2015
DOI: 10.1080/15536548.2015.1010985
|View full text |Cite
|
Sign up to set email alerts
|

Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 62 publications
(43 citation statements)
references
References 13 publications
0
43
0
Order By: Relevance
“…An increasing number of individuals bring their own IT to companies, partly to conduct corporate tasks, but also outside their corporate duties; for instance, to check private mails or surf the Internet (Venkatraman et al 2018). Individuals bringing their own IT to companies is both a challenge and an opportunity (Garba et al 2015;Weeger et al 2016). From the behavioral side, this trend is likely to have an impact on individual work tasks, since individuals might be more used to using their own IT, but also their increasing IT skills that they acquire outside the firm, can be helpful within the firm.…”
Section: Digitized Individual As Employeeinteracting With Employersmentioning
confidence: 99%
“…An increasing number of individuals bring their own IT to companies, partly to conduct corporate tasks, but also outside their corporate duties; for instance, to check private mails or surf the Internet (Venkatraman et al 2018). Individuals bringing their own IT to companies is both a challenge and an opportunity (Garba et al 2015;Weeger et al 2016). From the behavioral side, this trend is likely to have an impact on individual work tasks, since individuals might be more used to using their own IT, but also their increasing IT skills that they acquire outside the firm, can be helpful within the firm.…”
Section: Digitized Individual As Employeeinteracting With Employersmentioning
confidence: 99%
“…1). It is the new generation of technology-savvy individuals who have triggered this shift and feel more comfortable using their privatelyowned devices for the ease of convenience to fulfill their business tasks more efficiently and effectively (Garba, Armarego, Murray, & Kenworthy, 2015). This has enabled the organization to leverage innovation capabilities of employees in the age of consumerization of IT (Koffer, Ortbach, Junglas, Niehaves, & Harris, 2015).…”
Section: It Consumerization (Byods) and Innovationmentioning
confidence: 99%
“…Ogie (2016) further argues that this approach monitors location, policies, alerts and rules and also includes connection set-up, device registration, passcode, user authentication, compliance and encryption. MDM also restricts the usage of camera and cloud service making the device even more secured (Garba et al, 2015). This creates psychological reluctance to being controlled and monitored because of MDM agent installed on their devices (Koh, Oh, & Im, 2014).…”
Section: Mobile Device Management (Mdm) Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…The current disruptive trends in the form of bring your own device (BYOD) that have infiltrated the information technology (IT) landscape across all industries not only require that organisations upgrade the way they manage their information security (IS), but also demand that every organisation builds a solid and practical approach towards IS. These challenges come in the form of IS breaches, potential system intrusions, data losses, and improper exposures resulting from these disruptive tendencies (Garba, Armarego, Murray, & Kenworthy, ). Eschelbeck and Schwartzberg () warned that BYOD in the workplace has become the rule rather than the exception, and the affected organisations will need to devise a strategy to mitigate the risks that BYOD introduces.…”
Section: Introductionmentioning
confidence: 99%