Information system audit for mobile device security assessment

The competency to use mobile devices for work-related tasks gives advantages to the company productiveness and expedites business processes. Thus Bring Your Own Device (BYOD) setting emerge to enable work flexibility and technological compatibility. For management, employees' productivity is im...

Full description

Saved in:
Bibliographic Details
Main Authors: Abu Othman, Noor Ashitah, Norman, Azah Anir, Mat Kiah, Miss Laiha
Format: Conference or Workshop Item
Published: 2021
Subjects:
Online Access:http://eprints.um.edu.my/35393/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.eprints.35393
record_format eprints
spelling my.um.eprints.353932023-10-05T09:33:03Z http://eprints.um.edu.my/35393/ Information system audit for mobile device security assessment Abu Othman, Noor Ashitah Norman, Azah Anir Mat Kiah, Miss Laiha QA75 Electronic computers. Computer science The competency to use mobile devices for work-related tasks gives advantages to the company productiveness and expedites business processes. Thus Bring Your Own Device (BYOD) setting emerge to enable work flexibility and technological compatibility. For management, employees' productivity is important, but they could not jeopardise the security of information and data stored in the corporate network. Securing data and network becomes more complex tasks as it deals with foreign devices, i.e., devices that do not belong to the organisation. With much research focused on pre-implementation and the technical aspects of mobile device usage, post-implementation advancement is receiving less attention. IS audit as one of the post-implementation mechanisms provides performance evaluation of existing IS assets, business operations and process implementation, thus helping management formulating the best strategies in optimising IS practices. This paper discusses the feasibility of IS audit in assessing mobile device security by exploring the risks and vulnerabilities of mobile devices for organisational IS security as well as the perception of Information system management in mobile device security. By analysing related literature, authors pointed out how the references used in the current IS audit research address the mobile device security. This work serves a significant foundation in the future development in mobile device audit. 2021-01 Conference or Workshop Item PeerReviewed Abu Othman, Noor Ashitah and Norman, Azah Anir and Mat Kiah, Miss Laiha (2021) Information system audit for mobile device security assessment. In: 2021 3rd International Cyber Resilience Conference (CRC).
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Research Repository
url_provider http://eprints.um.edu.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Abu Othman, Noor Ashitah
Norman, Azah Anir
Mat Kiah, Miss Laiha
Information system audit for mobile device security assessment
description The competency to use mobile devices for work-related tasks gives advantages to the company productiveness and expedites business processes. Thus Bring Your Own Device (BYOD) setting emerge to enable work flexibility and technological compatibility. For management, employees' productivity is important, but they could not jeopardise the security of information and data stored in the corporate network. Securing data and network becomes more complex tasks as it deals with foreign devices, i.e., devices that do not belong to the organisation. With much research focused on pre-implementation and the technical aspects of mobile device usage, post-implementation advancement is receiving less attention. IS audit as one of the post-implementation mechanisms provides performance evaluation of existing IS assets, business operations and process implementation, thus helping management formulating the best strategies in optimising IS practices. This paper discusses the feasibility of IS audit in assessing mobile device security by exploring the risks and vulnerabilities of mobile devices for organisational IS security as well as the perception of Information system management in mobile device security. By analysing related literature, authors pointed out how the references used in the current IS audit research address the mobile device security. This work serves a significant foundation in the future development in mobile device audit.
format Conference or Workshop Item
author Abu Othman, Noor Ashitah
Norman, Azah Anir
Mat Kiah, Miss Laiha
author_facet Abu Othman, Noor Ashitah
Norman, Azah Anir
Mat Kiah, Miss Laiha
author_sort Abu Othman, Noor Ashitah
title Information system audit for mobile device security assessment
title_short Information system audit for mobile device security assessment
title_full Information system audit for mobile device security assessment
title_fullStr Information system audit for mobile device security assessment
title_full_unstemmed Information system audit for mobile device security assessment
title_sort information system audit for mobile device security assessment
publishDate 2021
url http://eprints.um.edu.my/35393/
_version_ 1781704462993195008
score 13.15806