BYOD policy compliance: risks and strategies in organizations

Palanisamy, Rathika and Norman, Azah Anir and Mat Kiah, Miss Laiha (2022) BYOD policy compliance: risks and strategies in organizations. Journal of Computer Information Systems, 62 (1). pp. 61-72. ISSN 0887-4417, DOI

Full text not available from this repository.


The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in organizations, along with significant challenges when employees fail to comply with security policies. Previous reviews in this research area had focused solely on the technical issues surrounding BYOD implementation while leaving out the human behavior in complying with security policies which is a major contributing factor to security vulnerabilities. In this paper, we systematically review the literature to gather evidences related to security risks, challenges posed by employees' security policy noncompliance behavior and mitigation strategies to address them. The risks are mapped according to the People, Process and Technology (PPT) Model. The review reports that security policy compliance in a BYOD environment remains scarce which makes this review a novel contribution to research on human security behavior in Information System (IS). In addition, open research problems and future research directions are presented in the paper.

Item Type: Article
Funders: Ministry of Education (MOE), Malaysia under the Fundamental Research Grant Scheme FRGS [FP056-2019A]
Uncontrolled Keywords: Bring Your Own Device; BYOD; Security policy compliance; Security behavior; Risk and mitigation strategies
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Computer Science & Information Technology > Department of Computer System & Technology
Depositing User: Ms. Juhaida Abd Rahim
Date Deposited: 25 Apr 2022 07:33
Last Modified: 25 Apr 2022 07:33

Actions (login required)

View Item View Item