study sought to address the challenges of IT security alongside the adoption of bring your own device (BYOD) programs and the lack of user awareness of related best practices. A qualitative case study research design was employed. IT managers were interviewed to explore the newly developing subject of BYOD and its implications for IT security. The issues most central to information security are security policies, BYOD user awareness and training, the enforcement of organisational security policies, manager effectiveness in protecting data, and users' acceptance and adherence to BYOD security policies. While BYOD is favoured by many users and also offers many advantages, it is not favoured by most IT security managers.","PeriodicalId":253960,"journal":{"name":"International Journal of Teaching and Case Studies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Teaching and Case Studies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJTCS.2016.10001478","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Companies and their employees rely on information technology (IT) and internet-enabled technology to conduct their business and communications. This offers many advantages, but also introduces risks related to information security. The present study sought to address the challenges of IT security alongside the adoption of bring your own device (BYOD) programs and the lack of user awareness of related best practices. A qualitative case study research design was employed. IT managers were interviewed to explore the newly developing subject of BYOD and its implications for IT security. The issues most central to information security are security policies, BYOD user awareness and training, the enforcement of organisational security policies, manager effectiveness in protecting data, and users' acceptance and adherence to BYOD security policies. While BYOD is favoured by many users and also offers many advantages, it is not favoured by most IT security managers.
信息安全意识:管理web、移动和端点安全;克服自带设备带来的挑战
公司及其员工依靠信息技术(IT)和互联网技术来开展业务和沟通。这提供了许多优点,但也引入了与信息安全相关的风险。本研究旨在解决IT安全方面的挑战,同时采用自带设备(BYOD)计划,以及用户对相关最佳实践缺乏认识。本研究采用定性个案研究设计。我们采访了IT经理,探讨了BYOD这个新兴的主题及其对IT安全的影响。信息安全最核心的问题是安全政策、BYOD用户意识和培训、组织安全政策的执行、管理人员保护数据的有效性,以及用户对BYOD安全政策的接受和遵守。虽然BYOD受到许多用户的青睐,也提供了许多优势,但它并不受到大多数it安全经理的青睐。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信