Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device Online publication date: Mon, 12-Dec-2016
by Khaled Zayed
International Journal of Teaching and Case Studies (IJTCS), Vol. 7, No. 3/4, 2016
Abstract: Companies and their employees rely on information technology (IT) and internet-enabled technology to conduct their business and communications. This offers many advantages, but also introduces risks related to information security. The present study sought to address the challenges of IT security alongside the adoption of bring your own device (BYOD) programs and the lack of user awareness of related best practices. A qualitative case study research design was employed. IT managers were interviewed to explore the newly developing subject of BYOD and its implications for IT security. The issues most central to information security are security policies, BYOD user awareness and training, the enforcement of organisational security policies, manager effectiveness in protecting data, and users' acceptance and adherence to BYOD security policies. While BYOD is favoured by many users and also offers many advantages, it is not favoured by most IT security managers.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Teaching and Case Studies (IJTCS):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com