Jonathan, Oluranti and Misra, Sanjay (2016) Policy framework for adoption of bring your own device (BYOD) by institutions in Nigeria. BYOD, mobile devices, threats, risks, vulnerability, Mobile Device Management (MDM), IT Consumerization.
PDF
Download (512kB) |
Abstract
Mobile computing makes access to data and services available anytime and anywhere. The recent increase in the number of mobile devices like smartphones and tablets has given rise to a phenomenon known as “IT Consumerization” that focuses on satisfying the needs of the consumers to improve their productivity for the benefit of their organization. Recent report from mobile trends indicates that in 2014 alone, manufacturers will ship more than a billion Android devices. It is estimated that seven out of every ten employees (7/10) will use their mobile devices for work in corporate environments. Mobile devices according to studies are known to be more vulnerable compared to laptops and PCs due to their small size, mobility and general lack of protection against viruses and malware. The use of these devices therefore can impact negatively on corporate networks unless properly and effectively managed. Organizations are now adopting a program known as „bring your own device‟ (BYOD) that will enable them capture, register, and manage the mobile devices that connect and use their corporate infrastructure to guarantee the security of the infrastructure and data of the organization. They achieve this by putting in place strategies and policies that involves all stakeholders. This paper surveys literature to extract useful information that serve to enlighten the community of workers and IT leaders on the current and rapid growing phenomenon of BYOD, including the strategies for deployment, BYOD models, benefits, security threats on corporate and user data and infrastructure. The study presents guidelines and a framework for adoption of BYOD by institutions of higher learning in Nigeria in order to improve learning and provide a better workplace. The study will enable IT leaders formulate policies and guidelines that will guarantee smooth adoption and usage of BYOD by their various organizations.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | BYOD, mobile devices, threats, risks, vulnerability, Mobile Device Management (MDM), IT Consumerization |
Subjects: | Q Science > Q Science (General) Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Faculty of Engineering, Science and Mathematics > School of Electronics and Computer Science |
Depositing User: | Mrs Patricia Nwokealisi |
Date Deposited: | 18 Feb 2019 13:27 |
Last Modified: | 01 Apr 2022 15:27 |
URI: | http://eprints.covenantuniversity.edu.ng/id/eprint/12402 |
Actions (login required)
View Item |