BYOD security risks and mitigation strategies: Insights from IT security experts

Palanisamy, Rathika and Norman, Azah Anir and Kiah, Laiha Mat (2021) BYOD security risks and mitigation strategies: Insights from IT security experts. Journal of Organizational Computing and Electronic Commerce, 31 (4). pp. 320-342. ISSN 1091-9392, DOI https://doi.org/10.1080/10919392.2022.2028530.

Full text not available from this repository.

Abstract

Bring Your Own Device (BYOD) is considered one of the top security risks organizations face today as these devices are very much part of the working culture of today's employees. However, there is still a lack of understanding of BYOD security risks and their impact on both information security and service delivery, particularly in the government sector, nor are there any strategies to reduce these risks. To examine this problem, interviews and BYOD risk assessments were conducted with eight IT security experts from selected public sector organizations to furnish in-depth insights into BYOD risks and its impact on organizations, and to recommend mitigation strategies to overcome them. Security risks that emanate from the security behavior of employees using their personal devices are identified and categorized into people, process, and technology risks. The risk assessment resulted in 16 critical risks for public sector organizations and strategies such as security training and awareness (SETA), policy, top management commitment, and technical countermeasures to overcome critical BYOD risks.

Item Type: Article
Funders: Ministry of Education[FRGS][FP056-2019A]
Uncontrolled Keywords: BYOD;BYOD security risks;Mitigation strategies;Public sector information security;Qualitative study;Risk assessment
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Computer Science & Information Technology
Depositing User: Ms Zaharah Ramly
Date Deposited: 18 Oct 2022 06:58
Last Modified: 18 Oct 2022 06:58
URI: http://eprints.um.edu.my/id/eprint/35258

Actions (login required)

View Item View Item