BYOD security risks and mitigation strategies: Insights from IT security experts

Bring Your Own Device (BYOD) is considered one of the top security risks organizations face today as these devices are very much part of the working culture of today's employees. However, there is still a lack of understanding of BYOD security risks and their impact on both information security...

Full description

Saved in:
Bibliographic Details
Main Authors: Palanisamy, Rathika, Norman, Azah Anir, Kiah, Laiha Mat
Format: Article
Published: Taylor & Francis 2021
Subjects:
Online Access:http://eprints.um.edu.my/35258/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.eprints.35258
record_format eprints
spelling my.um.eprints.352582022-10-18T06:58:01Z http://eprints.um.edu.my/35258/ BYOD security risks and mitigation strategies: Insights from IT security experts Palanisamy, Rathika Norman, Azah Anir Kiah, Laiha Mat QA75 Electronic computers. Computer science Bring Your Own Device (BYOD) is considered one of the top security risks organizations face today as these devices are very much part of the working culture of today's employees. However, there is still a lack of understanding of BYOD security risks and their impact on both information security and service delivery, particularly in the government sector, nor are there any strategies to reduce these risks. To examine this problem, interviews and BYOD risk assessments were conducted with eight IT security experts from selected public sector organizations to furnish in-depth insights into BYOD risks and its impact on organizations, and to recommend mitigation strategies to overcome them. Security risks that emanate from the security behavior of employees using their personal devices are identified and categorized into people, process, and technology risks. The risk assessment resulted in 16 critical risks for public sector organizations and strategies such as security training and awareness (SETA), policy, top management commitment, and technical countermeasures to overcome critical BYOD risks. Taylor & Francis 2021-10-02 Article PeerReviewed Palanisamy, Rathika and Norman, Azah Anir and Kiah, Laiha Mat (2021) BYOD security risks and mitigation strategies: Insights from IT security experts. Journal of Organizational Computing and Electronic Commerce, 31 (4). pp. 320-342. ISSN 1091-9392, DOI https://doi.org/10.1080/10919392.2022.2028530 <https://doi.org/10.1080/10919392.2022.2028530>. 10.1080/10919392.2022.2028530
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Research Repository
url_provider http://eprints.um.edu.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Palanisamy, Rathika
Norman, Azah Anir
Kiah, Laiha Mat
BYOD security risks and mitigation strategies: Insights from IT security experts
description Bring Your Own Device (BYOD) is considered one of the top security risks organizations face today as these devices are very much part of the working culture of today's employees. However, there is still a lack of understanding of BYOD security risks and their impact on both information security and service delivery, particularly in the government sector, nor are there any strategies to reduce these risks. To examine this problem, interviews and BYOD risk assessments were conducted with eight IT security experts from selected public sector organizations to furnish in-depth insights into BYOD risks and its impact on organizations, and to recommend mitigation strategies to overcome them. Security risks that emanate from the security behavior of employees using their personal devices are identified and categorized into people, process, and technology risks. The risk assessment resulted in 16 critical risks for public sector organizations and strategies such as security training and awareness (SETA), policy, top management commitment, and technical countermeasures to overcome critical BYOD risks.
format Article
author Palanisamy, Rathika
Norman, Azah Anir
Kiah, Laiha Mat
author_facet Palanisamy, Rathika
Norman, Azah Anir
Kiah, Laiha Mat
author_sort Palanisamy, Rathika
title BYOD security risks and mitigation strategies: Insights from IT security experts
title_short BYOD security risks and mitigation strategies: Insights from IT security experts
title_full BYOD security risks and mitigation strategies: Insights from IT security experts
title_fullStr BYOD security risks and mitigation strategies: Insights from IT security experts
title_full_unstemmed BYOD security risks and mitigation strategies: Insights from IT security experts
title_sort byod security risks and mitigation strategies: insights from it security experts
publisher Taylor & Francis
publishDate 2021
url http://eprints.um.edu.my/35258/
_version_ 1748181067475451904
score 13.154949