Grin logo
de en es fr
Shop
GRIN Website
Publicación mundial de textos académicos
Go to shop › Informática - Informatica de negocios

The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security

Título: The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security

Tesis Doctoral / Disertación , 2016 , 136 Páginas , Calificación: 3.923

Autor:in: Janvan Munyoki (Autor)

Informática - Informatica de negocios
Extracto de texto & Detalles   Leer eBook
Resumen Extracto de texto Detalles

Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum, with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers.

This correlational study used the systems theory framework to examine the relationship between information security managers’ intentions, perceptions of security, and compliance regarding BYOD implementation. Participants of the study consisted of information security managers in Kenya who had obtained the Certified Information Systems Manager certification. Data was collected from 54 information security managers through a survey instrument. The survey instrument integrated three other instruments with proven reliability developed by other researchers.

Data was analyzed using a multiple regression analysis to test for a relationship between the variables of the study (security, compliance, and intent to implement BYOD). The multiple regression conducted in this study was insignificant, indicating a relationship did not exist between the study’s variables (F(2, 86) = 0.33, p = .718, R2 = .00). A significant negative relationship was found between security and compliance, indicating a weakly negative correlation (r = -.26, p = .016).

Using the results from the study, information technology leaders may be able to develop strategies from which to implement BYOD successfully. Implications for social change include increased knowledge of securing personal devices for employees and consumers in general and reduction in costs associated with security and data breaches.

Extracto


Table of Contents

Section 1: Foundation of the Study

Background of the Problem

Problem Statement

Purpose Statement

Nature of the Study

Research Question and Hypotheses

Theoretical Framework

Operational Definitions

Assumptions, Limitations, and Delimitations

Assumptions

Limitations

Delimitations

Significance of the Study

Contribution to Information Technology Practice

Implications for Social Change

A Review of the Professional and Academic Literature

Systems Theory

Evolution of Systems Theory

Application of Systems Theory

Supporting Theories

Contrasting Theories

Bring Your Own Device Implementation

Bring Your Own Device Overview

Benefits of Bring Your Own Device

Security Challenges of Bring Your Own Device Implementation

Compliance

The Need for a Bring Your Own Device Policy

Employees’ Compliance with Policies

Security

Information Security Risk Management

Potential Impact to an Organization

Bring Your Own Device Security Challenges

Bring Your Own Device Security Framework

Gap in the Literature

Transition and Summary

Section 2: The Project

Purpose Statement

Role of the Researcher

Participants

Research Method and Design

Method

Research Design

Population and Sampling

Ethical Research

Data Collection

Instruments

Data Collection Technique

Data Organization Techniques

Data Analysis Techniques

Reliability and Validity

Reliability

Validity

Transition and Summary

Section 3: Application to Professional Practice and Implications for Change

Overview of Study

Presentation of the Findings

Data Management Procedures

Reliability Analysis

Descriptive Statistics

Analysis

Assumptions

Summary

Theoretical Conversation on Findings

Applications to Professional Practice

Implications for Social Change

Recommendations for Action

Recommendations for Further Study

Reflections

Summary and Study Conclusions

References

Objectives & Research Themes

This study aims to examine the implementation challenges of Bring Your Own Device (BYOD) concepts within small to medium-sized organizations in Kenya, focusing specifically on the correlation between security, compliance, and the intent to implement BYOD among certified information security managers.

  • Systems theory as a foundational framework for analyzing BYOD security.
  • Evaluation of security risks, compliance requirements, and policy challenges in BYOD environments.
  • Quantitative analysis of correlations between security perceptions, compliance levels, and BYOD implementation intent.
  • Development of strategic insights and recommendations for IT leaders to facilitate successful BYOD implementation.

Excerpt from the Book

Section 1: Foundation of the Study

The use of personal mobile devices in the workplace is gaining prominence and acceptance as many people are using their personal devices to conduct certain aspects of their work (Waterfill and Dilworth, 2014). A bring your own device (BYOD) policy affords the opportunity of using a single personal device for (a) anything, personal and business use; (b) anywhere, mobile use through the Internet or wireless LAN (WLAN); and (c) anytime, working hours and off-duty hours (Disterer & Kleiner, 2013). BYOD benefits such as cost savings, increased productivity, and improved efficiency are factors in its’ gaining popularity and acceptance (Fiorenza, 2013).

While BYOD affords several opportunities and benefits, there are also challenges. The issues of managing security for BYOD, defining what is acceptable use for employees and organizations, and data retrieval from personal devices are key concerns for organizations that have implemented BYOD or are contemplating implementation (Waterfill and Dilworth, 2014; de las Cuevas et al., 2015) Privacy and legal concerns are also issues that need to be addressed from a strategic perspective to ensure a successful BYOD program as BYOD involves both organizational data and employees’ private data residing on a personal device (Peretti & Sarkisian, 2014). A comprehensive BYOD security framework that encompasses people, policy, management, and technology should be developed to address security concerns and ensure organizations can realize the benefits afforded by BYOD (Zahadat, Blessner, Blackburn, & Olson, 2015).

Summary of Chapters

Section 1: Foundation of the Study: This chapter provides an introduction to the BYOD phenomenon, discussing its rise in popularity, associated benefits, and critical security and compliance challenges, while establishing systems theory as the primary theoretical framework.

Section 2: The Project: This chapter explains the methodology and research design used to collect and analyze quantitative data from information security managers to answer the study's research question.

Section 3: Application to Professional Practice and Implications for Change: This chapter presents the findings derived from the survey analysis, discusses theoretical implications, and offers recommendations for IT leaders regarding the strategic implementation of BYOD policies.

Keywords

BYOD, Bring Your Own Device, Information Assurance, Information Security, Compliance, Systems Theory, Quantitative Research, IT Leadership, Risk Management, Mobile Device Management, CISM, Policy Implementation, Security Framework, Data Protection, Organizational Strategy.

Frequently Asked Questions

What is the core focus of this research study?

The study focuses on the implementation challenges of the Bring Your Own Device (BYOD) concept, specifically within the context of information assurance and security in small to medium-sized organizations.

What are the primary thematic areas addressed in the work?

The work covers systems theory application, BYOD implementation strategies, the necessity for robust compliance and security policies, and an analysis of the risks and challenges inherent in personal device usage within business environments.

What is the primary objective or research question?

The study seeks to identify the relationship between information security managers’ intentions, their perceptions of security, and their compliance regarding BYOD implementation.

Which scientific method is utilized in this study?

The author employed a quantitative research method utilizing a non-experimental correlational design, involving surveys distributed to certified information security managers.

What topics are discussed in the main body of the work?

The main body examines existing literature on BYOD, provides an in-depth analysis of systems theory as a theoretical framework, and describes the data collection and statistical analysis procedures used to test research hypotheses.

What are the characterizing keywords for this publication?

The key themes are defined by terms such as BYOD, Information Security, Systems Theory, Compliance, and Organizational Risk Management.

Why are CISM-certified individuals the target population?

The population was limited to CISM-certified information security managers because they possess the demonstrated expertise required to assess complex security threats and the organizational impact of BYOD implementation.

What conclusion did the author reach regarding the relationship between the study variables?

The statistical analysis indicated that the overall regression model was not significant, meaning no direct relationship was found between the combined values of security and compliance and the intent to implement BYOD, although a weak negative correlation was observed between security and compliance.

Final del extracto de 136 páginas  - subir

Detalles

Título
The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security
Universidad
Capella University  (School of Technology)
Curso
PHD in Information Technology
Calificación
3.923
Autor
Janvan Munyoki (Autor)
Año de publicación
2016
Páginas
136
No. de catálogo
V1324291
ISBN (PDF)
9783346825209
ISBN (Libro)
9783346825216
Idioma
Inglés
Etiqueta
implementation challenges bring your device concept byod relation information assurance security
Seguridad del producto
GRIN Publishing Ltd.
Citar trabajo
Janvan Munyoki (Autor), 2016, The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security, Múnich, GRIN Verlag, https://www.grin.com/document/1324291
Leer eBook
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
Extracto de  136  Páginas
Grin logo
  • Grin.com
  • Envío
  • Contacto
  • Privacidad
  • Aviso legal
  • Imprint