Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum, with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers.
This correlational study used the systems theory framework to examine the relationship between information security managers’ intentions, perceptions of security, and compliance regarding BYOD implementation. Participants of the study consisted of information security managers in Kenya who had obtained the Certified Information Systems Manager certification. Data was collected from 54 information security managers through a survey instrument. The survey instrument integrated three other instruments with proven reliability developed by other researchers.
Data was analyzed using a multiple regression analysis to test for a relationship between the variables of the study (security, compliance, and intent to implement BYOD). The multiple regression conducted in this study was insignificant, indicating a relationship did not exist between the study’s variables (F(2, 86) = 0.33, p = .718, R2 = .00). A significant negative relationship was found between security and compliance, indicating a weakly negative correlation (r = -.26, p = .016).
Using the results from the study, information technology leaders may be able to develop strategies from which to implement BYOD successfully. Implications for social change include increased knowledge of securing personal devices for employees and consumers in general and reduction in costs associated with security and data breaches.
Table of Contents
Section 1: Foundation of the Study
Background of the Problem
Problem Statement
Purpose Statement
Nature of the Study
Research Question and Hypotheses
Theoretical Framework
Operational Definitions
Assumptions, Limitations, and Delimitations
Assumptions
Limitations
Delimitations
Significance of the Study
Contribution to Information Technology Practice
Implications for Social Change
A Review of the Professional and Academic Literature
Systems Theory
Evolution of Systems Theory
Application of Systems Theory
Supporting Theories
Contrasting Theories
Bring Your Own Device Implementation
Bring Your Own Device Overview
Benefits of Bring Your Own Device
Security Challenges of Bring Your Own Device Implementation
Compliance
The Need for a Bring Your Own Device Policy
Employees’ Compliance with Policies
Security
Information Security Risk Management
Potential Impact to an Organization
Bring Your Own Device Security Challenges
Bring Your Own Device Security Framework
Gap in the Literature
Transition and Summary
Section 2: The Project
Purpose Statement
Role of the Researcher
Participants
Research Method and Design
Method
Research Design
Population and Sampling
Ethical Research
Data Collection
Instruments
Data Collection Technique
Data Organization Techniques
Data Analysis Techniques
Reliability and Validity
Reliability
Validity
Transition and Summary
Section 3: Application to Professional Practice and Implications for Change
Overview of Study
Presentation of the Findings
Data Management Procedures
Reliability Analysis
Descriptive Statistics
Analysis
Assumptions
Summary
Theoretical Conversation on Findings
Applications to Professional Practice
Implications for Social Change
Recommendations for Action
Recommendations for Further Study
Reflections
Summary and Study Conclusions
References
Objectives & Research Themes
This study aims to examine the implementation challenges of Bring Your Own Device (BYOD) concepts within small to medium-sized organizations in Kenya, focusing specifically on the correlation between security, compliance, and the intent to implement BYOD among certified information security managers.
- Systems theory as a foundational framework for analyzing BYOD security.
- Evaluation of security risks, compliance requirements, and policy challenges in BYOD environments.
- Quantitative analysis of correlations between security perceptions, compliance levels, and BYOD implementation intent.
- Development of strategic insights and recommendations for IT leaders to facilitate successful BYOD implementation.
Excerpt from the Book
Section 1: Foundation of the Study
The use of personal mobile devices in the workplace is gaining prominence and acceptance as many people are using their personal devices to conduct certain aspects of their work (Waterfill and Dilworth, 2014). A bring your own device (BYOD) policy affords the opportunity of using a single personal device for (a) anything, personal and business use; (b) anywhere, mobile use through the Internet or wireless LAN (WLAN); and (c) anytime, working hours and off-duty hours (Disterer & Kleiner, 2013). BYOD benefits such as cost savings, increased productivity, and improved efficiency are factors in its’ gaining popularity and acceptance (Fiorenza, 2013).
While BYOD affords several opportunities and benefits, there are also challenges. The issues of managing security for BYOD, defining what is acceptable use for employees and organizations, and data retrieval from personal devices are key concerns for organizations that have implemented BYOD or are contemplating implementation (Waterfill and Dilworth, 2014; de las Cuevas et al., 2015) Privacy and legal concerns are also issues that need to be addressed from a strategic perspective to ensure a successful BYOD program as BYOD involves both organizational data and employees’ private data residing on a personal device (Peretti & Sarkisian, 2014). A comprehensive BYOD security framework that encompasses people, policy, management, and technology should be developed to address security concerns and ensure organizations can realize the benefits afforded by BYOD (Zahadat, Blessner, Blackburn, & Olson, 2015).
Summary of Chapters
Section 1: Foundation of the Study: This chapter provides an introduction to the BYOD phenomenon, discussing its rise in popularity, associated benefits, and critical security and compliance challenges, while establishing systems theory as the primary theoretical framework.
Section 2: The Project: This chapter explains the methodology and research design used to collect and analyze quantitative data from information security managers to answer the study's research question.
Section 3: Application to Professional Practice and Implications for Change: This chapter presents the findings derived from the survey analysis, discusses theoretical implications, and offers recommendations for IT leaders regarding the strategic implementation of BYOD policies.
Keywords
BYOD, Bring Your Own Device, Information Assurance, Information Security, Compliance, Systems Theory, Quantitative Research, IT Leadership, Risk Management, Mobile Device Management, CISM, Policy Implementation, Security Framework, Data Protection, Organizational Strategy.
Frequently Asked Questions
What is the core focus of this research study?
The study focuses on the implementation challenges of the Bring Your Own Device (BYOD) concept, specifically within the context of information assurance and security in small to medium-sized organizations.
What are the primary thematic areas addressed in the work?
The work covers systems theory application, BYOD implementation strategies, the necessity for robust compliance and security policies, and an analysis of the risks and challenges inherent in personal device usage within business environments.
What is the primary objective or research question?
The study seeks to identify the relationship between information security managers’ intentions, their perceptions of security, and their compliance regarding BYOD implementation.
Which scientific method is utilized in this study?
The author employed a quantitative research method utilizing a non-experimental correlational design, involving surveys distributed to certified information security managers.
What topics are discussed in the main body of the work?
The main body examines existing literature on BYOD, provides an in-depth analysis of systems theory as a theoretical framework, and describes the data collection and statistical analysis procedures used to test research hypotheses.
What are the characterizing keywords for this publication?
The key themes are defined by terms such as BYOD, Information Security, Systems Theory, Compliance, and Organizational Risk Management.
Why are CISM-certified individuals the target population?
The population was limited to CISM-certified information security managers because they possess the demonstrated expertise required to assess complex security threats and the organizational impact of BYOD implementation.
What conclusion did the author reach regarding the relationship between the study variables?
The statistical analysis indicated that the overall regression model was not significant, meaning no direct relationship was found between the combined values of security and compliance and the intent to implement BYOD, although a weak negative correlation was observed between security and compliance.
- Citar trabajo
- Janvan Munyoki (Autor), 2016, The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security, Múnich, GRIN Verlag, https://www.grin.com/document/1324291