{"title":"信息安全意识:管理web、移动和端点安全;克服自带设备带来的挑战","authors":"Khaled Zayed","doi":"10.1504/IJTCS.2016.10001478","DOIUrl":null,"url":null,"abstract":"Companies and their employees rely on information technology (IT) and internet-enabled technology to conduct their business and communications. This offers many advantages, but also introduces risks related to information security. The present study sought to address the challenges of IT security alongside the adoption of bring your own device (BYOD) programs and the lack of user awareness of related best practices. A qualitative case study research design was employed. IT managers were interviewed to explore the newly developing subject of BYOD and its implications for IT security. The issues most central to information security are security policies, BYOD user awareness and training, the enforcement of organisational security policies, manager effectiveness in protecting data, and users' acceptance and adherence to BYOD security policies. While BYOD is favoured by many users and also offers many advantages, it is not favoured by most IT security managers.","PeriodicalId":253960,"journal":{"name":"International Journal of Teaching and Case Studies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device\",\"authors\":\"Khaled Zayed\",\"doi\":\"10.1504/IJTCS.2016.10001478\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Companies and their employees rely on information technology (IT) and internet-enabled technology to conduct their business and communications. This offers many advantages, but also introduces risks related to information security. The present study sought to address the challenges of IT security alongside the adoption of bring your own device (BYOD) programs and the lack of user awareness of related best practices. A qualitative case study research design was employed. IT managers were interviewed to explore the newly developing subject of BYOD and its implications for IT security. The issues most central to information security are security policies, BYOD user awareness and training, the enforcement of organisational security policies, manager effectiveness in protecting data, and users' acceptance and adherence to BYOD security policies. While BYOD is favoured by many users and also offers many advantages, it is not favoured by most IT security managers.\",\"PeriodicalId\":253960,\"journal\":{\"name\":\"International Journal of Teaching and Case Studies\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Teaching and Case Studies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJTCS.2016.10001478\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Teaching and Case Studies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJTCS.2016.10001478","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device
Companies and their employees rely on information technology (IT) and internet-enabled technology to conduct their business and communications. This offers many advantages, but also introduces risks related to information security. The present study sought to address the challenges of IT security alongside the adoption of bring your own device (BYOD) programs and the lack of user awareness of related best practices. A qualitative case study research design was employed. IT managers were interviewed to explore the newly developing subject of BYOD and its implications for IT security. The issues most central to information security are security policies, BYOD user awareness and training, the enforcement of organisational security policies, manager effectiveness in protecting data, and users' acceptance and adherence to BYOD security policies. While BYOD is favoured by many users and also offers many advantages, it is not favoured by most IT security managers.