The Influence of Technical and Social Factors in Mitigating Threats in a BYOD-Enabled Environment

Author(s):  
Lizzy Oluwatoyin Ofusori ◽  
Prabhakar Rontala Subramaniam

As the adoption of bring your own device (BYOD) phenomenon by businesses and other sectors continues to grow. Employees find it desirable to use their personally owned mobile devices for work without the need to differentiate between their carrier services and their organizations' network. However, this practice makes such businesses vulnerable to various security threats. Nigeria banking institutions, like other businesses globally, have adopted the BYOD phenomenon. However, BYOD trend constitutes heterogeneity, and there is large diversity in mobile devices, hence the risk of corporate data being exposed to threats increases. Thus, this paper investigates the influence of technical and social threats as it relates to BYOD phenomenon in the banking institutions. Data was collected from the employees of four banks in Nigeria that supported BYOD trend. The study found out that there are some security threats that are integrated, and the existing security measures are not sufficient to mitigate those threats. Hence, this study has presented an integrated solution to curb these threats.

Author(s):  
Алексей Леонидович Сердечный ◽  
Глеб Валерьевич Сторожев ◽  
Михаил Андреевич Тарелкин ◽  
Анна Степановна Пахомова

В настоящей статье представлены результаты моделирования способов реализации компьютерных атак на мобильные устройства. Актуальность данной статьи обусловлена отсутствием наработок по формированию методического обеспечения, касающегося моделирования способов реализации компьютерных атак на мобильные устройства, учитывающего их специфику. Предложенные модели способов предназначены для формирования методического обеспечения расчета рисков и выявления оценки защищенности таких систем от актуальных сценариев реализации угроз безопасности информации, которое даёт возможность обоснованного выбора мер защиты. Построение моделей способов реализации компьютерных атак осуществлялось с использованием аппарата сетей Петри на основании сведений, содержащихся в базе данных MITRE ATT&CK. Разработанные модели взаимосвязаны по условиям и последствиям реализации основных технических приёмов, определённых в базе данных ATT&CK и актуальных для мобильных устройств (условия и последствия моделируются позициями сети Петри, а сами технические приёмы - переходами сети Петри). Также в статье затрагиваются вопросы автоматизации и совместной разработки подобных моделей. Проводится сравнительный анализ различных форм представления участков моделируемой сети Петри в контексте удобства процесса её разработки This article presents the results of modeling methods for implementing computer attacks on mobile devices. The relevance of this article is due to the lack of developments in the formation of methodological support for modeling methods for implementing computer attacks on mobile devices, taking into account their specifics. These models are intended for the formation of methodological support for calculating risks and identifying the assessment of the security of such systems from current scenarios of information security threats, which makes it possible to make an informed choice of security measures. The construction of models of ways to implement computer attacks was carried out using the device of Petri nets based on the information contained in the MITRE ATT&CK database. These models are interconnected by the conditions and consequences of the implementation of the main techniques defined in the ATT&CK database and relevant for mobile devices (conditions and consequences are modeled by the positions of the Petri net, and the techniques themselves are modeled by the transitions of the Petri net). In article also addresses the issues of automation and joint development of such models. A comparative analysis of various forms of representation of the sections of the simulated Petri net in the context of the convenience of its development process is carried out.


Author(s):  
Keri K. Stephens

Mobile devices have diffused into work by transitioning from being organizational assets to personal communication tools. This chapter examines the perceptions and practices of diverse types of workers, located around the globe, and reveals the often-hidden complexities surrounding mobile use at work. People can use their mobiles to be productive and connected on the job, but they also face challenges. The shift in control over communication means that organizations have reacted by creating bring-your-own-device-to-work policies, banning their employees from using personal mobiles, and practically forcing workers to provide their own devices and be accessible 24/7. Along the way, workers have had to negotiate with co-workers, managers, clients, friends, strangers, and family concerning how and when they use their mobiles. As they try to build bridges between work and personal life, struggles with self-management and temporal mismatches in the form of reachability can emerge.


Author(s):  
Masoomeh Shabazi ◽  
Mostafa Amini Rarani ◽  
Sharam Tahmasebian ◽  
Maryam Jahanbakhsh

In recent years, the number of people who use mobile devices for business and organizational purposes has increased. This phenomenon is now known as “bring your own device” (BYOD), and it is rapidly entering the health industry, which makes clear the necessity of studying its various dimensions for its implementation and application. Recently, the use of mobile devices is increasing due to the social tendencies of people. Rapid changes in modern gadgets and smartphones have also encouraged organizations to use their mobile devices in the workplace for business purposes, creating related opportunities and challenges. These cases have made the expansion of BYOD inevitable so that the only way to control BYOD’s threats is to accept its process and finally formulate related strategies and policies before using it.


2020 ◽  
pp. 197-218
Author(s):  
Bojana Trivunović ◽  
Olivera Gajić

With the development of mobile technology emerge fundamental changes in all spheres of human endeavor. In education, new methods of remote studying are being developed, with a particular emphasis on "m-learning" (learning with the help of mobile devices). Taking into consideration that mobile devices are one of the fastest-developing forms of technology, the importance of their assistance in the process of teaching and studying has been recognized. The goal of this paper is to introduce the concept of Bring Your Own Device (BYOD) in the context of industry and education as an example of disruptive technology. This concept implies that students bring their own mobile devices to the classroom and use them when learning. Using a descriptive research method and analysis of the relevant bibliography, the authors of the paper distinguish the implications for the change of university practices on the basis of critical analysis of positive and negative consequences of their use, redefined positions of the teachers and the students in the educational process, as well as the modified educational design.


2014 ◽  
Vol 31 (5) ◽  
pp. 14-16 ◽  
Author(s):  
Dheeraj Singh Negi

Purpose – The purpose of this paper is to describe the use of mobile technologies to develop new ways of Libraries and Information Centre. Mobile devices help to connect with patrons. Creating a library application (“app”) or mobile Web site that allows patrons to access library hours, view their library account or even search databases is easier than most people think. The resources below should help libraries begin to plan and implement their own unique mobile presence: analyzing the present usage of mobile devices; providing an overview of devices, providers and features; describing the various activities these devices support for well library use; focusing how libraries and our librarians are responding with services tailored for these devices; and what can be done by libraries in future in this respect”. Design/methodology/approach – Information and Communications Technology continues to expand the boundaries of higher education into the “anytime/anywhere” experiences. Mobile communication is transforming how people search, receive and interact with information on a daily basis. In just a few short years, smart phone ownership has skyrocketed, and popular use of e-readers has been steadily on the rise. These advanced mobile tools provide portable access to the world of information, across boundaries of subject, discipline and industry. Findings – Mobile technology holds great promise for enabling libraries to provide enhanced services in a form users increasingly are demanding. If this promise is to be fully realized, however, libraries will need to conduct analyses and make smart decisions to address the issues outlined above, support staff education and explore partnerships and new funding models, and be prepared to compromise with respect to their traditional information delivery models. Originality/value – The explosion of advanced mobile technology and robust digital information collection capabilities should prompt libraries to examine carefully the ramifications for user privacy. Libraries can maintain their commitment to user privacy without overcompensating by imposing burdensome security measures or annoying interruptions. For example, libraries do not have to show users a privacy statement or security warning every time they want to access information on a mobile device. A single log-in and acceptance of terms of use, similar to the procedures for other mobile applications and services, should suffice. At the same time, libraries can take the opportunity to educate users in best practices with respect to privacy issues associated with the use of mobile devices.


2016 ◽  
Vol 24 (e1) ◽  
pp. e69-e78 ◽  
Author(s):  
Aude Motulsky ◽  
Jenna Wong ◽  
Jean-Pierre Cordeau ◽  
Jorge Pomalaza ◽  
Jeffrey Barkun ◽  
...  

Objective: To describe the usage of a novel application (The FLOW) that allows mobile devices to be used for rounding and handoffs. Materials and Methods: The FLOW provides a view of patient data and the capacity to enter short notes via personal mobile devices. It was deployed using a “bring-your-own-device” model in 4 pilot units. Social network analysis (SNA) was applied to audit trails in order to visualize usage patterns. A questionnaire was used to describe user experience. Results: Overall, 253 health professionals used The FLOW with their personal mobile devices from October 2013 to March 2015. In pediatric and neonatal intensive care units (ICUs), a median of 26–26.5 notes were entered per user per day. Visual network representation of app entries showed that usage patterns were different between the ICUs. In 127 questionnaires (50%), respondents reported using The FLOW most often to enter notes and for handoffs. The FLOW was perceived as having improved patient care by 57% of respondents, compared to usual care. Most respondents (86%) wished to continue using The FLOW. Discussion: This study shows how a handoff and rounding tool was quickly adopted in pediatric and neonatal ICUs in a hospital setting where patient charts were still paper-based. Originally developed as a tool to support informal documentation using smartphones, it was adapted to local practices and expanded to print sign-out documents and import notes within the medicolegal record with desktop computers. Interestingly, even if not supported by the nursing administrative authorities, the level of use for data entry among nurses and doctors was similar in all units, indicating close collaboration in documentation practices in these ICUs.


Author(s):  
Г.С. Мокану

Угрозы информационной безопасности в компьютерных сетях стали одной из основных проблем для владельцев ПК. При этом особое распространение этих угроз коснулось сетей WI-FI, в которых происходит как несанкционированный доступ к данным, так и только снижение уровня защиты сети. Практически все современные мобильные устройства (смартфоны, планшеты, ноутбуки и нетбуки) имеют возможность подключения к беспроводному Интернету или, точнее, к сети WI-FI, эта функция теперь является стандартной для этих устройств. nformation security threats in computer networks have become one of the main problems for PC owners. At the same time, a particular spread of these threats affected WI-FI networks, in which both unauthorized access to data and only a decrease in the level of network protection occur. Almost all modern mobile devices (smartphones, tablets, laptops and netbooks) have the ability to connect to the wireless Internet or, more precisely, to the WI-FI network, this function is now standard for these devices.


Author(s):  
Ieda M. Santos

More and more students are bringing personal mobile devices such as smart phones and iPads to university campuses. Widespread mobile device ownership among students offers Higher Education (HE) institutions with opportunities to explore those devices to support teaching and learning practices. The idea of using students' personal devices is referred to as “Bring Your Own Device,” or BYOD. This chapter examines opportunities and key challenges often discussed in the literature and associated with a BYOD program. Outcomes suggest that a cultural change is necessary to effectively accommodate BYOD in the classroom. The chapter proposes a BYOD joint enterprise consisting of main stakeholders—administrators, faculty, students, and information technology personnel—working together to help minimize the impact of key challenges while maximizing the opportunities afforded by students' everyday mobile devices.


2018 ◽  
pp. 433-449
Author(s):  
Mona Adlakha

Mobile commerce is the next generation of e-commerce, where payments and financial transactions can be carried out with utmost ease using handheld mobile devices. Mobile devices are at a higher security risk due to the large amount of critical financial and personal data available on it. The cause or consequence of these threats could be - malware and spyware attacks; multiple or incorrect m-Commerce payments; breaches due to unauthorized access or disclosure, unauthenticated transactions and risk due to the use of third party networks. This chapter discusses how to manage security risks in m-commerce by first identifying them and then discussing preventive measures for their mitigation. A continuous approach for risk prevention needs to be followed, reviewing the strategy according to the latest challenges. Various risk prevention and mitigation strategies can be adopted. Service providers must follow physical and digital security measures to protect consumer's business information. Independent auditing should ensure compliance with best practice security standards.


2018 ◽  
pp. 1352-1361
Author(s):  
Brian Leonard ◽  
Maurice Dawson

Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so distant past, cyber security has become a forefront subject in the battle against global terrorism. Furthermore, this chapter will examine how mobile devices are not like the devices of the past as the computing power is on par with that of some desktops and the fact that these devices have the ability to execute malicious applications. In addition, this chapter will discuss the reality, significance, legal and practical affects of the fact that suspicious programs are being executed offensively and security based attacks can be performed as well with the use of programs such as Kali Linux running on Android.


Sign in / Sign up

Export Citation Format

Share Document