Information System Audit for Mobile Device Security Assessment

被引:3
作者
Abu Othman, Noor Ashitah [1 ,2 ]
Norman, Azah Anir [3 ]
Kiah, Miss Laiha Mat [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] Univ Teknol MARA, Fac Comp & Math Sci, Shah Alam, Malaysia
[3] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Informat Syst, Kuala Lumpur, Malaysia
[4] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur, Malaysia
来源
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) | 2021年
关键词
Mobile Device; Information System Management; Audit; Cybersecurity; BYOD; ASSURANCE; MODEL; RISK;
D O I
10.1109/CRC50527.2021.9392468
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The competency to use mobile devices for work-related tasks gives advantages to the company productiveness and expedites business processes. Thus Bring Your Own Device (BYOD) setting emerge to enable work flexibility and technological compatibility. For management, employees' productivity is important, but they could not jeopardise the security of information and data stored in the corporate network. Securing data and network becomes more complex tasks as it deals with foreign devices, i.e., devices that do not belong to the organisation. With much research focused on pre-implementation and the technical aspects of mobile device usage, post-implementation advancement is receiving less attention. IS audit as one of the post-implementation mechanisms provides performance evaluation of existing IS assets, business operations and process implementation, thus helping management formulating the best strategies in optimising IS practices. This paper discusses the feasibility of IS audit in assessing mobile device security by exploring the risks and vulnerabilities of mobile devices for organisational IS security as well as the perception of Information system management in mobile device security. By analysing related literature, authors pointed out how the references used in the current IS audit research address the mobile device security. This work serves a significant foundation in the future development in mobile device audit.
引用
收藏
页码:50 / 55
页数:6
相关论文
共 45 条
[1]  
Agudelo C. A., 2016, P 27 AUSTR C INF SYS, P1
[2]  
Al Harthy K, 2018, INT CONF E BUS ENG, P289, DOI 10.1109/ICEBE.2018.00055
[3]  
Ali MI., 2019, Int J Eng Adv Technol, V8, P1602, DOI [10.35940/ijeat.F8202.088619, DOI 10.35940/IJEAT.F8202.088619]
[4]  
Ali Saqib, 2015, Journal of Theoretical and Applied Information Technology, V79, P514
[5]  
Ali S, 2015, 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), P56, DOI 10.1109/CIACS.2015.7395567
[6]  
[Anonymous], 2019, ITIL Foundation-ITIL, V4
[7]   Towards data-driven decision support for organizational IT security audits [J].
Brunner, Michael ;
Sillaber, Christian ;
Demetz, Lukas ;
Manhart, Markus ;
Breu, Ruth .
IT-INFORMATION TECHNOLOGY, 2018, 60 (04) :207-217
[8]  
Chang S. I., 2016, PAC AS C INF SYST PA
[9]   Mobile device users' privacy security assurance behavior A technology threat avoidance perspective [J].
Chen H. ;
Li W. .
Information and Computer Security, 2017, 25 (03) :330-344
[10]   Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation [J].
Cheng, Yexia ;
Du, Yuejin ;
Peng, Jin ;
Fu, Jun ;
Liu, Baoxu .
CYBER SECURITY, CNCERT 2018, 2019, 970 :165-176