TY - JOUR
T1 - A policy-based framework for managing information security and privacy risks in BYOD environments
AU - Garba, Abubakar Bello
AU - Armarego, Jocelyn
AU - Murray, David
PY - 2015
Y1 - 2015
N2 - In a world where consumerisation of IT has driven individuals to acquire and use the latest technologies, an influx of employee personally owned devices has populated corporate environments. This phenomenon is known as Bring Your Own Device (BYOD). Managing organisational information resources has become increasingly complex with the concept of BYOD. Despite the perceived benefits of work flexibility, increased productivity, and efficiency of employees, BYOD raises many concerns relating to information security and privacy that can lead to confidential information loss. This prompts the demand for effective mobile device management tools, policies, standards and procedures. With most BYOD solutions failing to meet the requirement for holistic management of BYOD, this paper proposes a policy-based solution framework that organisations can adopt to achieve information security and privacy in BYOD environments.
AB - In a world where consumerisation of IT has driven individuals to acquire and use the latest technologies, an influx of employee personally owned devices has populated corporate environments. This phenomenon is known as Bring Your Own Device (BYOD). Managing organisational information resources has become increasingly complex with the concept of BYOD. Despite the perceived benefits of work flexibility, increased productivity, and efficiency of employees, BYOD raises many concerns relating to information security and privacy that can lead to confidential information loss. This prompts the demand for effective mobile device management tools, policies, standards and procedures. With most BYOD solutions failing to meet the requirement for holistic management of BYOD, this paper proposes a policy-based solution framework that organisations can adopt to achieve information security and privacy in BYOD environments.
KW - information technology
KW - security measures
KW - risk management
KW - computer security
UR - http://handle.westernsydney.edu.au:8081/1959.7/uws:45343
UR - http://www.ijettcs.org/Volume4Issue2/IJETTCS-2015-04-23-122.pdf
M3 - Article
SN - 2349-7866
VL - 4
SP - 189
EP - 198
JO - International Journal of Emerging Trends & Technology in Computer Science
JF - International Journal of Emerging Trends & Technology in Computer Science
IS - 2
ER -