IJACS, International Journal of Applied Computer Science, Journal publishing in Kenya, Research Publication, University education in Kenya, Masters research Publication Kenya

BYOD Security Risks and Mitigation Strategies to Facilitate Adoption

Petronilla Mutwiwa Ndunge

Mount Kenya University

Dr. John Kamau

Mount Kenya University

Dr. Joyce Gikandi

Mount Kenya University

Keywords: BYOD, BYOD security, Mobile Technology, ICT, Device Security


Abstract

The continued dependability of mobile devices and enhancement of mobile technology have
presented a variety of devices in the hands of users that organizations can exploit to drive its
ICT agenda within their organizations by ensuring access to organizational services and
systems on personal devices. This concept; usually referred to as Bring your own device
(BYOD) has been considered to be a revolutionary concept as access and usage of technology
within firms. However, various security challenges relating to the security of the
organizational information infrastructure have been highlighted as key impediments to the
realization of an organization-wide adoption of BYOD. This paper seeks to analyze the
various risks presented by BYOD adoption and proposes strategies that can be applied to
ensure BYOD security. The research is based on both secondary data and an analysis of
literature review on BYOD adoption relating to BYOD security. The result of this study is a
strategic framework for facilitating the neutralization of security risks presented by BYOD
adoption.


Author Biographies

Petronilla Mutwiwa Ndunge, Mount Kenya University

School of Computing & Informatics

Mount Kenya University

Dr. John Kamau, Mount Kenya University

School of Computing & Informatics

Mount Kenya University

Dr. Joyce Gikandi, Mount Kenya University

School of Computing & Informatics

Mount Kenya University

Most read articles by the same author(s)