Securing BYOD: A Study of Framing and Neutralization Effects on Mobile Device Security Policy Compliance
نویسندگان
چکیده
Because of the recent increase of mobile device adoption in the workplace, and the numerous security risks inherent in mobile device use, there is a growing need for organizations to craft mobile device security policies that will have a positive effect on employees’ intention to comply. Using prospect theory, developed by Kahneman and Tversky (1979), and the framing effects associated with this theory, as well as neutralization theory proposed by Sykes and Matza (1957), this study seeks to develop a theoretical framework which can aid organizations in developing content for mobile device security policies and increase employee’s intention to comply.
منابع مشابه
Securing the "Bring Your Own Device" Policy
The number of devices (phones, tablets, smart TVs, ...) using Android OS is continuously and rapidly growing. Together with the devices, also the amount of applications and on-line application marketplaces is increasing. Unfortunately, security guarantees are not evolving concurrently and security flaws have been reported. Far from discouraging them, more and more users and organisations rely o...
متن کاملEmployees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory
The trend of bring your own device (BYOD) has been rapidly adopted by organizations. Despite the pros and cons of BYOD adoption, this trend is expected to inevitably keep increasing. Yet, BYOD has raised significant concerns about information system security as employees use their personal devices to access organizational resources. This study aims to examine employees' intention to comply with...
متن کاملTowards SDN-Defined Programmable BYOD (Bring Your Own Device) Security
An emerging trend in corporate network administration is BYOD (Bring Your Own Device). Although with many advantages, the paradigm shift presents new challenges in security to enterprise networks. While existing solutions such as Mobile Device Management (MDM) focus mainly on controlling and protecting device data, they fall short in providing a holistic network protection system. New innovatio...
متن کاملBYOD and the Mobile Enterprise - Organisational challenges and solutions to adopt BYOD
Bring Your Own Device, also known under the term BOYD refers to the trend in employees bringing their personal mobile devices into organisations to use as a primary device for their daily work activities. With the rapid development in computing technology in smartphones and tablet computers and innovations in mobile software and applications, mobile devices are becoming ever more powerful tools...
متن کاملThe Mobile Execution Environment: a Secure and Non- Intrusive Approach to Implement a Bring Your Own Device Policy for Laptops
Bring Your Own Device (BYOD) has become an established business practice, however the practice can increase an organisation’s information security risks. The implementation of a BYOD policy for laptops must consider how the information security risks can be mitigated or managed. The selection of an appropriate secure laptop software configuration is an important part of the information security...
متن کامل