Governing Information Security Within the Context of "Bring Your Own Device in SMMEs"

被引:0
|
作者
Fani, Noluvuyo [1 ]
Von Solms, Rossouw [1 ]
Gerber, Mariana [1 ]
机构
[1] Nelson Mandela Metropolitan Univ, Univ Way, ZA-6001 Port Elizabeth, South Africa
来源
2016 IST-AFRICA WEEK CONFERENCE | 2016年
关键词
BYOD; SMMEs; mobile devices; information security; IT governance; TECHNOLOGY; FRAMEWORK;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information is a critical important asset; and it will always influence the way an organization conducts its business processes. Like any important business asset in an organization, there must be the assurance that the business information and related technologies are both protected and secure. Like any era in the advancement of technology, there is a new phenomenon that has grown in status: "Bring Your Own Device (BYOD)". BYOD combines the official organizational devices required to function at work, together with the personal mobile device. There are many benefits to implementing BYOD; but because many risks are associated; and since BYOD is a new phenomenon, it can be difficult for organizations to manage in a secure manner. Therefore, this paper will provide a basic guideline to Executive Management on how they can govern and manage the BYOD phenomenon in SMMEs in a responsible way.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A framework towards governing "Bring Your Own Device in SMMEs"
    Fani, Noluvuyo
    von Solms, Rossouw
    Gerber, Mariana
    2016 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE 2016 ISSA CONFERENCE, 2016, : 1 - 8
  • [2] Bring Your Own Device: Security Technologies
    Ketel, Mohammed
    Shumate, Thomas
    IEEE SOUTHEASTCON 2015, 2015,
  • [3] Bring Your Own Device Security Issues and Challenges
    Wang, Yong
    Wei, Jinpeng
    Vangury, Karthik
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [4] The "Bring Your Own Device" (BYOD) Security Metrics Taxonomy
    Zulkefli, Zakiah
    Singh, Manmeet Mahinderjit
    ADVANCED SCIENCE LETTERS, 2018, 24 (11) : 8582 - 8590
  • [5] Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations
    Akande, Alexander O.
    Tran, Vu N.
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 55 - 65
  • [6] Factors Affecting Information Security and the Implementation of Bring Your Own Device (BYOD) Programmes in the Kingdom of Saudi Arabia (KSA)
    Bahaddad, Adel A.
    Almarhabi, Khalid A.
    Alghamdi, Ahmed M.
    APPLIED SCIENCES-BASEL, 2022, 12 (24):
  • [7] Is Bring Your Own Device an institutional information security risk for small-scale business organisations?
    Madzima, Kudakwashe
    Mayo, Moses
    Abdullah, Hanifa
    2014 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2014,
  • [8] Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users
    Baillette, Pamela
    Barlette, Yves
    Leclercq-Vandelannoitte, Aurelie
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2018, 43 : 76 - 84
  • [9] Understanding Bring Your Own Device (BYOD) and Employee Information Security Behaviors from A Work-Life Domain Perspective
    Al Askar, Mohamed
    Shen, Kathy Ning
    AMCIS 2016 PROCEEDINGS, 2016,
  • [10] Changing User Attitudes to Security in Bring Your Own Device (BYOD) & the Cloud
    Lennon, R. G.
    2012 5TH ROMANIA TIER 2 FEDERATION GRID, CLOUD & HIGH PERFORMANCE COMPUTING SCIENCE (RO-LCG), 2012, : 49 - 52