A Review of Impacts of Bring Your Own Device (BYOD) and Nomadic Computing on Enterprise Security Policies’ Compliance: The Case of Higher Learning Institutions in Kenya

Peter Namisiko, William Sakataka, Bethuel Sugut

Abstract


Network design is driven by mobility and as such Wireless Local Area Networks (WLANs) have become a major component of corporate networks in today’s business environment. A trend is emerging where there is explosive consumer adoption of smart phones and tablets due to their low price and broad applications support that these devices are offering since they are WLAN enabled. Desktop Computers and laptops are used to produce information; while tablets consume information and smart phones to communicate that information. BYOD (Bring your own device) is a term which refers to instances when employees use their personal computing devices (typically smart phones, tablets and laptops) in the workplace. This trend is here to stay and the challenge is that it is a double edged sword pitting user satisfaction and productivity on one end and organizations data security on the other. As more employees look to access corporate networks with their personal mobile devices, vendors must find ways of helping corporations allow such access in secure, efficient ways. This is due to the fact that technology is changing at a very fast rate and with consumerization of IT revolution there has been a cultural shift such that the users are the ones getting the latest, cutting edge technologies first, and they want to bring those devices to work. BYOD changes the security model of protecting the organizations’ data by blurring the definition of that perimeter, through physical location and in asset ownership. This study reviewed Bring Your Own Device (BYOD) and Nomadic computing on Enterprise security policies’ compliance in HLIs in Africa. A quantitative survey study approach was used in ten university campuses to determine BYOD security compliance issues. The study found that Perceived probability of security breach, Perceived severity of security breach, Security breach concern level and response efficacy had an impact on Enterprise Security Policies’ Compliance in an organization.      

Keywords: BYOD, Nomadic computing, Enterprise Security


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: CEIS@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2863

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org