BYOD Security Risks and Mitigation Strategies to Facilitate Adoption
Petronilla Mutwiwa Ndunge
Mount Kenya University
Dr. John Kamau
Mount Kenya University
Dr. Joyce Gikandi
Mount Kenya University
Keywords: BYOD, BYOD security, Mobile Technology, ICT, Device Security
Abstract
The continued dependability of mobile devices and enhancement of mobile technology have
presented a variety of devices in the hands of users that organizations can exploit to drive its
ICT agenda within their organizations by ensuring access to organizational services and
systems on personal devices. This concept; usually referred to as Bring your own device
(BYOD) has been considered to be a revolutionary concept as access and usage of technology
within firms. However, various security challenges relating to the security of the
organizational information infrastructure have been highlighted as key impediments to the
realization of an organization-wide adoption of BYOD. This paper seeks to analyze the
various risks presented by BYOD adoption and proposes strategies that can be applied to
ensure BYOD security. The research is based on both secondary data and an analysis of
literature review on BYOD adoption relating to BYOD security. The result of this study is a
strategic framework for facilitating the neutralization of security risks presented by BYOD
adoption.
Author Biographies
Petronilla Mutwiwa Ndunge, Mount Kenya University
School of Computing & Informatics
Mount Kenya University
Dr. John Kamau, Mount Kenya University
School of Computing & Informatics
Mount Kenya University
Dr. Joyce Gikandi, Mount Kenya University
School of Computing & Informatics
Mount Kenya University