1,490 research outputs found

    BYOD adoption concerns in the South African financial institution sector

    Get PDF
    Bring Your Own Device (BYOD) is an emerging trend and practice that is growing in use in many organizations. There is however very limited literature on BYOD in the context of financial institutions from a developing country perspective. The dearth of such studies is problematic because financial institutions deal with a lot of sensitive and confidential information and therefore their adoption of BYOD could be detrimental to their practice. This study contributes to this gap in literature by providing empirical observation that show how technological and contextual factors affect financial institutions adoption of BYOD. Following a qualitative approach, and using semi structured interviews as a source of data collection; the findings show that cost, complexity, a culture of innovation, and top management support were factors that were perceived as enablers of BYOD. South African organizations in the financial services use BYOD to help add value to their work as opposed to it being a cost saving necessity. However, the continuous changes in government regulation regarding the use of data; and the lack of conducive ICT infrastructure were deemed as hindrances to BYOD. As a result of the changing regulations and the lack of knowhow on implementation of these regulations, most organizations failed to formalize their BYOD strategies

    Bring Your Own Device (BYOD) adoption in South African SMEs

    Get PDF
    The advancement in technological development is now altering the conventional order in the diffusion of IT innovation from a top-down approach (organisation to employees) to a bottom-up approach (employees to organisation). This change is more notable in developed economies and has led to the Bring Your Own Device (BYOD) phenomenon which promises increased productivity for employees and their organisations. There have been several studies on the corporate adoption of BYOD but few have investigated the phenomenon from a small and medium enterprise (SME) perspective and from developing countries specifically. This study investigated the BYOD phenomenon in South African SMEs. The goal was to identify contextual factors influencing BYOD adoption with the purpose of understanding how these factors shaped and reshaped by SME actions. The Perceived EReadiness Model (PERM) was adopted to unearth contextual BYOD adoption factors, while the Structuration Theory was adopted as the theoretical lens from which the social construction of the BYOD phenomenon was understood. The study adopted an interpretive stance and was qualitative in nature. Data was collected from SMEs using semi-structured interviews, and analysed using a thematic analysis approach. The findings show that for BYOD to be adopted and institutionalized in an SME there needs to be organisational readiness in terms of awareness, management support, business resources, human resources, employees' pressure, formal governance, and technological readiness. Specifically, business resources, management support and technological readiness were perceived to be of the outmost importance to the success of BYOD. Environmental factors of market forces, support from industry, government readiness and the sociocultural factor are identified. Findings from the structuration analysis reports the presence of rules and resources (structures) which SMEs draw upon in their BYOD actions and interactions. It provides understanding on the guiding structures such as "no training" and "no formal governance" within which BYOD meanings are formed, and actions such as allowing employees to use their devices to access organisational resources without the fear of security breaches and data theft, are enacted. While it is true that the successive adoption of ICTs in organisation depends on the availability of a conducive formal policy, findings in the study show that SMEs used their business resources and management support as guiding structures of domination which were legitimized by internal informal verbal rules, lack of an institutional BYOD specific policy, minimal industry support; and the presences of social pressure

    The impact of bring-your-own-device on work practices in the financial sector

    Get PDF
    Bring-your-own-device (BYOD) refers to the practice of allowing the employees of an organisation to use their own computers, smartphones, or other devices for work purposes. This has brought a tremendous change in today's working environment. Organisations are faced with many technology trends which have the potential to create a competitive advantage in terms of both performance and efficiency. This paper follows a qualitative approach in which 15 interviews were conducted and a survey covering of 87 respondents was distributed. The findings show that the financial sector interpret s BYOD as a strategy that can create a competitive advantage to provide benefits of increased productivity, flexibility in the workforce, more autonomy, and contribute to the cost - efficiency of the business. There was also a disregard of policy formulation for BYOD from management which created a problem as employees became despondent that their personal devices were n o t allowed to access the corporate network. In addition, the findings revealed that work practices have to be re - defined and policies have to be drawn up in order to protect the company's assets and to provide guidelines. To guide the research in this emerging area, a review of several established theories that have not yet been applied to BYOD were used to form part of the proposed framework, which aims to provide a mechanism in the workplace to evaluate the impact of BYOD. This paper used exploratory analysis where six major influences of work practices were identified: 1) Change in behaviour; 2) Impact on workload; 3) Changes in motivation of individuals; 4) Re-definition of work practices; 5) Impact on overall performance; and 6) Approach required for industry. It was possible to associate them to several related constructs in IS literature which exposed possibilities for future theory-building efforts. The main influences on work practices are discussed with respect to the proposed framework

    Strategies That Mitigate IT Infrastructure Demands Produced by Student BYOD Usa

    Get PDF
    The use of bring your own devices (BYOD) is a global phenomenon, and nowhere is it more evident than on a college campus. The use of BYOD on academic campuses has grown and evolved through time. The purpose of this qualitative multiple case study was to identify the successful strategies used by chief information officers (CIOs) to mitigate information technology infrastructure demands produced by student BYOD usage. The diffusion of innovation model served as the conceptual framework. The population consisted of CIOs from community colleges within North Carolina. The data collection process included semistructured, in-depth face-to-face interviews with 9 CIOs and the analysis of 25 documents, all from participant case organizations. Member checking was used to increase the validity of the findings. During the data analysis phase, the data were coded, sorted, queried, and analyzed obtained from semistructured interviews and organizational documentation with NVivo, a qualitative data analysis computer software package. Through methodological triangulation, 3 major themes emerged from the study: the importance of technology management tools, the importance of security awareness training, and the importance of BYOD security policies and procedures. These themes highlight successful strategies employed by CIOs. The implications for positive social change as a result of this study include creating a more positive experience for students interacting with technology on campus. Effects on social change will also arise by increasing a student\u27s mindfulness through security awareness programs, which will empower the student to take more control of their online presence and as they pass that information along to family and friends

    Cybersecurity Strategies for Universities With Bring Your Own Device Programs

    Get PDF
    The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study\u27s conceptual framework. The data collection process included interviews with 10 IT security professionals and the gathering of publicly-accessible documents retrieved from the Internet (n = 59). Data collected from the interviews and member checking were triangulated with the publicly-accessible documents to identify major themes. Thematic analysis with the aid of NVivo 12 Plus was used to identify 4 themes: the ubiquity of BYOD in higher education, accessibility strategies for mobile devices, the effectiveness of BYOD strategies that minimize risk, and IT security professionals\u27 tasks include identifying and implementing network security strategies. The study\u27s implications for positive social change include increasing the number of users informed about cybersecurity and comfortable with defending their networks against foreign and domestic threats to information security and privacy. These changes may mitigate and reduce the spread of malware and viruses and improve overall cybersecurity in BYOD-enabled organizations

    Cybersecurity Strategies for Universities With Bring Your Own Device Programs

    Get PDF
    The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study\u27s conceptual framework. The data collection process included interviews with 10 IT security professionals and the gathering of publicly-accessible documents retrieved from the Internet (n = 59). Data collected from the interviews and member checking were triangulated with the publicly-accessible documents to identify major themes. Thematic analysis with the aid of NVivo 12 Plus was used to identify 4 themes: the ubiquity of BYOD in higher education, accessibility strategies for mobile devices, the effectiveness of BYOD strategies that minimize risk, and IT security professionals\u27 tasks include identifying and implementing network security strategies. The study\u27s implications for positive social change include increasing the number of users informed about cybersecurity and comfortable with defending their networks against foreign and domestic threats to information security and privacy. These changes may mitigate and reduce the spread of malware and viruses and improve overall cybersecurity in BYOD-enabled organizations

    A Study of the Application of a Bring Your Own Device Strategy in an Elementary School

    Get PDF
    Numerous studies have been published on the efficacy of a Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) at the U.S. secondary and postsecondary school levels to increase student access to technology. However, there is a lack of data on the efficacy of a BYOD AUP to increase elementary student technology access. The purpose of this descriptive case study was to determine if a BYOD AUP at the U.S. K-5 level would increase students\u27 access to technology as necessitated by the implementation of the Common Core State Standards (CCSS). This study was grounded in social transmission and transformative theories. The phenomenon of a northwest suburban elementary school BYOD implementation was examined by documenting the perceptions, attitudes, beliefs, lived experiences, and practices of administrators and teachers. This study used interview and classroom observation of a purposive selection of 3 elementary educators, the principal, and superintendent. Coding of data according to key words lead to analysis according to nodes and themes. Triangulation of multiple data sources and member checking helped to establish the credibility of data. Study findings documented increased access to technology for elementary students, best practices and steps to implementation. Study recommendations for elementary educators and administrators considering BYOD include consensus building, AUP, technology infrastructure, communications, professional development, classroom management, and lesson design to inform the field on elementary BYOD. Study findings facilitate social change by providing BYOD implementation recommendations, increasing elementary student access to technology at a reduced cost to districts and schools

    Are academics ready for smart learning?

    Get PDF
    Ownership of smartphones and tablets among the student population is growing. Students are using their devices to support their learning. Employers and employees are increasingly bringing their own smart devices into private and public organisations to support their business. This is leading to employees driving the Bring Your Own Device (BYOD) agenda in organisations. It is not clear the extent to which academics are embracing smart technology to manage their workload or to enhance the student experience of learning. This paper presents a qualitative study of how engineering academics are using their own BYOD or institutionally provided smart devices. A 6Cs (connect, communicate, collaborate, curate, create and coordinate) framework has been used to analyse the results. The findings indicate that academics are primarily using devices to create materials, second to coordinate their work and third to communicate with students about their learning. However, there are a number of inhibiting and enabling factors that need to be addressed by academic institutions to develop the effective adoption of smart technologies for academic practice. Infrastructure, including developing widespread access to WiFi, and the prioritisation of opportunities to support staff to learn how to apply the technology to enhance student learning and experience are key areas of necessary development

    Bring Your Own Device (BYOD): Risks to Adopters and Users

    Get PDF
    Bring your own device (BYOD) policy refers to a set of regulation broadly adopted by organizations that allows employee-owned mobile devices – like as laptops, smartphones, personal digital assistant and tablets – to the office for use and connection to the organizations IT infrastructure. BYOD offers numerous benefits ranging from plummeting organizational logistic cost, access to information at any time and boosting employee’s productivity. On the contrary, this concept presents various safety issues and challenges because of its characteristic security requirements. This study explored diverse literature databases to identify and classify BYOD policy adoption issues, possible control measures and guidelines that could hypothetically inform organizations and users that adopt and implement BYOD policy. The literature domain search yielded 110 articles, 26 of them were deemed to have met the inclusion standards. In this paper, a list of possible threats/vulnerabilities of BYOD adoption were identified. This investigation also identified and classified the impact of the threats/vulnerabilities on BYOD layered components according to security standards of “FIPS Publication 199” for classification. Finally, a checklist of measures that could be applied by organizations & users to mitigate BYOD vulnerabilities using a set layered approach of data, device, applications, and people were recommended

    Security Issues with Mobile IT: A Narrative Review of Bring Your Own Device (BYOD).

    Get PDF
    The use of employee-owned mobile devices such as smart phones, tablets, laptops, etc., to access business enterprise content or networks otherwise referred to as of ‘Bring Your Own Device’ (BYOD) has further made the confidentiality, integrity, and availability of organizations’ data become insecure, and prone to breaches and fraudulent activities. In this study, the authors explored a narrative review that focuses on the theoretical underpinnings of vast works of literature that revealed significant information on the conceptual framework, existing systems that adopt BYOD security, analysis, and synthesis of prior research. Using some keywords “BYOD system security”, “BYOD security threats”, “cyber-attacks and security”, etc., an electronic database search extracted peer-reviewed articles from the last five years. The thematic analysis of fifty-one articles retrieved revealed that breaches and fraudulent activities exist with the use of BYOD that may be perpetrated against organization’s data, intentionally or maliciously. Good policies and guidelines on the use of BYOD coupled with good formulation and communication of same, should be adhered to avert some forms of security breaches. There is the need to preserve user’s privacy, organizations’ data confidentiality, integrity, and availability, and secure same in the devices of employees using their own devices to process corporate and personal data, by using acceptable and effective BYOD Policy and Mobile Device Management Solution (MDMS). This may increase mutual trust and BYOD adoption rate, new innovations and influence that can positively impact the organizations and their employees. Keyword: BYOD, security threats, password, cyber-attacks and security, Information security. DOI: 10.7176/JIEA/8-1-0
    • 

    corecore