Javascript must be enabled to continue!
BYOD Systematic Literature review: A layered approach
View through CrossRef
Introduction: Bring your own device (BYOD) is a paradigm where employees use personal devices for organizational related activities. Various benefits accrued by both employees and organization. However, BYOD leads to risks and threats during their usage.
Purpose: The paper aimed at exploring benefits, risks, and suggested controls based on a systematic review of literature.
Methodology: A systematic review methodology was adopted for the study. A search using keywords was conducted to select peer-reviewed journal papers from 2010 to 2020 in ACM Digital Library, Emerald Insight, IEEE Explorer, Science Direct, and Taylor and Francis. Inclusion and exclusion criteria was applied, followed by quality appraisal on the selected articles, and then the data was extracted.
Results: According to the search results, BYOD research is on the rise. Benefits, risks, and controls associated with BYOD were also identified based on a layered approach. Findings indicate that user management is the weakest layer.
Originality/value: This paper adds to previous research on BYOD practices by highlighting key risks and suggesting practices that organizations can use to manage security and privacy risks in BYOD environments using a layered approach.
Title: BYOD Systematic Literature review: A layered approach
Description:
Introduction: Bring your own device (BYOD) is a paradigm where employees use personal devices for organizational related activities.
Various benefits accrued by both employees and organization.
However, BYOD leads to risks and threats during their usage.
Purpose: The paper aimed at exploring benefits, risks, and suggested controls based on a systematic review of literature.
Methodology: A systematic review methodology was adopted for the study.
A search using keywords was conducted to select peer-reviewed journal papers from 2010 to 2020 in ACM Digital Library, Emerald Insight, IEEE Explorer, Science Direct, and Taylor and Francis.
Inclusion and exclusion criteria was applied, followed by quality appraisal on the selected articles, and then the data was extracted.
Results: According to the search results, BYOD research is on the rise.
Benefits, risks, and controls associated with BYOD were also identified based on a layered approach.
Findings indicate that user management is the weakest layer.
Originality/value: This paper adds to previous research on BYOD practices by highlighting key risks and suggesting practices that organizations can use to manage security and privacy risks in BYOD environments using a layered approach.
Related Results
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
The BYOD Security Policy (BYOD-SP) constitutes formal documentation protecting sensitive data and information during BYOD implementation in an organization. The BYOD environment in...
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Factors influencing the adoption of the BYOD policy in teaching hospitals: A cross-sectional study from Southeastern Iran
Factors influencing the adoption of the BYOD policy in teaching hospitals: A cross-sectional study from Southeastern Iran
Introduction
Clinicians are increasingly using their devices for work at hospitals, a practice known as Bring-your-own-device (BYOD), to enhance productivity and mobility. This stu...
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
This review summarizes the evidence from six randomized controlled trials that judged the effectiveness of systematic review summaries on policymakers' decision making, or the most...
Enhancing Bring Your Own Device Security in Education
Enhancing Bring Your Own Device Security in Education
The acceptance and use of personal devices at educational institutions is on the rise, resulting in the education sector’s adoption of Bring Your Own Device (BYOD). The institution...
Primerjalna književnost na prelomu tisočletja
Primerjalna književnost na prelomu tisočletja
In a comprehensive and at times critical manner, this volume seeks to shed light on the development of events in Western (i.e., European and North American) comparative literature ...
Enhanced Bring your Own Device (BYOD) Environment Security based on Blockchain Technology
Enhanced Bring your Own Device (BYOD) Environment Security based on Blockchain Technology
BYOD is a practice by many organizations where employees can use their personal devices for work purpose. BYOD may bring a lot of advantages, but it also leads to security issues s...
Analysis of security risk control of mobile application under BYOD scenario using in energy enterprises
Analysis of security risk control of mobile application under BYOD scenario using in energy enterprises
Abstract
In recent years, with the popularity of bring your own device (BYOD), energy employees have tended to use personal mobile devices to access company resource...

