Abstract

Bring Your Own Device (BYOD) involves allowing employees to use their own mobile devices to access their organisations’ networks. Many organisations are embracing this trend as a means to cut information technology (IT) expenditure, enhance employee satisfaction, etc. However, these and other benefits come at a cost in the form of exposing an organisation to new risks. The aim of this research was to assist organisations to identify the incremental risks they could potentially encounter if they implement a BYOD programme and how they can reduce the risks directly related to BYOD to an acceptable level. An extensive literature review was performed to identify the risks which arise as a result of the adoption of a BYOD programme. COBIT 5 was identified as the most appropriate framework which could be used to develop possible safeguards to mitigate the incremental risks associated with a BYOD programme to an acceptable level. Safeguards were developed to address the risks.

Highlights

  • Introduction and research objectiveWhat started several years ago with employees using their own personal computers to access their organisations’ networks via dial-up and virtual private networks has changed dramatically in recent years

  • The study is non-empirical in nature and the results drawn are from an extensive literature review that was performed on Bring Your Own Device (BYOD) and the COBIT 5 framework

  • The aim of the research was to identify the risks which arise as a result of an organisation adopting a BYOD programme as well as using a recognised framework to identify controls which could be implemented to reduce the risks to an acceptable level

Read more

Summary

Introduction

Introduction and research objectiveWhat started several years ago with employees using their own personal computers to access their organisations’ networks via dial-up and virtual private networks has changed dramatically in recent years. With the increased number of smartphones and tablet computers in the market place, more and more employees are using their personal mobile devices to connect to their organisations’ networks. The concept where an employee uses his or her own personal mobile device to connect to the organisation’s network is known as Bring Your Own Device (BYOD) It has been embraced by a large number of organisations of various sizes and in various sectors. Some employees use their mobile devices to perform basic tasks such as syncing their work emails and calendars with their mobile devices, whereas other employees use their mobile devices to perform specific work-related tasks such as compiling Excel spread sheets and accessing sensitive corporate data. Sensitive data can be leaked where malware infiltrates the network and corrupts the data or causes the information technology (IT) system to shut down

Objectives
Methods
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call