BYOD Security: A Study of Human Dimensions
The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemic, even organisations that were previously relucta...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-02-01
|
Series: | Informatics |
Subjects: | |
Online Access: | https://www.mdpi.com/2227-9709/9/1/16 |
_version_ | 1797470748057534464 |
---|---|
author | Kathleen Downer Maumita Bhattacharya |
author_facet | Kathleen Downer Maumita Bhattacharya |
author_sort | Kathleen Downer |
collection | DOAJ |
description | The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemic, even organisations that were previously reluctant to embrace BYOD have been forced to accept it to facilitate remote work. The aim of this paper is to discover, through a study conducted using a survey questionnaire instrument, how employees practice and perceive the BYOD security mechanisms deployed by Australian businesses which can help guide the development of future BYOD security frameworks. Three research questions are answered by this study: What levels of awareness do Australian businesses have for BYOD security aspects? How are employees currently responding to the security mechanisms applied by their organisations for mobile devices? What are the potential weaknesses in businesses’ IT networks that have a direct effect on BYOD security? Overall, the aim of this research is to illuminate the findings of these research objectives so that they can be used as a basis for building new and strengthening existing BYOD security frameworks in order to enhance their effectiveness against an ever-growing list of attacks and threats targeting mobile devices in a virtually driven work force. |
first_indexed | 2024-03-09T19:40:25Z |
format | Article |
id | doaj.art-53a741ef6ebf447aaa50b77f0f37e282 |
institution | Directory Open Access Journal |
issn | 2227-9709 |
language | English |
last_indexed | 2024-03-09T19:40:25Z |
publishDate | 2022-02-01 |
publisher | MDPI AG |
record_format | Article |
series | Informatics |
spelling | doaj.art-53a741ef6ebf447aaa50b77f0f37e2822023-11-24T01:40:47ZengMDPI AGInformatics2227-97092022-02-01911610.3390/informatics9010016BYOD Security: A Study of Human DimensionsKathleen Downer0Maumita Bhattacharya1School of Computing, Mathematics & Engineering, Charles Sturt University, Albury 2640, AustraliaSchool of Computing, Mathematics & Engineering, Charles Sturt University, Albury 2640, AustraliaThe prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemic, even organisations that were previously reluctant to embrace BYOD have been forced to accept it to facilitate remote work. The aim of this paper is to discover, through a study conducted using a survey questionnaire instrument, how employees practice and perceive the BYOD security mechanisms deployed by Australian businesses which can help guide the development of future BYOD security frameworks. Three research questions are answered by this study: What levels of awareness do Australian businesses have for BYOD security aspects? How are employees currently responding to the security mechanisms applied by their organisations for mobile devices? What are the potential weaknesses in businesses’ IT networks that have a direct effect on BYOD security? Overall, the aim of this research is to illuminate the findings of these research objectives so that they can be used as a basis for building new and strengthening existing BYOD security frameworks in order to enhance their effectiveness against an ever-growing list of attacks and threats targeting mobile devices in a virtually driven work force.https://www.mdpi.com/2227-9709/9/1/16Bring Your Own Device (BYOD)BYOD securityBYOD security practicesBYOD security awarenessBYOD security framework |
spellingShingle | Kathleen Downer Maumita Bhattacharya BYOD Security: A Study of Human Dimensions Informatics Bring Your Own Device (BYOD) BYOD security BYOD security practices BYOD security awareness BYOD security framework |
title | BYOD Security: A Study of Human Dimensions |
title_full | BYOD Security: A Study of Human Dimensions |
title_fullStr | BYOD Security: A Study of Human Dimensions |
title_full_unstemmed | BYOD Security: A Study of Human Dimensions |
title_short | BYOD Security: A Study of Human Dimensions |
title_sort | byod security a study of human dimensions |
topic | Bring Your Own Device (BYOD) BYOD security BYOD security practices BYOD security awareness BYOD security framework |
url | https://www.mdpi.com/2227-9709/9/1/16 |
work_keys_str_mv | AT kathleendowner byodsecurityastudyofhumandimensions AT maumitabhattacharya byodsecurityastudyofhumandimensions |