BYOD security risks and mitigation strategies: Insights from IT security experts
Bring Your Own Device (BYOD) is considered one of the top security risks organizations face today as these devices are very much part of the working culture of today's employees. However, there is still a lack of understanding of BYOD security risks and their impact on both information security...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
Taylor & Francis
2021
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/35258/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.um.eprints.35258 |
---|---|
record_format |
eprints |
spelling |
my.um.eprints.352582022-10-18T06:58:01Z http://eprints.um.edu.my/35258/ BYOD security risks and mitigation strategies: Insights from IT security experts Palanisamy, Rathika Norman, Azah Anir Kiah, Laiha Mat QA75 Electronic computers. Computer science Bring Your Own Device (BYOD) is considered one of the top security risks organizations face today as these devices are very much part of the working culture of today's employees. However, there is still a lack of understanding of BYOD security risks and their impact on both information security and service delivery, particularly in the government sector, nor are there any strategies to reduce these risks. To examine this problem, interviews and BYOD risk assessments were conducted with eight IT security experts from selected public sector organizations to furnish in-depth insights into BYOD risks and its impact on organizations, and to recommend mitigation strategies to overcome them. Security risks that emanate from the security behavior of employees using their personal devices are identified and categorized into people, process, and technology risks. The risk assessment resulted in 16 critical risks for public sector organizations and strategies such as security training and awareness (SETA), policy, top management commitment, and technical countermeasures to overcome critical BYOD risks. Taylor & Francis 2021-10-02 Article PeerReviewed Palanisamy, Rathika and Norman, Azah Anir and Kiah, Laiha Mat (2021) BYOD security risks and mitigation strategies: Insights from IT security experts. Journal of Organizational Computing and Electronic Commerce, 31 (4). pp. 320-342. ISSN 1091-9392, DOI https://doi.org/10.1080/10919392.2022.2028530 <https://doi.org/10.1080/10919392.2022.2028530>. 10.1080/10919392.2022.2028530 |
institution |
Universiti Malaya |
building |
UM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaya |
content_source |
UM Research Repository |
url_provider |
http://eprints.um.edu.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Palanisamy, Rathika Norman, Azah Anir Kiah, Laiha Mat BYOD security risks and mitigation strategies: Insights from IT security experts |
description |
Bring Your Own Device (BYOD) is considered one of the top security risks organizations face today as these devices are very much part of the working culture of today's employees. However, there is still a lack of understanding of BYOD security risks and their impact on both information security and service delivery, particularly in the government sector, nor are there any strategies to reduce these risks. To examine this problem, interviews and BYOD risk assessments were conducted with eight IT security experts from selected public sector organizations to furnish in-depth insights into BYOD risks and its impact on organizations, and to recommend mitigation strategies to overcome them. Security risks that emanate from the security behavior of employees using their personal devices are identified and categorized into people, process, and technology risks. The risk assessment resulted in 16 critical risks for public sector organizations and strategies such as security training and awareness (SETA), policy, top management commitment, and technical countermeasures to overcome critical BYOD risks. |
format |
Article |
author |
Palanisamy, Rathika Norman, Azah Anir Kiah, Laiha Mat |
author_facet |
Palanisamy, Rathika Norman, Azah Anir Kiah, Laiha Mat |
author_sort |
Palanisamy, Rathika |
title |
BYOD security risks and mitigation strategies: Insights from IT security experts |
title_short |
BYOD security risks and mitigation strategies: Insights from IT security experts |
title_full |
BYOD security risks and mitigation strategies: Insights from IT security experts |
title_fullStr |
BYOD security risks and mitigation strategies: Insights from IT security experts |
title_full_unstemmed |
BYOD security risks and mitigation strategies: Insights from IT security experts |
title_sort |
byod security risks and mitigation strategies: insights from it security experts |
publisher |
Taylor & Francis |
publishDate |
2021 |
url |
http://eprints.um.edu.my/35258/ |
_version_ |
1748181067475451904 |
score |
13.154949 |