首页> 外文期刊>Journal of Information Engineering and Applications >Security Issues with Mobile IT: A Narrative Review of Bring Your Own Device (BYOD).
【24h】

Security Issues with Mobile IT: A Narrative Review of Bring Your Own Device (BYOD).

机译:移动IT的安全问题:自带设备(BYOD)的叙事回顾。

获取原文
           

摘要

The use of employee-owned mobile devices such as smart phones, tablets, laptops, etc., to access business enterprise content or networks otherwise referred to as of ‘Bring Your Own Device’ (BYOD) has further made the confidentiality, integrity, and availability of organizations’ data become insecure, and prone to breaches and fraudulent activities. In this study, the authors explored a narrative review that focuses on the theoretical underpinnings of vast works of literature that revealed significant information on the conceptual framework, existing systems that adopt BYOD security, analysis, and synthesis of prior research. Using some keywords “BYOD system security”, “BYOD security threats”, “cyber-attacks and security”, etc., an electronic database search extracted peer-reviewed articles from the last five years. The thematic analysis of fifty-one articles retrieved revealed that breaches and fraudulent activities exist with the use of BYOD that may be perpetrated against organization’s data, intentionally or maliciously. Good policies and guidelines on the use of BYOD coupled with good formulation and communication of same, should be adhered to avert some forms of security breaches. There is the need to preserve user’s privacy, organizations’ data confidentiality, integrity, and availability, and secure same in the devices of employees using their own devices to process corporate and personal data, by using acceptable and effective BYOD Policy and Mobile Device Management Solution (MDMS). This may increase mutual trust and BYOD adoption rate, new innovations and influence that can positively impact the organizations and their employees.
机译:使用员工拥有的移动设备(例如智能手机,平板电脑,笔记本电脑等)访问企业内容或网络(否则称为“自带设备”(BYOD)),进一步提高了机密性,完整性和可靠性。组织数据的可用性变得不安全,并且容易遭到破坏和欺诈活动。在这项研究中,作者探索了叙述性评论,其重点在于大量文献的理论基础,这些文献揭示了有关概念框架,采用BYOD安全性的现有系统,分析以及先前研究的综合的重要信息。电子数据库搜索使用一些关键词“ BYOD系统安全性”,“ BYOD安全威胁”,“网络攻击和安全性”等,从过去五年中收集了同行评审的文章。对检索到的51篇文章进行主题分析后发现,使用BYOD可能会违反组织的数据,有意或恶意地进行违规和欺诈活动。应当遵循有关使用BYOD的良好政策和指南,以及对其进行良好的表述和沟通,以防止某些形式的安全漏洞。有必要维护用户的隐私,组织的数据机密性,完整性和可用性,并通过使用可接受且有效的BYOD策略和移动设备管理解决方案在使用自己的设备来处理公司和个人数据的员工设备中保护其隐私。 (MDMS)。这可能会增加相互信任和BYOD的采用率,新的创新和影响力,从而对组织及其员工产生积极影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号