A Review of BYOD Security Challenges, Solutions and Policy Best Practices. A Review Paper

被引:0
|
作者
Alotaibi, Bashayer [1 ]
Almagwashi, Haya [1 ]
机构
[1] King Abdulaziz Univ, Dept Informat Syst, Jeddah, Saudi Arabia
关键词
Bring Your Own Device; BYOD Security Challenges; BYOD Security Policy; BYOD Management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, many employees' own smartphones and tablets; where they use these devices in the workplace either for personal use or to perform functional tasks. Perhaps this considered as the main motivation for numerous organization to pay attention to 'bring your own device' business trend; which is related to the use of personal devices for business purposes. For an organization, this brings some opportunities and security risks. The establish of BYOD policies always be a tough task, as an organization needs to avoid security risks and increase employee productivity. However, the associated security risks with BYOD policy can be managed by developing an effective security policy and adopt some technical security control and procedures. This research paper covers the review of current BYOD security challenges and issues, security solutions and policy best practices in organizational perspective. Moreover, a comprehensive security policy model presented and discussed.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Software-as-a-Service Security Challenges and Best Practices: A Multivocal Literature Review
    Humayun, Mamoona
    Niazi, Mahmood
    Almufareh, Maram Fahhad
    Jhanjhi, N. Z.
    Mahmood, Sajjad
    Alshayeb, Mohammad
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (08):
  • [2] A Review on the Security of the Internet of Things: Challenges and Solutions
    Abiodun, Oludare Isaac
    Abiodun, Esther Omolara
    Alawida, Moatsum
    Alkhawaldeh, Rami S.
    Arshad, Humaira
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (03) : 2603 - 2637
  • [3] A Review on the Security of the Internet of Things: Challenges and Solutions
    Oludare Isaac Abiodun
    Esther Omolara Abiodun
    Moatsum Alawida
    Rami S. Alkhawaldeh
    Humaira Arshad
    [J]. Wireless Personal Communications, 2021, 119 : 2603 - 2637
  • [4] BYOD security issues: a systematic literature review
    Ratchford, Melva
    El-Gayar, Omar
    Noteboom, Cherie
    Wang, Yong
    [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (03): : 253 - 273
  • [5] Beyond the DSM story: Ethical quandaries, challenges, and best practices.
    Nicolas, Guerda
    [J]. PSYCHOLOGY OF WOMEN QUARTERLY, 2007, 31 (02) : 224 - 225
  • [6] Epistemological conceptions and teaching practices. A review
    Barron Tirado, Concepcion
    [J]. REDU-REVISTA DE DOCENCIA UNIVERSITARIA, 2015, 13 (01): : 35 - 56
  • [7] Security and Privacy of Internet of Things: A Review of Challenges and Solutions
    Lu, Yujing
    [J]. Journal of Cyber Security and Mobility, 2023, 12 (06): : 813 - 844
  • [8] Harnessing the Challenges and Solutions to Improve Security Warnings: A Review
    Zaaba, Zarul Fitri
    Lim Xin Yi, Christine
    Amran, Ammar
    Omar, Mohd Adib
    [J]. SENSORS, 2021, 21 (21)
  • [9] IoT security: Review, blockchain solutions, and open challenges
    Khan, Minhaj Ahmad
    Salah, Khaled
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 395 - 411
  • [10] Challenges and Best Practices in Information Security Management
    McLaughlin, Mark-David
    Gogan, Janis
    [J]. MIS QUARTERLY EXECUTIVE, 2018, 17 (03) : 237 - 262