Downloads: 144 | Views: 284
Research Paper | Information Security | Kenya | Volume 7 Issue 1, January 2018 | Popularity: 7.1 / 10
Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya
Jairus E. Ounza, Samuel Liyala, Solomon Ogara
Abstract: Although a number of researches have been carried out by various organizations across the globe to establish security challenges facing education institutions there is no evidence that a similar study has been carried out for universities in Kenya. Since it is evident that security challenges due to Bring Your Own Device (BYOD) adoption differs across different institutions there is need for security challenges facing universities in Kenya due to BYOD adoption to be identified. The study surveyed public and private universities in order to investigate the security challenges facing the universities due to BYOD adoption with a view of generating empirical data. Based on the findings of the study, it was established that BYOD adoption exposes the universities to lack of control of user devices, lack of user awareness on emerging threats due to user owned devices, difficulties in maintaining inventories of multi platform user owned devices and increased risk to organizational data. . The study recommends that organisations implementing BYOD should continuously establish the security challenges they face as a result of adopting BYOD so as to put in place appropriate security measures to mitigate the challenges.
Keywords: Adoption, BYOD, Inventory, Organizational Data, Risk, Security Challenges
Edition: Volume 7 Issue 1, January 2018
Pages: 345 - 350
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Information Security, Malaysia, Volume 13 Issue 8, August 2024
Pages: 738 - 747Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors
Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Security, India, Volume 7 Issue 11, November 2018
Pages: 1978 - 1982Strategic Construction and Implementation of Removable Media Policies for Mitigating Data Loss and Insider Threat Risks
Shanmugavelan Ramakrishnan
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Information Security, India, Volume 13 Issue 3, March 2024
Pages: 520 - 523Protecting the Digital Frontier: Understanding Cybersecurity Challenges and Innovations in the Age of Technology
Dr. Ashok Kumar Yadav
Downloads: 161
Informative Article, Information Security, India, Volume 7 Issue 7, July 2018
Pages: 905 - 907The Language of Information Security
Mahesh P G