Palanisamy, Rathika and Norman, Azah Anir and Mat Kiah, Miss Laiha (2022) BYOD policy compliance: risks and strategies in organizations. Journal of Computer Information Systems, 62 (1). pp. 61-72. ISSN 0887-4417, DOI https://doi.org/10.1080/08874417.2019.1703225.
Full text not available from this repository.Abstract
The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in organizations, along with significant challenges when employees fail to comply with security policies. Previous reviews in this research area had focused solely on the technical issues surrounding BYOD implementation while leaving out the human behavior in complying with security policies which is a major contributing factor to security vulnerabilities. In this paper, we systematically review the literature to gather evidences related to security risks, challenges posed by employees' security policy noncompliance behavior and mitigation strategies to address them. The risks are mapped according to the People, Process and Technology (PPT) Model. The review reports that security policy compliance in a BYOD environment remains scarce which makes this review a novel contribution to research on human security behavior in Information System (IS). In addition, open research problems and future research directions are presented in the paper.
Item Type: | Article |
---|---|
Funders: | Ministry of Education (MOE), Malaysia under the Fundamental Research Grant Scheme FRGS [FP056-2019A] |
Uncontrolled Keywords: | Bring Your Own Device; BYOD; Security policy compliance; Security behavior; Risk and mitigation strategies |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Faculty of Computer Science & Information Technology > Department of Computer System & Technology |
Depositing User: | Ms. Juhaida Abd Rahim |
Date Deposited: | 25 Apr 2022 07:33 |
Last Modified: | 25 Apr 2022 07:33 |
URI: | http://eprints.um.edu.my/id/eprint/33873 |
Actions (login required)
View Item |