Answer To: Research Report: Security threats related to BYOD devices and countermeasures (1200 Words) USE IEEE...
Soumi answered on Apr 22 2021
Running Head: THREATS RELATED TO BYOD DEVICES AND COUNTERMEASURES 1
THREATS RELATED TO BYOD DEVICES AND COUNTERMEASURES 9
SECURITY THREATS RELATED TO BYOD DEVICES AND COUNTERMEASURES
Abstract
In the current report the use of Bring Your Own Device technology, better termed as BYOD has been discussed in the background of the security breaches it possesses and countermeasures to resolve the issues. The current report shows that BYOD despite being a profiting proposition has serious data and privacy breach potentials, which makes its application difficult. However, in the current report BYOD and countermeasures for resolving its data and privacy breach issues could lead to future benefit for business organisations therefore, the topic has been selected.
The discussion of the countermeasures in the discussed literature has helped in hinting at how the BYOD can be optimised in case issues arise in the organisation in which it is adapted. However, it is also noticed that that the literature although hinted at future application in many sectors and industries, did not provide any concrete details, which is a major limitation of the current literature. BYOD is a beneficial technology, especially when placed in context of start-ups.
Table of Contents
Introduction 4
Overview of BYOD Technology 4
Application of the BYOD Technology 5
The Problems of Using BYOD Technology 6
Identification of the Gaps in the Literature 7
Future Direction of BYOD 7
References 9
Introduction
BYOD refers to Bring Your Own Device, a corporate policy, in which employees of an organisation are allowed to bring their devices to the workplace and use them for their work at the workplace. The idea of BYOD caters its significance from the fact that it reduces cost or organisational purchases and increases the scope of employee performance for the fact that employees know their personal devices better and can naturally perform better on them.
However, similar to the increasing significance and benefits, perceived from the angle of productivity, the security breaches and issues have become alarming concerns for the organisations using BYOD policies in their functional frame of business. Considering the ever-increasing market continuation and the need for lower internal cost, BYOD cannot be rejected, therefore, increasing measures, to increase the security standards and resolve the issues, currently observed in the industry, must be discussed and assessed properly, which the current report aims at presenting.
Overview of BYOD Technology
The BYOD technology is based on a few major aspects of employee behaviours, namely- the tendency of using personal devices at work, having higher comfort level of using personal devices, investing higher amount of money for personalised higher quality devices that are more reliable that industrial devices purchased at the workplace for anonymous usage. As mentioned by Ogie (2016), business organisations, especially those in the Information Technology Industry observed that their employees have the tendency of using their personal laptop and mobile more than official ones and have a natural tendency of maintaining the quality of the products purchased from their own money.
The...