A framework towards governing "Bring Your Own Device in SMMEs"
نویسندگان
چکیده
Information is a critically important asset that has been used for decades within organizations. Like any asset, there are threats to the information that impact processes such as; email retrieval and access to organizational system services. As a consequence of the threats, attention to the security of the information is important. Technology is utilized to secure information and the cost affiliated to the technology can be dire. As technology evolves with each transitory decade, there are different phenomenon’s that attempt to process and secure organizational information whilst reducing costs. The evolution of technology has developed a new phenomenon called “Bring Your Own Device” (BYOD). BYOD is a phenomenon that allows employees to use their own personal mobile device to complete organizational tasks. The adoption of BYOD expands from large organizations to small, medium and micro enterprises (SMMEs). With the adoption of BYOD there are benefits and more significantly risks associated to BYOD. Therefore, this paper will discuss the SMME context and its challenges towards the governance of BYOD. In addition, there will be a discussion on how organizations can govern BYOD in an SMME context by considering the existing BYOD approaches and provide an approach suitable for SMMEs. Furthermore, the suitable BYOD approach for an SMME context will further be evaluated and compared against the existing BYOD approaches that were identified. The research process of the study is conducted within the design-oriented research paradigm utilizing a cyclic approach. KeywordsBYOD, SMMEs, mobile devices, information
منابع مشابه
Towards A Modular Enterprise App Store
Mobile technologies and more precisely apps have disrupted technology scenario. Bring your own application (BYOA) is a new trend that has emerged after the “bring your own device” (BYOD) vogue. However, and in spite of its intrinsic benefits, the trend presents also several caveats and Enterprise app stores are seen as a way to tackle these risks. In this paper, authors present ModEAS, a system...
متن کاملBarrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure
The adoption of Bring Your Own Device (BYOD) – also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC) – is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009,...
متن کاملMODEAS: TOWARDS A MODULAR ENTERPRISE APP STORE LISARDO PRIETO-GONZÁLEZ SRH Hochschule Berlin, Germany [email protected]
Mobile technologies and more precisely apps have disrupted technology scenario. Bring your own application (BYOA) is a new trend that has emerged after the “bring your own device” (BYOD) vogue. However, and in spite of its intrinsic benefits, the trend presents also several caveats and Enterprise app stores are seen as a way to tackle these risks. In this paper, authors present ModEAS, a system...
متن کاملTowards a New Personal Information Technology Acceptance Model: Conceptualization and Empirical Evidence from a Bring Your Own Device Dataset
By considering recent findings from cognitive dual process theories, I propose a new technology acceptance model for situations in which IT is used everyday. The so-called “Personal Information Technology Acceptance Model” (PITAM) will be applied to the IT-consumerization area and it will be evaluated by a Bring Your Own Device (BYOD) dataset from 171 working professionals aged from 18 to 68 ye...
متن کاملTowards Cross-Surface Content Sharing Between Mobile Devices and Large Displays in the Wild
Copyright is held by the author/owner(s). CHI 2016 Workshop on Interacting with Multi-Device Ecologies "in the Wild", May 7, 2016, San Jose, CA, USA. Abstract Large vertical displays are increasingly widespread, and content sharing between them and personal mobile devices is central to many usage scenarios. Research has already led to manifold interaction techniques. In most cases however, they...
متن کامل