scholarly journals BYOD with Security

2019 ◽  
Vol 5 (1) ◽  
pp. 40
Author(s):  
Ulysses Moreira Neves ◽  
Flávio Luis de Mello

<p class="IndexTerms">The concern of companies to keep sensitive data protected from improper access and information leaking has grown a lot. The constant cases of industrial espionage and information leakage regarding companies are an evidence of the need to apply strict information security policies, improve data protection and allow an auditing track. With the evolution of technology, the usage of personal mobile devices increased in organizations (BYOD - Bring Your Own Device), which allows the employees to use their own mobile devices at work. This paper addresses the current challenges faced by IT companies and teams in protecting access to this kind of information, and what strategies are used to mitigate, to track leaks, and reduce the misuse of documents in the organization. Considering the scenario evaluated, a framework with good Information Security practices based on the ISO 27002:2005 and the practical controls of the Center of Internet Security (CIS) is proposed, associating good practices with the needs of BYOD’s culture. The framework suggested in this paper reinforces the necessity for a standardization of the rules of information security in the process of adoption of BYOD’s culture, following the life cycle of the user with his personal mobile device in the company.</p><p class="IndexTerms"> </p><p class="IndexTerms"> </p>

2016 ◽  
Vol 24 (e1) ◽  
pp. e69-e78 ◽  
Author(s):  
Aude Motulsky ◽  
Jenna Wong ◽  
Jean-Pierre Cordeau ◽  
Jorge Pomalaza ◽  
Jeffrey Barkun ◽  
...  

Objective: To describe the usage of a novel application (The FLOW) that allows mobile devices to be used for rounding and handoffs. Materials and Methods: The FLOW provides a view of patient data and the capacity to enter short notes via personal mobile devices. It was deployed using a “bring-your-own-device” model in 4 pilot units. Social network analysis (SNA) was applied to audit trails in order to visualize usage patterns. A questionnaire was used to describe user experience. Results: Overall, 253 health professionals used The FLOW with their personal mobile devices from October 2013 to March 2015. In pediatric and neonatal intensive care units (ICUs), a median of 26–26.5 notes were entered per user per day. Visual network representation of app entries showed that usage patterns were different between the ICUs. In 127 questionnaires (50%), respondents reported using The FLOW most often to enter notes and for handoffs. The FLOW was perceived as having improved patient care by 57% of respondents, compared to usual care. Most respondents (86%) wished to continue using The FLOW. Discussion: This study shows how a handoff and rounding tool was quickly adopted in pediatric and neonatal ICUs in a hospital setting where patient charts were still paper-based. Originally developed as a tool to support informal documentation using smartphones, it was adapted to local practices and expanded to print sign-out documents and import notes within the medicolegal record with desktop computers. Interestingly, even if not supported by the nursing administrative authorities, the level of use for data entry among nurses and doctors was similar in all units, indicating close collaboration in documentation practices in these ICUs.


Author(s):  
Ieda M. Santos

More and more students are bringing personal mobile devices such as smart phones and iPads to university campuses. Widespread mobile device ownership among students offers Higher Education (HE) institutions with opportunities to explore those devices to support teaching and learning practices. The idea of using students' personal devices is referred to as “Bring Your Own Device,” or BYOD. This chapter examines opportunities and key challenges often discussed in the literature and associated with a BYOD program. Outcomes suggest that a cultural change is necessary to effectively accommodate BYOD in the classroom. The chapter proposes a BYOD joint enterprise consisting of main stakeholders—administrators, faculty, students, and information technology personnel—working together to help minimize the impact of key challenges while maximizing the opportunities afforded by students' everyday mobile devices.


2021 ◽  
Vol 9 (SPE3) ◽  
Author(s):  
Antonina Pavlovna Sokolova ◽  
Liliya Yur'evna Gromova ◽  
Irina Victorovna Tekucheva ◽  
Ludmila Borisovna Kocherevskaya ◽  
Elena Grigorievna Dmitrieva

Education is one of the largest markets promoting implementation of Bring Your Own Device BYOD. The BYOD model was originated in colleges and universities, being stimulated by technologically advanced students, who demanded it, and administrators of educational entities, who agreed that allowance to get access to the network using personal devices was a competitive advantage. Nowadays this concept attracts great attention. People depend on their personal devices and want to have the opportunity to use them anywhere in order to make their life simpler and more efficient. While BYOD implementation increases, teachers determine new methods of integration of mobile devices into learning. The use of personal mobile devices of students for learning seems to be attractive for universities, since these devices would help to reduce expenses and to support teaching and learning. The research objective: to detect the level of influence of BYOD concept on learning process. In the conclsuoins authors confirm that BYOD is the dominant model in universities.


2015 ◽  
pp. 1582-1604
Author(s):  
Partha Chakraborty ◽  
Krishnamurthy Raghuraman

Information systems have transitioned from being designed for sophisticated users to systems for general populace. Have information security thoughts evolved likewise? The traditional understanding of security gravitated towards physical/network/platform/security and audit logging mechanisms. This chapter looks into evolution of information security, with the current impetus towards boundary-less enterprises, federated identities, the contemporary standards, and the need for federal governments to be involved in information security, ethics, and privacy concerns. With such a gamut of influencing forces, information security needs to be inbuilt with SDLC as a natural process rather than as an afterthought. This chapter covers information security trends in relation to cloud, mobile devices, and Bring Your Own Device. Convergence of information security with risk management and business process continuity is discussed. The authors indicate a few emerging research topics in the field of information security and outline the trends for future.


Author(s):  
Partha Chakraborty ◽  
Krishnamurthy Raghuraman

Information systems have transitioned from being designed for sophisticated users to systems for general populace. Have information security thoughts evolved likewise? The traditional understanding of security gravitated towards physical/network/platform/security and audit logging mechanisms. This chapter looks into evolution of information security, with the current impetus towards boundary-less enterprises, federated identities, the contemporary standards, and the need for federal governments to be involved in information security, ethics, and privacy concerns. With such a gamut of influencing forces, information security needs to be inbuilt with SDLC as a natural process rather than as an afterthought. This chapter covers information security trends in relation to cloud, mobile devices, and Bring Your Own Device. Convergence of information security with risk management and business process continuity is discussed. The authors indicate a few emerging research topics in the field of information security and outline the trends for future.


2020 ◽  
Vol 28 (2) ◽  
pp. 1-28 ◽  
Author(s):  
Paméla Baillette ◽  
Yves Barlette

Bring Your Own Device (BYOD) refers to the provision and use of personal mobile devices by employees for both private and business purposes. Although there has been research on BYOD, little attention has been paid to employees' perception of threats to their personal information security (ISS) when using a BYOD, especially in a professional context. This article investigates employee coping strategies related to BYOD ISS threats in France. The results of a survey of 223 employees indicate that while perceived behavioral control exerts only direct effects on problem-focused (i.e., disturbance handling) and emotion-focused (i.e., self-preservation) coping strategies, ISS concern exhibits significant direct and moderating influences. Several security paradoxes could be identified, namely, discrepancies between the respondents' ISS concern and the adopted coping strategies. This article offers the first insights into the French context and can serve as a basis for comparisons in future research and to help improve employees' personal ISS in the professional context.


2015 ◽  
pp. 1932-1949
Author(s):  
Ieda M. Santos

More and more students are bringing personal mobile devices such as smart phones and iPads to university campuses. Widespread mobile device ownership among students offers Higher Education (HE) institutions with opportunities to explore those devices to support teaching and learning practices. The idea of using students' personal devices is referred to as “Bring Your Own Device,” or BYOD. This chapter examines opportunities and key challenges often discussed in the literature and associated with a BYOD program. Outcomes suggest that a cultural change is necessary to effectively accommodate BYOD in the classroom. The chapter proposes a BYOD joint enterprise consisting of main stakeholders—administrators, faculty, students, and information technology personnel—working together to help minimize the impact of key challenges while maximizing the opportunities afforded by students' everyday mobile devices.


Author(s):  
EunWon Lee ◽  
GyeongAe Seomun

Background: Healthcare information includes sensitive data and, as such, must be secure; however, the risk of healthcare information leakage is increasing. Nurses manage healthcare information in hospitals; however, previous studies have either been conducted on medical workers from various other occupations or have not synthesized various factors. The purpose of this study was to create and prove a model of nurses’ healthcare information security (HIS). The hypothetical model used in this study was constructed on the basis of the protection motivation theory (PMT) proposed by Rogers. Methods: A total of 252 questionnaires scored using a five-point Likert scale were analyzed, incorporating data from nurses who had been working for more than one month in general hospitals with more than 300 beds in South Korea. The survey was conducted over a total of 30 days, from 1 to 30 September 2019. Results: The results showed that coping appraisal significantly influence HIS intentions (estimate = −1.477, p < 0.01), whereas HIS intentions significantly influence HIS behavior (estimate = 0.515, p < 0.001). A moderating effect on the association between coping appraisal and HIS intentions was found in the group of nurses who had been working for <5 years (estimate = −1.820, p < 0.05). Moreover, a moderating effect on the association between HIS intentions and HIS behavior was found in the group of nurses who had been working for <5 years (estimate = 0.600, p < 0.001). Conclusion: The results of this study can be used to develop a management plan to strengthen nurses’ HIS behavior and can be used by nursing managers as a basis for developing education programs.


Author(s):  
Paméla Baillette ◽  
Yves Barlette

Bring Your Own Device (BYOD) refers to the provision and use of personal mobile devices by employees for both private and business purposes. Although there has been research on BYOD, little attention has been paid to employees' perception of threats to their personal information security (ISS) when using a BYOD, especially in a professional context. This article investigates employee coping strategies related to BYOD ISS threats in France. The results of a survey of 223 employees indicate that while perceived behavioral control exerts only direct effects on problem-focused (i.e., disturbance handling) and emotion-focused (i.e., self-preservation) coping strategies, ISS concern exhibits significant direct and moderating influences. Several security paradoxes could be identified, namely, discrepancies between the respondents' ISS concern and the adopted coping strategies. This article offers the first insights into the French context and can serve as a basis for comparisons in future research and to help improve employees' personal ISS in the professional context.


Sign in / Sign up

Export Citation Format

Share Document