Governing Information Security Within the Context of "Bring Your Own Device in SMMEs"

被引:0
|
作者
Fani, Noluvuyo [1 ]
Von Solms, Rossouw [1 ]
Gerber, Mariana [1 ]
机构
[1] Nelson Mandela Metropolitan Univ, Univ Way, ZA-6001 Port Elizabeth, South Africa
来源
2016 IST-AFRICA WEEK CONFERENCE | 2016年
关键词
BYOD; SMMEs; mobile devices; information security; IT governance; TECHNOLOGY; FRAMEWORK;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information is a critical important asset; and it will always influence the way an organization conducts its business processes. Like any important business asset in an organization, there must be the assurance that the business information and related technologies are both protected and secure. Like any era in the advancement of technology, there is a new phenomenon that has grown in status: "Bring Your Own Device (BYOD)". BYOD combines the official organizational devices required to function at work, together with the personal mobile device. There are many benefits to implementing BYOD; but because many risks are associated; and since BYOD is a new phenomenon, it can be difficult for organizations to manage in a secure manner. Therefore, this paper will provide a basic guideline to Executive Management on how they can govern and manage the BYOD phenomenon in SMMEs in a responsible way.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] BRING YOUR OWN DEVICE FOR E-ASSESSMENT - A REVIEW
    Kueppers, Bastian
    Schroeder, Ulrik
    EDULEARN16: 8TH INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES, 2016, : 8770 - 8776
  • [32] MOBILE LEARNING AND BRING YOUR OWN DEVICE IN CHEMISTRY TEACHING
    Nichele, Aline Grunewald
    Schlemmer, Eliane
    INTED2015: 9TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2015, : 3964 - 3969
  • [33] Bring Your Own Device: Parental Guidance (PG) Suggested
    Kiger, Derick
    Herro, Dani
    TECHTRENDS, 2015, 59 (05) : 51 - 61
  • [34] User Information Security Behavior Towards Data Breach in Bring Your Own Device (BYOD) Enabled Organizations - Leveraging Protection Motivation Theory
    Giwah, Anthony Duke
    IEEE SOUTHEASTCON 2018, 2018,
  • [35] Do educators realise the value of Bring Your Own Device (BYOD) in fieldwork learning?
    Clark, Katherine A.
    Welsh, Katharine E.
    Mauchline, Alice L.
    France, Derek
    Whalley, W. Brian
    Park, Julian
    JOURNAL OF GEOGRAPHY IN HIGHER EDUCATION, 2021, 45 (02) : 255 - 278
  • [36] COMPARATIVE STUDY ON BRING YOUR OWN TECHNOLOGY [BYOT]: APPLICATIONS & SECURITY
    Mishra, Ajaykumar
    Jani, Kuntesh
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [37] A Theoretical Foundation for Explaining and Predicting the Effectiveness of a Bring Your Own Device Program in Organizations
    Akande A.O.
    Tran V.N.
    SN Computer Science, 3 (5)
  • [38] Status of bring-your-own-device (BYOD) security practices in Australian hospitals-A national survey
    Wani, Tafheem Ahmad
    Mendoza, Antonette
    Gray, Kathleen
    Smolenaers, Frank
    HEALTH POLICY AND TECHNOLOGY, 2022, 11 (03)
  • [39] Considerations for Conducting Bring Your Own "Device" (BYOD) Clinical Studies
    Demanuele C.
    Lokker C.
    Jhaveri K.
    Georgiev P.
    Sezgin E.
    Geoghegan C.
    Zou K.H.
    Izmailova E.
    McCarthy M.
    Digital Biomarkers, 2022, 6 (02) : 47 - 60
  • [40] Role of Perceived Value in Acceptance of "Bring Your Own Device" Policy
    Zhang, Lixuan Zhang
    Mouritsen, Matthew
    Miller, Jeffrey R.
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2019, 31 (02) : 65 - 82