首页    期刊浏览 2025年05月25日 星期日
登录注册

文章基本信息

  • 标题:A Review of Impacts of Bring Your Own Device (BYOD) and Nomadic Computing on Enterprise Security Policies’ Compliance: The Case of Higher Learning Institutions in Kenya
  • 本地全文:下载
  • 作者:Peter Namisiko ; William Sakataka ; Bethuel Sugut
  • 期刊名称:Computer Engineering and Intelligent Systems
  • 印刷版ISSN:2222-1727
  • 电子版ISSN:2222-2863
  • 出版年度:2015
  • 卷号:6
  • 期号:4
  • 页码:19-26
  • 语种:English
  • 出版社:International Institute for Science, Technology Education
  • 摘要:Network design is driven by mobility and as such Wireless Local Area Networks (WLANs) have become a major component of corporate networks in today’s business environment. A trend is emerging where there is explosive consumer adoption of smart phones and tablets due to their low price and broad applications support that these devices are offering since they are WLAN enabled. Desktop Computers and laptops are used to produce information; while tablets consume information and smart phones to communicate that information. BYOD (Bring your own device) is a term which refers to instances when employees use their personal computing devices (typically smart phones, tablets and laptops) in the workplace. This trend is here to stay and the challenge is that it is a double edged sword pitting user satisfaction and productivity on one end and organizations data security on the other. As more employees look to access corporate networks with their personal mobile devices, vendors must find ways of helping corporations allow such access in secure, efficient ways. This is due to the fact that technology is changing at a very fast rate and with consumerization of IT revolution there has been a cultural shift such that the users are the ones getting the latest, cutting edge technologies first, and they want to bring those devices to work. BYOD changes the security model of protecting the organizations’ data by blurring the definition of that perimeter, through physical location and in asset ownership. This study reviewed Bring Your Own Device (BYOD) and Nomadic computing on Enterprise security policies’ compliance in HLIs in Africa. A quantitative survey study approach was used in ten university campuses to determine BYOD security compliance issues. The study found that Perceived probability of security breach, Perceived severity of security breach, Security breach concern level and response efficacy had an impact on Enterprise Security Policies’ Compliance in an organization.
  • 其他摘要:Network design is driven by mobility and as such Wireless Local Area Networks (WLANs) have become a major component of corporate networks in today’s business environment. A trend is emerging where there is explosive consumer adoption of smart phones and tablets due to their low price and broad applications support that these devices are offering since they are WLAN enabled. Desktop Computers and laptops are used to produce information; while tablets consume information and smart phones to communicate that information. BYOD (Bring your own device) is a term which refers to instances when employees use their personal computing devices (typically smart phones, tablets and laptops) in the workplace. This trend is here to stay and the challenge is that it is a double edged sword pitting user satisfaction and productivity on one end and organizations data security on the other. As more employees look to access corporate networks with their personal mobile devices, vendors must find ways of helping corporations allow such access in secure, efficient ways. This is due to the fact that technology is changing at a very fast rate and with consumerization of IT revolution there has been a cultural shift such that the users are the ones getting the latest, cutting edge technologies first, and they want to bring those devices to work. BYOD changes the security model of protecting the organizations’ data by blurring the definition of that perimeter, through physical location and in asset ownership. This study reviewed Bring Your Own Device (BYOD) and Nomadic computing on Enterprise security policies’ compliance in HLIs in Africa. A quantitative survey study approach was used in ten university campuses to determine BYOD security compliance issues. The study found that Perceived probability of security breach, Perceived severity of security breach, Security breach concern level and response efficacy had an impact on Enterprise Security Policies’ Compliance in an organization.       Keywords: BYOD, Nomadic computing, Enterprise Security
  • 关键词:BYOD; Nomadic computing; Enterprise Security
国家哲学社会科学文献中心版权所有