Characterising Risk Factors and Countermeasures for Risk Evaluation of Bring Your Own Device Strategy
Abstract
Allowing employees to use their personal devices to perform official and private tasks through computing strategy known as bring your own device BYOD portends numerous benefits and security risks. The risks could propagate to enterprise information systems through some risk factors. Realistically, organisations anticipated the risks by implementing arrays of countermeasures. However, the characteristics that defined the relationships between the risk factors and the technical security controls are yet to be established. In order to evolve the features, this study conducted content analysis on some literatures which were selected through criteria developed for the research. Thereafter, the exploration revealed five characteristics that cut across risk factors, technical controls and the relationships between the former and the latter. Precisely, the derived characteristics are crucial toward achieving realistic risk evaluation process in BYOD strategy. Furthermore, the study opened more research directions as the risks circumscribing the strategy continue to emerge as global security challenge to vital information assets.
Keywords
References
- P. K. Gajar, A. Ghosh, and S. Rai. “Bring your own device (Byod): Security risks and mitigating strategies”, Journal of Global Research in Computer Science, Vol. 4, No. 4, pp. 62–70, 2013.
- M. N. O. Sadiku, S. R. Nelatury, and S. M. Musa. “Bring your own device”, Journal of Scientific and Engineering Research, Vol. 4, No. 4, pp. 163–165,
- H. Berger and J. Symonds. “Adoption of bring your own device in HE & FE institutions”, 11th International Organizations Conference on The changing face of Knowledge Management Impacting Society, Hagen, Germany, 25-28 July 2016. Management in
- A. Ganguly and M. Mansouri. “Evaluating risks associated with extended enterprise systems (EES)”, IEEE Aerospace and Electronic Systems Magazine, Vol. 27, No. 5, pp. 4–10, 2012.
- J. Bhattacharjee, A. Sengupta, C. Mazumdar, and M. methodology for enterprise information security risk analysis”, Proceedings of the CUBE International Information Technology Conference, Pune, India, pp. 809–815, 03-06 September 2012.
- A. Scarfò. “New security perspectives around BYOD”, Proceedings of the Seventh International Conference on Broadband, Wireless Computing, Communication Victoria, Canada, pp. 446–451, 12-14 November 2012. Applications (BWCCA),
- D. A. Arregui, S. B. Maynard, and A. Ahmad. “Mitigating BYOD information security risks”, Australasian Conference on Information Systems 2016, Woolongong, Australia, pp. 1–11, 05-07 December 2016.
- M. Eslahi, M. V. Naseri, H. Hashim, N. M. Tahir, E. Hisham, and M. Saad. “BYOD: Current state and security challenges”, IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), Penang, Malaysia, pp. 189–192, 7-8 April 2014.
Details
Primary Language
English
Subjects
-
Journal Section
-
Publication Date
March 1, 2018
Submission Date
-
Acceptance Date
-
Published in Issue
Year 2018 Volume: 7 Number: 1
APA
Ganiyu, S. O., & Jimoh, R. G. (2018). Characterising Risk Factors and Countermeasures for Risk Evaluation of Bring Your Own Device Strategy. International Journal of Information Security Science, 7(1), 49-59. https://izlik.org/JA68MS63GJ
AMA
1.Ganiyu SO, Jimoh RG. Characterising Risk Factors and Countermeasures for Risk Evaluation of Bring Your Own Device Strategy. IJISS. 2018;7(1):49-59. https://izlik.org/JA68MS63GJ
Chicago
Ganiyu, Shefiu Olusegun, and Rasheed Gbenga Jimoh. 2018. “Characterising Risk Factors and Countermeasures for Risk Evaluation of Bring Your Own Device Strategy”. International Journal of Information Security Science 7 (1): 49-59. https://izlik.org/JA68MS63GJ.
EndNote
Ganiyu SO, Jimoh RG (March 1, 2018) Characterising Risk Factors and Countermeasures for Risk Evaluation of Bring Your Own Device Strategy. International Journal of Information Security Science 7 1 49–59.
IEEE
[1]S. O. Ganiyu and R. G. Jimoh, “Characterising Risk Factors and Countermeasures for Risk Evaluation of Bring Your Own Device Strategy”, IJISS, vol. 7, no. 1, pp. 49–59, Mar. 2018, [Online]. Available: https://izlik.org/JA68MS63GJ
ISNAD
Ganiyu, Shefiu Olusegun - Jimoh, Rasheed Gbenga. “Characterising Risk Factors and Countermeasures for Risk Evaluation of Bring Your Own Device Strategy”. International Journal of Information Security Science 7/1 (March 1, 2018): 49-59. https://izlik.org/JA68MS63GJ.
JAMA
1.Ganiyu SO, Jimoh RG. Characterising Risk Factors and Countermeasures for Risk Evaluation of Bring Your Own Device Strategy. IJISS. 2018;7:49–59.
MLA
Ganiyu, Shefiu Olusegun, and Rasheed Gbenga Jimoh. “Characterising Risk Factors and Countermeasures for Risk Evaluation of Bring Your Own Device Strategy”. International Journal of Information Security Science, vol. 7, no. 1, Mar. 2018, pp. 49-59, https://izlik.org/JA68MS63GJ.
Vancouver
1.Shefiu Olusegun Ganiyu, Rasheed Gbenga Jimoh. Characterising Risk Factors and Countermeasures for Risk Evaluation of Bring Your Own Device Strategy. IJISS [Internet]. 2018 Mar. 1;7(1):49-5. Available from: https://izlik.org/JA68MS63GJ