Downloads: 144 | Views: 279
Research Paper | Information Security | Kenya | Volume 7 Issue 1, January 2018 | Popularity: 7.1 / 10
Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya
Jairus E. Ounza, Samuel Liyala, Solomon Ogara
Abstract: Although a number of researches have been carried out by various organizations across the globe to establish security challenges facing education institutions there is no evidence that a similar study has been carried out for universities in Kenya. Since it is evident that security challenges due to Bring Your Own Device (BYOD) adoption differs across different institutions there is need for security challenges facing universities in Kenya due to BYOD adoption to be identified. The study surveyed public and private universities in order to investigate the security challenges facing the universities due to BYOD adoption with a view of generating empirical data. Based on the findings of the study, it was established that BYOD adoption exposes the universities to lack of control of user devices, lack of user awareness on emerging threats due to user owned devices, difficulties in maintaining inventories of multi platform user owned devices and increased risk to organizational data. . The study recommends that organisations implementing BYOD should continuously establish the security challenges they face as a result of adopting BYOD so as to put in place appropriate security measures to mitigate the challenges.
Keywords: Adoption, BYOD, Inventory, Organizational Data, Risk, Security Challenges
Edition: Volume 7 Issue 1, January 2018
Pages: 345 - 350
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 246 | Views: 466
Information Security, India, Volume 8 Issue 11, November 2019
Pages: 95 - 101Intrusion Detection with Machine Learning & Artificial Intelligence (ML&AI) Techniques to Reduce Cyberattacks (Network Traffic) (New Way to Improve Cybersecurity)
S K. Niamathulla
Downloads: 221 | Views: 642
Information Security, India, Volume 6 Issue 6, June 2017
Pages: 2628 - 2630Improvement of Diffie-Hellman Key Exchange Algorithm
Gurshid
Downloads: 161 | Views: 322
Information Security, India, Volume 7 Issue 7, July 2018
Pages: 905 - 907The Language of Information Security
Mahesh P G
Downloads: 148 | Views: 293
Information Security, India, Volume 6 Issue 5, May 2017
Pages: 2678 - 2678Cyber Security - A Business Accelerator??
Riya V S, Dr. Aarthy C