The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security

The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security
Author :
Publisher : GRIN Verlag
Total Pages : 142
Release :
ISBN-10 : 9783346825209
ISBN-13 : 3346825205
Rating : 4/5 (205 Downloads)

Book Synopsis The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security by : Janvan Munyoki

Download or read book The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security written by Janvan Munyoki and published by GRIN Verlag. This book was released on 2023-03-07 with total page 142 pages. Available in PDF, EPUB and Kindle. Book excerpt: Doctoral Thesis / Dissertation from the year 2016 in the subject Computer Science - Commercial Information Technology, grade: 3.923, Capella University (School of Technology), course: PHD in Information Technology, language: English, abstract: Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum, with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers. This correlational study used the systems theory framework to examine the relationship between information security managers’ intentions, perceptions of security, and compliance regarding BYOD implementation. Participants of the study consisted of information security managers in Kenya who had obtained the Certified Information Systems Manager certification. Data was collected from 54 information security managers through a survey instrument. The survey instrument integrated three other instruments with proven reliability developed by other researchers. Data was analyzed using a multiple regression analysis to test for a relationship between the variables of the study (security, compliance, and intent to implement BYOD). The multiple regression conducted in this study was insignificant, indicating a relationship did not exist between the study’s variables (F(2, 86) = 0.33, p = .718, R2 = .00). A significant negative relationship was found between security and compliance, indicating a weakly negative correlation (r = -.26, p = .016). Using the results from the study, information technology leaders may be able to develop strategies from which to implement BYOD successfully. Implications for social change include increased knowledge of securing personal devices for employees and consumers in general and reduction in costs associated with security and data breaches.


The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security Related Books

The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security
Language: en
Pages: 142
Authors: Janvan Munyoki
Categories: Computers
Type: BOOK - Published: 2023-03-07 - Publisher: GRIN Verlag

DOWNLOAD EBOOK

Doctoral Thesis / Dissertation from the year 2016 in the subject Computer Science - Commercial Information Technology, grade: 3.923, Capella University (School
Bring Your Own Device (BYOD) to Work
Language: en
Pages: 21
Authors: Bob Hayes
Categories: Computers
Type: BOOK - Published: 2013-03-25 - Publisher: Newnes

DOWNLOAD EBOOK

Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringin
Security Solutions for Hyperconnectivity and the Internet of Things
Language: en
Pages: 347
Authors: Dawson, Maurice
Categories: Computers
Type: BOOK - Published: 2016-08-30 - Publisher: IGI Global

DOWNLOAD EBOOK

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effo
Recent Trends in Computer Networks and Distributed Systems Security
Language: en
Pages: 583
Authors: Gregorio Martinez Perez
Categories: Computers
Type: BOOK - Published: 2014-02-07 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held
Mobile Access Safety
Language: en
Pages: 225
Authors: Dominique Assing
Categories: Technology & Engineering
Type: BOOK - Published: 2013-02-05 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly.