Enhancing Bring Your Own Device Security in Education
DOI:
https://doi.org/10.55662/JST.2021.2401Downloads
Keywords:
Bring Your Own Device (BYOD), People Policy Technology (PPT), IEEE Explorer, ACM Digital LibraryAbstract
The acceptance and use of personal devices at educational institutions is on the rise, resulting in the education sector’s adoption of Bring Your Own Device (BYOD). The institutions benefit from cost reduction in buying and managing IT devices as users purchase and bring their own devices. Users benefit by accessing learning materials and collaboration anytime, anywhere while on the move via institutional network. However, literature on BYOD indicates that various challenges are faced with usage of BYOD such as loss/stolen devices, malware, lack of policy, user negligence among others. This paper examined the literature in order to identify BYOD challenges, solutions, and guidelines that would inform secure BYOD usage in education.
Downloads
References
Afreen, R. (2014). Bring your own device (BYOD) in higher education: Opportunities and challenges. International Journal of Emerging Trends & Technology in Computer Science, 3(1), 233-236.
Akande, A. O., & Tran, V. N. (2021). Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations. ICISSP, 55-65. https://doi.org/https://dx.doi.org/10.5220/0010195800550065
https://doi.org/10.5220/0010195800550065
Al-Harthy, I. M., Rahim, F. A., Ali, N., & Singun, A. P. (2019). Theoretical bases of identifying determinants of protection intentions towards bring-your-own-device (BYOD) protection behaviors. 2019 First International Conference of Intelligent Computing and Engineering (ICOICE), 1-9.
https://doi.org/10.1109/ICOICE48418.2019.9035139
Alotaibi, B., & Almagwashi, H. (2018). A review of BYOD security challenges, solutions and policy best practices. 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 1-6. https://doi.org/https://doi.org/10.1109/CAIS.2018.8441967
https://doi.org/10.1109/CAIS.2018.8441967
Amoud, M., & Roudies, O. (2017). Experiences in secure integration of Byod. Proceedings of the 7th International Conference on Information Communication and Management, 127-132.
https://doi.org/10.1145/3134383.3134394
Baillette, P., & Barlette, Y. (2018). BYOD-related innovations and organizational change for entrepreneurs and their employees in SMEs: The identification of a twofold security paradox. Journal of Organizational Change Management.
https://doi.org/10.1108/JOCM-03-2017-0044
Bello, A., Armarego, J., & Murray, D. (2015). A policy-based framework for managing information security and privacy risks in BYOD environments. International Journal of Emerging Trends & Technology in Computer Science, 189-198.
Disterer, G., & Kleiner, C. (2013). BYOD bring your own device. Procedia Technology, 9, 43-53. https://doi.org/https://dx.doi.org/10.1016/j.protcy.2013.12.005
https://doi.org/10.1016/j.protcy.2013.12.005
Gikas, J., & Grant, M. M. (2013). Mobile computing devices in higher education: Student perspectives on learning with cellphones, smartphones & social media. The Internet and Higher Education, 19, 18-26. https://doi.org/https://dx.doi.org/10.1016/j.iheduc.2013.06.002
https://doi.org/10.1016/j.iheduc.2013.06.002
Giwah, A. D. (2018). User information security behavior towards data breach in Bring Your Own Device (BYOD) enabled organizations-leveraging protection motivation theory. SoutheastCon 2018, 1-5. https://doi.org/https://dx.doi.org/10.1109/SECON.2018.8479178
https://doi.org/10.1109/SECON.2018.8479178
Gupta, R., Bhardwaj, G., & Singh, G. (2019). Employee Perception and Behavioral Intention to Adopt BYOD in the Organizations. 2019 International Conference on Automation, Computational and Technology Management (ICACTM), 73-78. https://doi.org/https://doi.org/10.1109/ICACTM.2019.8776815
https://doi.org/10.1109/ICACTM.2019.8776815
Hakami, M. (2020). Using Nearpod as a Tool to Promote Active Learning in Higher Education in a BYOD Learning Environment. Journal of Education and Learning, 9(1), 119-126. https://doi.org/https://dx.doi.org/10.5539/jel.v9n1p119
https://doi.org/10.5539/jel.v9n1p119
Harris, M. A., & Patten, K. P. (2014). Mobile device security considerations for small- and medium-sized enterprise business mobility. In Information Management and Computer Security. https://doi.org/10.1108/IMCS-03-2013-0019
https://doi.org/10.1108/IMCS-03-2013-0019
Harris, M. A., Patten, K., & Regan, E. (2013). The need for BYOD mobile device security awareness and training.
Harris, M. A., Patten, K., Regan, E., & Fjermestad, J. (2012). Mobile and connected device security considerations: A dilemma for small and medium enterprise business mobility?
Kadimo, K., Kebaetse, M. B., Ketshogileng, D., Seru, L. E., Sebina, K. B., Kovarik, C., & Balotlegi, K. (2018). Bring-your-own-device in medical schools and healthcare facilities: a review of the literature. International Journal of Medical Informatics, 119, 94-102. https://doi.org/https://dx.doi.org/10.1016/j.ijmedinf.2018.09.013
https://doi.org/10.1016/j.ijmedinf.2018.09.013
PMid:30342692
Kitchenham, B., Brereton, O. P., Budgen, D., Turner, M., Bailey, J., & Linkman, S. (2009). Systematic literature reviews in software engineering--a systematic literature review. Information and Software Technology, 51(1), 7-15. https://doi.org/https://dx.doi.org/10.1016/j.infsof.2013.02.002
https://doi.org/10.1016/j.infsof.2013.02.002
Madzima, K., Moyo, M., & Abdullah, H. (2014). Is bring your own device an institutional information security risk for small-scale business organisations? 2014 Information Security for South Africa, 1-8.
https://doi.org/10.1109/ISSA.2014.6950497
Masilo, G. M., Simelane-Mnisi, S., Mji, A., & Mokgobu, I. (2021). Students' Behavioural Intention and Challenges to Bring Your Own Device (BYOD) in Higher Education during COVID-19 and Beyond. World Transaction on Engineering and Technology Education, 19(1), 10-15.
Miller, S., & Welsh, K. E. (2017). Bring Your Own Device (BYOD) in higher education: Opportunities and challenges.
Ontech. (2022). 15 BYOD Statistics that May Surprise You. https://ontech.com/byod-statistics/
Palanisamy, R., Norman, A. A., & Mat Kiah, M. L. (2022). BYOD policy compliance: Risks and strategies in organizations. Journal of Computer Information Systems, 62(1), 61-72. https://doi.org/https://dx.doi.org/10.1080/08874417.2019.1703225
https://doi.org/10.1080/08874417.2019.1703225
Ratchford, M., El-Gayar, O., Noteboom, C., & Wang, Y. (2022). BYOD security issues: A systematic literature review. Information Security Journal: A Global Perspective, 31(3), 253-273.
https://doi.org/10.1080/19393555.2021.1923873
Ratchford, M. M., & Wang, Y. (2019). Byod-insure: A security assessment model for enterprise byod. 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ), 1-10.
https://doi.org/10.1109/MOBISECSERV.2019.8686551
Scarfone, K., Mell, P., & others. (2007). Guide to intrusion detection and prevention systems (idps). NIST Special Publication, 800(2007), 94.
https://doi.org/10.6028/NIST.SP.800-94
Schlarman, S. (2001). The people, policy, technology (PPT) model: core elements of the security process. Information Systems Security, 10(5), 1-6. https://doi.org/https://dx.doi.org/10.1201/1086/43315.10.5.20011101/31719.6
https://doi.org/10.1201/1086/43315.10.5.20011101/31719.6
Shumate, T., & Ketel, M. (2014). Bring your own device: Benefits, risks and control techniques. Ieee Southeastcon 2014, 1-6.
https://doi.org/10.1109/SECON.2014.6950718
Souppaya, M., Scarfone, K., & others. (2013). Guidelines for managing the security of mobile devices in the enterprise. NIST Special Publication, 800, 124.
https://doi.org/10.6028/NIST.SP.800-124r1
Souppaya, M., Scarfone, K., & others. (2016). User's Guide to Telework and Bring Your Own Device (BYOD) Security. NIST Special Publication, 800, 114.
https://doi.org/10.6028/NIST.SP.800-114r1
Sundgren, M. (2017). Blurring time and place in higher education with bring your own device applications: a literature review. Education and Information Technologies, 22(6), 3081-3119. https://doi.org/https://dx.doi.org/10.1007/s10639-017-9576-3
https://doi.org/10.1007/s10639-017-9576-3
Wani, T. A., Mendoza, A., & Gray, K. (2019). BYOD in hospitals-security issues and mitigation strategies. Proceedings of the Australasian Computer Science Week Multiconference, 1-10.
https://doi.org/10.1145/3290688.3290729
Zahadat, N., Blessner, P., Blackburn, T., & Olson, B. A. (2015). BYOD security engineering: A framework and its analysis. Computers & Security, 55, 81-99.
https://doi.org/10.1016/j.cose.2015.06.011
Ziemba, E. W., & Eisenbardt, M. (2021). The Effect of the Covid-19 Pandemic on ICT Usage by Academics. Journal of Computer Information Systems, 1-15. https://doi.org/https://dx.doi.org/10.1080/08874417.2021.1992806
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Richard Ntwari, Annabella E. Habinka & Fred Kaggwa
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the journal owned and operated by The Science Brigade Group retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in this Journal.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.
Plaudit
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the Journal of Science & Technology retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal of Science & Technology. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in the Journal of Science & Technology.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal of Science & Technology. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Journal of Science & Technology and The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.