A review of bring your own device on security issues

Mobile computing has supplanted internet computing because of the proliferation of cloud-based applications and mobile devices (such as smartphones, palmtops, and tablets). As a result of this, workers bring their mobile devices to the workplace and use them for enterprise work. The policy of allowi...

Full description

Bibliographic Details
Main Authors: Olalere, Morufu, Abdullah, Mohd Taufik, Mahmod, Ramlan, Abdullah, Azizol
Format: Article
Language:English
Published: SAGE Publications 2015
Online Access:http://psasir.upm.edu.my/id/eprint/43564/1/A%20Review%20of%20Bring%20Your%20Own%20Device%20on.pdf
_version_ 1796974368533774336
author Olalere, Morufu
Abdullah, Mohd Taufik
Mahmod, Ramlan
Abdullah, Azizol
author_facet Olalere, Morufu
Abdullah, Mohd Taufik
Mahmod, Ramlan
Abdullah, Azizol
author_sort Olalere, Morufu
collection UPM
description Mobile computing has supplanted internet computing because of the proliferation of cloud-based applications and mobile devices (such as smartphones, palmtops, and tablets). As a result of this, workers bring their mobile devices to the workplace and use them for enterprise work. The policy of allowing the employees to work with their own personal mobile devices is called Bring Your Own Devices (BYOD). In this article, we discuss BYOD’s background, prevalence, benefits, challenges, and possible security attacks. We then review contributions of academic researchers on BYOD. The Universiti Putra Malaysia online databases (such as IEEE Xplore digital library, Elsevier, Springer, ACM digital library) were used to search for peer-reviewed academic publications and other relevant publications on BYOD. The Google Scholar search engine was also used. Our thorough review shows that security issues comprise the most significant challenge confronting BYOD policy and that very little has been done to tackle this security challenge. It is our hope that this review will provide a theoretical background for future research and enable researchers to identify researchable areas of BYOD.
first_indexed 2024-03-06T08:56:02Z
format Article
id upm.eprints-43564
institution Universiti Putra Malaysia
language English
last_indexed 2024-03-06T08:56:02Z
publishDate 2015
publisher SAGE Publications
record_format dspace
spelling upm.eprints-435642016-07-19T04:24:09Z http://psasir.upm.edu.my/id/eprint/43564/ A review of bring your own device on security issues Olalere, Morufu Abdullah, Mohd Taufik Mahmod, Ramlan Abdullah, Azizol Mobile computing has supplanted internet computing because of the proliferation of cloud-based applications and mobile devices (such as smartphones, palmtops, and tablets). As a result of this, workers bring their mobile devices to the workplace and use them for enterprise work. The policy of allowing the employees to work with their own personal mobile devices is called Bring Your Own Devices (BYOD). In this article, we discuss BYOD’s background, prevalence, benefits, challenges, and possible security attacks. We then review contributions of academic researchers on BYOD. The Universiti Putra Malaysia online databases (such as IEEE Xplore digital library, Elsevier, Springer, ACM digital library) were used to search for peer-reviewed academic publications and other relevant publications on BYOD. The Google Scholar search engine was also used. Our thorough review shows that security issues comprise the most significant challenge confronting BYOD policy and that very little has been done to tackle this security challenge. It is our hope that this review will provide a theoretical background for future research and enable researchers to identify researchable areas of BYOD. SAGE Publications 2015 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/43564/1/A%20Review%20of%20Bring%20Your%20Own%20Device%20on.pdf Olalere, Morufu and Abdullah, Mohd Taufik and Mahmod, Ramlan and Abdullah, Azizol (2015) A review of bring your own device on security issues. SAGE Open, 5 (2). 1 - 11. ISSN 2158-2440 10.1177/2158244015580372
spellingShingle Olalere, Morufu
Abdullah, Mohd Taufik
Mahmod, Ramlan
Abdullah, Azizol
A review of bring your own device on security issues
title A review of bring your own device on security issues
title_full A review of bring your own device on security issues
title_fullStr A review of bring your own device on security issues
title_full_unstemmed A review of bring your own device on security issues
title_short A review of bring your own device on security issues
title_sort review of bring your own device on security issues
url http://psasir.upm.edu.my/id/eprint/43564/1/A%20Review%20of%20Bring%20Your%20Own%20Device%20on.pdf
work_keys_str_mv AT olaleremorufu areviewofbringyourowndeviceonsecurityissues
AT abdullahmohdtaufik areviewofbringyourowndeviceonsecurityissues
AT mahmodramlan areviewofbringyourowndeviceonsecurityissues
AT abdullahazizol areviewofbringyourowndeviceonsecurityissues
AT olaleremorufu reviewofbringyourowndeviceonsecurityissues
AT abdullahmohdtaufik reviewofbringyourowndeviceonsecurityissues
AT mahmodramlan reviewofbringyourowndeviceonsecurityissues
AT abdullahazizol reviewofbringyourowndeviceonsecurityissues