Enhancing Bring Your Own Device Security in Education

Enhancing Bring Your Own Device Security in Education

Authors

  • Richard Ntwari PhD Scholar, Mbarara University of Science and Technology, Mbarara, Uganda
  • Annabella E. Habinka Associate Professor, Makerere University, Kampala, Uganda
  • Fred Kaggwa Lecturer, Mbarara University of Science and Technology, Mbarara, Uganda

DOI:

https://doi.org/10.55662/JST.2021.2401

Downloads

Keywords:

Bring Your Own Device (BYOD), People Policy Technology (PPT), IEEE Explorer, ACM Digital Library

Abstract

The acceptance and use of personal devices at educational institutions is on the rise, resulting in the education sector’s adoption of Bring Your Own Device (BYOD). The institutions benefit from cost reduction in buying and managing IT devices as users purchase and bring their own devices. Users benefit by accessing learning materials and collaboration anytime, anywhere while on the move via institutional network. However, literature on BYOD indicates that various challenges are faced with usage of BYOD such as loss/stolen devices, malware, lack of policy, user negligence among others. This paper examined the literature in order to identify BYOD challenges, solutions, and guidelines that would inform secure BYOD usage in education.

Downloads

Download data is not yet available.

References

Afreen, R. (2014). Bring your own device (BYOD) in higher education: Opportunities and challenges. International Journal of Emerging Trends & Technology in Computer Science, 3(1), 233-236.

Akande, A. O., & Tran, V. N. (2021). Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations. ICISSP, 55-65. https://doi.org/https://dx.doi.org/10.5220/0010195800550065

https://doi.org/10.5220/0010195800550065

Al-Harthy, I. M., Rahim, F. A., Ali, N., & Singun, A. P. (2019). Theoretical bases of identifying determinants of protection intentions towards bring-your-own-device (BYOD) protection behaviors. 2019 First International Conference of Intelligent Computing and Engineering (ICOICE), 1-9.

https://doi.org/10.1109/ICOICE48418.2019.9035139

Alotaibi, B., & Almagwashi, H. (2018). A review of BYOD security challenges, solutions and policy best practices. 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 1-6. https://doi.org/https://doi.org/10.1109/CAIS.2018.8441967

https://doi.org/10.1109/CAIS.2018.8441967

Amoud, M., & Roudies, O. (2017). Experiences in secure integration of Byod. Proceedings of the 7th International Conference on Information Communication and Management, 127-132.

https://doi.org/10.1145/3134383.3134394

Baillette, P., & Barlette, Y. (2018). BYOD-related innovations and organizational change for entrepreneurs and their employees in SMEs: The identification of a twofold security paradox. Journal of Organizational Change Management.

https://doi.org/10.1108/JOCM-03-2017-0044

Bello, A., Armarego, J., & Murray, D. (2015). A policy-based framework for managing information security and privacy risks in BYOD environments. International Journal of Emerging Trends & Technology in Computer Science, 189-198.

Disterer, G., & Kleiner, C. (2013). BYOD bring your own device. Procedia Technology, 9, 43-53. https://doi.org/https://dx.doi.org/10.1016/j.protcy.2013.12.005

https://doi.org/10.1016/j.protcy.2013.12.005

Gikas, J., & Grant, M. M. (2013). Mobile computing devices in higher education: Student perspectives on learning with cellphones, smartphones & social media. The Internet and Higher Education, 19, 18-26. https://doi.org/https://dx.doi.org/10.1016/j.iheduc.2013.06.002

https://doi.org/10.1016/j.iheduc.2013.06.002

Giwah, A. D. (2018). User information security behavior towards data breach in Bring Your Own Device (BYOD) enabled organizations-leveraging protection motivation theory. SoutheastCon 2018, 1-5. https://doi.org/https://dx.doi.org/10.1109/SECON.2018.8479178

https://doi.org/10.1109/SECON.2018.8479178

Gupta, R., Bhardwaj, G., & Singh, G. (2019). Employee Perception and Behavioral Intention to Adopt BYOD in the Organizations. 2019 International Conference on Automation, Computational and Technology Management (ICACTM), 73-78. https://doi.org/https://doi.org/10.1109/ICACTM.2019.8776815

https://doi.org/10.1109/ICACTM.2019.8776815

Hakami, M. (2020). Using Nearpod as a Tool to Promote Active Learning in Higher Education in a BYOD Learning Environment. Journal of Education and Learning, 9(1), 119-126. https://doi.org/https://dx.doi.org/10.5539/jel.v9n1p119

https://doi.org/10.5539/jel.v9n1p119

Harris, M. A., & Patten, K. P. (2014). Mobile device security considerations for small- and medium-sized enterprise business mobility. In Information Management and Computer Security. https://doi.org/10.1108/IMCS-03-2013-0019

https://doi.org/10.1108/IMCS-03-2013-0019

Harris, M. A., Patten, K., & Regan, E. (2013). The need for BYOD mobile device security awareness and training.

Harris, M. A., Patten, K., Regan, E., & Fjermestad, J. (2012). Mobile and connected device security considerations: A dilemma for small and medium enterprise business mobility?

Kadimo, K., Kebaetse, M. B., Ketshogileng, D., Seru, L. E., Sebina, K. B., Kovarik, C., & Balotlegi, K. (2018). Bring-your-own-device in medical schools and healthcare facilities: a review of the literature. International Journal of Medical Informatics, 119, 94-102. https://doi.org/https://dx.doi.org/10.1016/j.ijmedinf.2018.09.013

https://doi.org/10.1016/j.ijmedinf.2018.09.013

PMid:30342692

Kitchenham, B., Brereton, O. P., Budgen, D., Turner, M., Bailey, J., & Linkman, S. (2009). Systematic literature reviews in software engineering--a systematic literature review. Information and Software Technology, 51(1), 7-15. https://doi.org/https://dx.doi.org/10.1016/j.infsof.2013.02.002

https://doi.org/10.1016/j.infsof.2013.02.002

Madzima, K., Moyo, M., & Abdullah, H. (2014). Is bring your own device an institutional information security risk for small-scale business organisations? 2014 Information Security for South Africa, 1-8.

https://doi.org/10.1109/ISSA.2014.6950497

Masilo, G. M., Simelane-Mnisi, S., Mji, A., & Mokgobu, I. (2021). Students' Behavioural Intention and Challenges to Bring Your Own Device (BYOD) in Higher Education during COVID-19 and Beyond. World Transaction on Engineering and Technology Education, 19(1), 10-15.

Miller, S., & Welsh, K. E. (2017). Bring Your Own Device (BYOD) in higher education: Opportunities and challenges.

Ontech. (2022). 15 BYOD Statistics that May Surprise You. https://ontech.com/byod-statistics/

Palanisamy, R., Norman, A. A., & Mat Kiah, M. L. (2022). BYOD policy compliance: Risks and strategies in organizations. Journal of Computer Information Systems, 62(1), 61-72. https://doi.org/https://dx.doi.org/10.1080/08874417.2019.1703225

https://doi.org/10.1080/08874417.2019.1703225

Ratchford, M., El-Gayar, O., Noteboom, C., & Wang, Y. (2022). BYOD security issues: A systematic literature review. Information Security Journal: A Global Perspective, 31(3), 253-273.

https://doi.org/10.1080/19393555.2021.1923873

Ratchford, M. M., & Wang, Y. (2019). Byod-insure: A security assessment model for enterprise byod. 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ), 1-10.

https://doi.org/10.1109/MOBISECSERV.2019.8686551

Scarfone, K., Mell, P., & others. (2007). Guide to intrusion detection and prevention systems (idps). NIST Special Publication, 800(2007), 94.

https://doi.org/10.6028/NIST.SP.800-94

Schlarman, S. (2001). The people, policy, technology (PPT) model: core elements of the security process. Information Systems Security, 10(5), 1-6. https://doi.org/https://dx.doi.org/10.1201/1086/43315.10.5.20011101/31719.6

https://doi.org/10.1201/1086/43315.10.5.20011101/31719.6

Shumate, T., & Ketel, M. (2014). Bring your own device: Benefits, risks and control techniques. Ieee Southeastcon 2014, 1-6.

https://doi.org/10.1109/SECON.2014.6950718

Souppaya, M., Scarfone, K., & others. (2013). Guidelines for managing the security of mobile devices in the enterprise. NIST Special Publication, 800, 124.

https://doi.org/10.6028/NIST.SP.800-124r1

Souppaya, M., Scarfone, K., & others. (2016). User's Guide to Telework and Bring Your Own Device (BYOD) Security. NIST Special Publication, 800, 114.

https://doi.org/10.6028/NIST.SP.800-114r1

Sundgren, M. (2017). Blurring time and place in higher education with bring your own device applications: a literature review. Education and Information Technologies, 22(6), 3081-3119. https://doi.org/https://dx.doi.org/10.1007/s10639-017-9576-3

https://doi.org/10.1007/s10639-017-9576-3

Wani, T. A., Mendoza, A., & Gray, K. (2019). BYOD in hospitals-security issues and mitigation strategies. Proceedings of the Australasian Computer Science Week Multiconference, 1-10.

https://doi.org/10.1145/3290688.3290729

Zahadat, N., Blessner, P., Blackburn, T., & Olson, B. A. (2015). BYOD security engineering: A framework and its analysis. Computers & Security, 55, 81-99.

https://doi.org/10.1016/j.cose.2015.06.011

Ziemba, E. W., & Eisenbardt, M. (2021). The Effect of the Covid-19 Pandemic on ICT Usage by Academics. Journal of Computer Information Systems, 1-15. https://doi.org/https://dx.doi.org/10.1080/08874417.2021.1992806

https://doi.org/10.1080/08874417.2021.1992806

Downloads

Published

15-11-2021
Citation Metrics
DOI: 10.55662/JST.2021.2401
Published: 15-11-2021

How to Cite

Ntwari, R., A. E. Habinka, and F. Kaggwa. “Enhancing Bring Your Own Device Security in Education”. Journal of Science & Technology, vol. 2, no. 4, Nov. 2021, pp. 1-18, doi:10.55662/JST.2021.2401.
PlumX Metrics

Plaudit

License Terms

Ownership and Licensing:

Authors of this research paper submitted to the Journal of Science & Technology retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.

License Permissions:

Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal of Science & Technology. This license allows for the broad dissemination and utilization of research papers.

Additional Distribution Arrangements:

Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in the Journal of Science & Technology.

Online Posting:

Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal of Science & Technology. Online sharing enhances the visibility and accessibility of the research papers.

Responsibility and Liability:

Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Journal of Science & Technology and The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.

Loading...