Explore chapters and articles related to this topic
The Impact of the Internet of Things (IoT) on the IT Security Infrastructure of Traditional Colleges and Universities in the State of Utah
Published in Claire A. Simmers, Murugan Anandarajan, The Internet of People, Things and Services, 2018
The network environment of a traditional campus is unique and complex. Campus networks extend across broad geographic areas. In addition to the main campus, many colleges and universities have satellite campuses throughout the city or state. Campus networks are fragmented and decentralized, and support a massive, ever-changing user base and require a vast amount of bandwidth. In addition to providing resources for their students and faculty, colleges and universities provide resources to their local communities. Campus network environments promote openness, including research, faculty–student interaction, and peer-to-peer collaboration (Wolff, 2015; Callahan, 2014). To further complicate the security issues, students, faculty, and staff are bringing their own devices on campus and connecting to the campus network. These mobile devices, including notebooks, tablets, and smartphones, are infiltrating college and university campuses. Bring-your-own-device (BYOD) technologies create a security risk because colleges and universities have little or no control over the devices that users introduce to the network (Educause, 2014b). Consequently, the campus network includes an array of network topologies, operating systems, software applications, devices, and local and remote users.
Advances in Computing Infrastructure
Published in Siyong Kim, John Wong, Advanced and Emerging Technologies in Radiation Oncology Physics, 2018
Yulong Yan, Alicia Yingling, Steve Jiang
Personal cell phones and tablets allow users to balance professional and personal schedules. These bring your own device (BYOD) situations bring improved efficiency and user experience. Risks associated with data access in case a device is lost need to be evaluated and addressed to prevent any unauthorized use. Data encryption is often required for the device if access to patient data is needed. A shared agreement may be needed so that the data can be wiped remotely to avoid any unwanted access or liability exposure.
Asset Management
Published in Rajkumar Banoth, Narsimha Gugulothu, Aruna Kranthi Godishala, A Comprehensive Guide to Information Security Management and Audit, 2023
Rajkumar Banoth, Narsimha Gugulothu, Aruna Kranthi Godishala
BYOD stands for bring your own device. It's an IT policy that allows, and sometimes encourages, employees to access enterprise data and systems using personal mobile devices such as smartphones, tablets, and laptops.
The mediating role of social presence in the relationship between shadow IT usage and individual performance: a social presence theory perspective
Published in Behaviour & Information Technology, 2021
Gabriela Labres Mallmann, Antonio Carlos Gastaud Maçada
Finally, the category, self-acquired devices, represents shadow IT hardware and encompasses devices owned by the employees and used at work without formal approval instead of the company’s devices. This also includes the use of applications in the employee’s personal devices at the workplace (e.g. Rentrop and Zimmermann 2012; Gozman and Willcocks 2015). Here it is crucial to emphasise that shadow IT is distinct from closely related concepts such as BYOD (Haag and Eckhardt 2017). By definition, BYOD is a policy that allows employees to bring and use personal devices at work (e.g. French, Guo, and Shim 2014). Although BYOD can facilitate or drive shadow IT usage because employees can use their devices in an inappropriate way. They differ in that BYOD assumes the use of personal devices at work is permitted, while shadow IT usage represents a deviation from rules, assuming personal devices are used without formal permission.
A Study of BYOD adoption from the lens of threat and coping appraisal of its security policy
Published in Enterprise Information Systems, 2018
In general, employees who are limited to work within their cubicles are rather isolated. Bring your own device (BYOD) allows employees to use their own notebooks and mobile devices to conduct their work. This approach gives flexibility to mobile workers who need to interact with clients and complete tasks outside their offices and office hours. Many businesses rely on short turnaround times and seamless interaction. BYOD allows employees to be more productive regardless of when and where. Whether they are travelling, on vacation, on sick leave or just out to lunch, employees can stay connected and remain productive. Not only do they feel a sense of empowerment on the devices they can choose to use to perform their duties best, but also the freedom on when and where they do their jobs.
BYOD Policy Compliance: Risks and Strategies in Organizations
Published in Journal of Computer Information Systems, 2022
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
Bring Your Own Device (BYOD) is currently a standard practice in the industry where employees use their personally owned devices, such as smartphones and tablets for work purposes.1,2 It is anticipated that by 2020, there will be 10 billion personal mobile devices used at the workplace.3,4 The BYOD concept gives employees the access to corporate data, applications, records, managed networks, and web as well as other enterprise contents through their mobile devices. In this manner, employees are empowered and privileged to decide on the technology that fulfills their individual needs.5 BYOD also increases mobility, flexibility, productivity and employee satisfaction.6–8