Review of the information security and privacy challenges in bring your own device (BYOD) environments

Abubakar Bello, Jocelyn Armarego, David Murray, William Kenworthy

Research output: Contribution to journalArticle (journal)peer-review

Abstract

With increasing development and adoption of information and communication technology initiatives internationally, evolving trends such as bring your own device (BYOD) is rapidly changing operational methods of organizations in attempt to improve efficiency and productivity. However, for organizations to successfully benefit from BYOD, several dynamics relating to security and privacy in BYOD environments must be examined and understood. This article reviews information security and privacy, mobile computing, and current organizational practices that shed light on BYOD and the issues behind its adoption. The review will assist organizations and IT professionals to understand the increasing demands of BYOD, and its challenges.
Original languageEnglish
Pages (from-to)38-54
Number of pages17
JournalJournal of Information Privacy and Security
Volume11
Issue number1
DOIs
Publication statusPublished - 24 Mar 2015

Keywords

  • Information Security
  • Privacy Challenges
  • Bring Your Own Device (BYOD) Environments

Fingerprint

Dive into the research topics of 'Review of the information security and privacy challenges in bring your own device (BYOD) environments'. Together they form a unique fingerprint.

Cite this