Securing BYOD: A Study of Framing and Neutralization Effects on Mobile Device Security Policy Compliance

نویسندگان

  • Vanessa Garza
  • Xiang Guo
چکیده

Because of the recent increase of mobile device adoption in the workplace, and the numerous security risks inherent in mobile device use, there is a growing need for organizations to craft mobile device security policies that will have a positive effect on employees’ intention to comply. Using prospect theory, developed by Kahneman and Tversky (1979), and the framing effects associated with this theory, as well as neutralization theory proposed by Sykes and Matza (1957), this study seeks to develop a theoretical framework which can aid organizations in developing content for mobile device security policies and increase employee’s intention to comply.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing the "Bring Your Own Device" Policy

The number of devices (phones, tablets, smart TVs, ...) using Android OS is continuously and rapidly growing. Together with the devices, also the amount of applications and on-line application marketplaces is increasing. Unfortunately, security guarantees are not evolving concurrently and security flaws have been reported. Far from discouraging them, more and more users and organisations rely o...

متن کامل

Employees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory

The trend of bring your own device (BYOD) has been rapidly adopted by organizations. Despite the pros and cons of BYOD adoption, this trend is expected to inevitably keep increasing. Yet, BYOD has raised significant concerns about information system security as employees use their personal devices to access organizational resources. This study aims to examine employees' intention to comply with...

متن کامل

Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security

An emerging trend in corporate network administration is BYOD (Bring Your Own Device). Although with many advantages, the paradigm shift presents new challenges in security to enterprise networks. While existing solutions such as Mobile Device Management (MDM) focus mainly on controlling and protecting device data, they fall short in providing a holistic network protection system. New innovatio...

متن کامل

BYOD and the Mobile Enterprise - Organisational challenges and solutions to adopt BYOD

Bring Your Own Device, also known under the term BOYD refers to the trend in employees bringing their personal mobile devices into organisations to use as a primary device for their daily work activities. With the rapid development in computing technology in smartphones and tablet computers and innovations in mobile software and applications, mobile devices are becoming ever more powerful tools...

متن کامل

The Mobile Execution Environment: a Secure and Non- Intrusive Approach to Implement a Bring Your Own Device Policy for Laptops

Bring Your Own Device (BYOD) has become an established business practice, however the practice can increase an organisation’s information security risks. The implementation of a BYOD policy for laptops must consider how the information security risks can be mitigated or managed. The selection of an appropriate secure laptop software configuration is an important part of the information security...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015