Security Issues with Mobile IT: A Narrative Review of Bring Your Own Device (BYOD).

Felix. C. Aguboshim, J. I. Udobi
{"title":"Security Issues with Mobile IT: A Narrative Review of Bring Your Own Device (BYOD).","authors":"Felix. C. Aguboshim, J. I. Udobi","doi":"10.7176/jiea/8-1-07","DOIUrl":null,"url":null,"abstract":"The use of employee-owned mobile devices such as smart phones, tablets, laptops, etc., to access business enterprise content or networks otherwise referred to as of ‘Bring Your Own Device’ (BYOD) has further made the confidentiality, integrity, and availability of organizations’ data become insecure, and prone to breaches and fraudulent activities. In this study, the authors explored a narrative review that focuses on the theoretical underpinnings of vast works of literature that revealed significant information on the conceptual framework, existing systems that adopt BYOD security, analysis, and synthesis of prior research. Using some keywords “BYOD system security”, “BYOD security threats”, “cyber-attacks and security”, etc., an electronic database search extracted peer-reviewed articles from the last five years. The thematic analysis of fifty-one articles retrieved revealed that breaches and fraudulent activities exist with the use of BYOD that may be perpetrated against organization’s data, intentionally or maliciously. Good policies and guidelines on the use of BYOD coupled with good formulation and communication of same, should be adhered to avert some forms of security breaches. There is the need to preserve user’s privacy, organizations’ data confidentiality, integrity, and availability, and secure same in the devices of employees using their own devices to process corporate and personal data, by using acceptable and effective BYOD Policy and Mobile Device Management Solution (MDMS). This may increase mutual trust and BYOD adoption rate, new innovations and influence that can positively impact the organizations and their employees. Keyword: BYOD, security threats, password, cyber-attacks and security, Information security. DOI : 10.7176/JIEA/8-1-07","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Engineering and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.7176/jiea/8-1-07","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17

Abstract

The use of employee-owned mobile devices such as smart phones, tablets, laptops, etc., to access business enterprise content or networks otherwise referred to as of ‘Bring Your Own Device’ (BYOD) has further made the confidentiality, integrity, and availability of organizations’ data become insecure, and prone to breaches and fraudulent activities. In this study, the authors explored a narrative review that focuses on the theoretical underpinnings of vast works of literature that revealed significant information on the conceptual framework, existing systems that adopt BYOD security, analysis, and synthesis of prior research. Using some keywords “BYOD system security”, “BYOD security threats”, “cyber-attacks and security”, etc., an electronic database search extracted peer-reviewed articles from the last five years. The thematic analysis of fifty-one articles retrieved revealed that breaches and fraudulent activities exist with the use of BYOD that may be perpetrated against organization’s data, intentionally or maliciously. Good policies and guidelines on the use of BYOD coupled with good formulation and communication of same, should be adhered to avert some forms of security breaches. There is the need to preserve user’s privacy, organizations’ data confidentiality, integrity, and availability, and secure same in the devices of employees using their own devices to process corporate and personal data, by using acceptable and effective BYOD Policy and Mobile Device Management Solution (MDMS). This may increase mutual trust and BYOD adoption rate, new innovations and influence that can positively impact the organizations and their employees. Keyword: BYOD, security threats, password, cyber-attacks and security, Information security. DOI : 10.7176/JIEA/8-1-07
移动IT的安全问题:自带设备(BYOD)的叙述回顾。
使用员工拥有的移动设备,如智能手机、平板电脑、笔记本电脑等,来访问企业内容或网络,否则被称为“自带设备”(BYOD),这进一步使组织数据的机密性、完整性和可用性变得不安全,并容易受到破坏和欺诈活动的影响。在本研究中,作者对大量文献的理论基础进行了叙述性回顾,这些文献揭示了关于概念框架、采用BYOD安全性的现有系统、分析和先前研究的综合的重要信息。以“BYOD系统安全”、“BYOD安全威胁”、“网络攻击与安全”等关键词,在电子数据库中检索了近五年的同行评议文章。对检索到的51篇文章的专题分析显示,使用自带设备可能会有意或恶意地对组织的数据实施破坏和欺诈活动。应遵守良好的使用自带设备的政策和指引,以及良好的制定和沟通,以避免某些形式的安全漏洞。有必要保护用户的隐私、组织的数据机密性、完整性和可用性,并通过使用可接受和有效的BYOD策略和移动设备管理解决方案(MDMS)保护员工使用自己的设备处理公司和个人数据的设备。这可能会增加相互信任和BYOD采用率,新的创新和影响力,可以对组织和员工产生积极的影响。关键词:BYOD,安全威胁,密码,网络攻击与安全,信息安全Doi: 10.7176/ jiea /8-1-07
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信