scholarly journals Bring Your Own Device (BYOD) Also Brings New Security Challenges

Author(s):  
Harrison Carranza ◽  
Aparicio Carranza ◽  
Syed Zaidi
10.2196/18175 ◽  
2020 ◽  
Vol 8 (6) ◽  
pp. e18175 ◽  
Author(s):  
Tafheem Ahmad Wani ◽  
Antonette Mendoza ◽  
Kathleen Gray

Background As familiarity with and convenience of using personal devices in hospitals help improve the productivity, efficiency, and workflow of hospital staff, the health care bring-your-own-device (BYOD) market is growing consistently. However, security concerns owing to the lack of control over the personal mobile devices of staff, which may contain sensitive data such as personal health information of patients, make it one of the biggest health care information technology (IT) challenges for hospital administrations. Objective Given that the hospital BYOD security has not been adequately addressed in peer-reviewed literature, the aim of this paper was to identify key security challenges associated with hospital BYOD usage as well as relevant solutions that can cater to the identified issues by reviewing gray literature. Therefore, this research will provide additional practical insights from current BYOD practices. Methods A comprehensive gray literature review was conducted, which followed the stepwise guidelines and quality assessment criteria set out by Garousi et al. The searched literature included tier 1 sources such as health care cybersecurity market reports, white papers, guidelines, policies, and frameworks as well as tier 2 sources such as credible and reputed health IT magazines, databases, and news articles. Moreover, a deductive thematic analysis was conducted to organize the findings based on Schlarman’s People Policy Technology model, promoting a holistic understanding of hospitals’ BYOD security issues and solutions. Results A total of 51 sources were found to match the designed eligibility criteria. From these studies, several sociotechnical issues were identified. The major challenges identified were the use of devices with insufficient security controls by hospital staff, lack of control or visibility for the management to maintain security requirements, lack of awareness among hospital staff, lack of direction or guidance for BYOD usage, poor user experience, maintenance of legal requirements, shortage of cybersecurity skills, and loss of devices. Although technologies such as mobile device management, unified endpoint management, containerization, and virtual private network allow better BYOD security management in hospitals, policies and people management measures such as strong security culture and staff awareness and training improve staff commitment in protecting hospital data. Conclusions The findings suggest that to optimize BYOD security management in hospitals, all 3 dimensions of the security process (people, policy, and technology) need to be given equal emphasis. As the nature of cybersecurity attacks is becoming more complex, all dimensions should work in close alignment with each other. This means that with the modernization of BYOD technology, BYOD strategy, governance, education, and relevant policies and procedures also need to adapt accordingly.


2020 ◽  
Author(s):  
Tafheem Ahmad Wani ◽  
Antonette Mendoza ◽  
Kathleen Gray

BACKGROUND As familiarity with and convenience of using personal devices in hospitals help improve the productivity, efficiency, and workflow of hospital staff, the health care bring-your-own-device (BYOD) market is growing consistently. However, security concerns owing to the lack of control over the personal mobile devices of staff, which may contain sensitive data such as personal health information of patients, make it one of the biggest health care information technology (IT) challenges for hospital administrations. OBJECTIVE Given that the hospital BYOD security has not been adequately addressed in peer-reviewed literature, the aim of this paper was to identify key security challenges associated with hospital BYOD usage as well as relevant solutions that can cater to the identified issues by reviewing gray literature. Therefore, this research will provide additional practical insights from current BYOD practices. METHODS A comprehensive gray literature review was conducted, which followed the stepwise guidelines and quality assessment criteria set out by Garousi et al. The searched literature included tier 1 sources such as health care cybersecurity market reports, white papers, guidelines, policies, and frameworks as well as tier 2 sources such as credible and reputed health IT magazines, databases, and news articles. Moreover, a deductive thematic analysis was conducted to organize the findings based on Schlarman’s People Policy Technology model, promoting a holistic understanding of hospitals’ BYOD security issues and solutions. RESULTS A total of 51 sources were found to match the designed eligibility criteria. From these studies, several sociotechnical issues were identified. The major challenges identified were the use of devices with insufficient security controls by hospital staff, lack of control or visibility for the management to maintain security requirements, lack of awareness among hospital staff, lack of direction or guidance for BYOD usage, poor user experience, maintenance of legal requirements, shortage of cybersecurity skills, and loss of devices. Although technologies such as mobile device management, unified endpoint management, containerization, and virtual private network allow better BYOD security management in hospitals, policies and people management measures such as strong security culture and staff awareness and training improve staff commitment in protecting hospital data. CONCLUSIONS The findings suggest that to optimize BYOD security management in hospitals, all 3 dimensions of the security process (people, policy, and technology) need to be given equal emphasis. As the nature of cybersecurity attacks is becoming more complex, all dimensions should work in close alignment with each other. This means that with the modernization of BYOD technology, BYOD strategy, governance, education, and relevant policies and procedures also need to adapt accordingly.


Author(s):  
I. V. Kharlamenko ◽  
V. V. Vonog

The article is devoted to control and feedback in foreign language teaching in a technogenic environment. The educational process is transformed in terms of the implementation and active use of digital technologies. ICT-rich environment provides new models of interaction between the teacher, students and digital tools. It also enriches the diversity of tasks and expands the range of possible forms of control and feedback. According to the authors, automated evaluation takes place both in out-of-classroom activities and directly in the classroom using Bring Your Own Device technology (BYOD). Automated control contributes to the intensity of the educational process. It provides all the participants with an opportunity to choose a convenient mode of work and get instant feedback, thereby allowing self-assessment and self-reflection of their own actions. When teaching foreign languages, special attention should be paid to chatbot technology. Chatbots imitate human actions and are able to perform standard repetitive tasks. The growing popularity of bots is explained by a wide range of usage spheres and the ability to integrate chatbots into social networks and mobile technologies. In the technogenic educational environment, ICT can be the basis for interaction, co-editing and peer assessment in collaborative projects. In this case, students receive feedback not only from the teacher, but also from other students, which increases the motivation for independent learning. Thus, automated control, self-assessment and peer assessment can both identify problem areas for each student and design an individual learning path, which increases the effectiveness of learning a foreign language.


Author(s):  
Ju. M. Tsarapkina ◽  
N. V. Dunaeva ◽  
A. M. Kireicheva

The article describes the use of BYOD technology (Bring Your Own Device) in educational practice using the Lecture Racing mobile application. This application provides feedback between the teacher and students both in the classroom and during distance learning, contributes to the visualization of educational material and, in general, the informatization of the educational process. The purpose of the study is to conduct a theoretical analysis of the current state and prospects for the development of BYOD technology in Russia and abroad, and to test the benefits of using this technology in educational practice using the specific mobile application. During the study, an analysis of scientific, theoretical and practical literature on BYOD technology was carried out. In the process of experimental work, test tasks were the instrument of measuring knowledge and skills of students. As a result of a theoretical analysis and study of the practical possibilities of using BYOD technology (using the Lecture Racing mobile application as an example), it was found that this technology allows you to visualize information that is displayed in real time on the screen of each student's mobile device, regardless of its location. This technology also allows both the student and the teacher to quickly work with information, provide feedback, receive an independent assessment (since the assessment is set automatically), saves time, and develops the information culture of students.


2018 ◽  
Vol 42 ◽  
pp. 316-321
Author(s):  
Boris I. Ananyev ◽  
Daniil A. Parenkov

The aim of the article is to show the role of parliament in the foreign policy within the framework of the conservative school of thought. The authors examine both Russian and Western traditions of conservatism and come to the conclusion that the essential idea of “the rule of the best” has turned to be one of the basic elements of the modern legislative body per se. What’s more, parliament, according to the conservative approach, tends to be the institution that represents the real spirit of the nation and national interests. Therefore the interaction of parliaments on the international arena appears to be the form of the organic communication between nations. Parliamentary diplomacy today is the tool that has the potential to address to the number of issues that are difficult to deal with within the framework of the traditional forms of IR: international security, challenges posed by new technologies, international sanctions and other.


2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


2018 ◽  
Vol 6 (7) ◽  
pp. 981-985
Author(s):  
Dinesh Singh ◽  
Dayanand . ◽  
Arushi Arya
Keyword(s):  
Big Data ◽  

2018 ◽  
Vol 6 (5) ◽  
pp. 906-915
Author(s):  
Swati Agarwal ◽  
◽  
◽  
◽  
Rupinder Kaur ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document