Bring your own devices (BYOD)
Master of Science in Computer Science
Faculty / School
Faculty of Computer Sciences (FCS)
Department of Computer Science
Date of Award
Committee Member 1
Dr. Waqas MahmoodSupervisor, Faculty of Computer Science, Institute of Business Administration (IBA), Karachi.
MSCS Survey Report
Internet--Security measures, Computer networks -- Access control.
Abstract / Summary
Data is a critically imperative asset that has been utilized for a considerable length of time in an organization. Similar to any asset, there are dangers to the data that affect processes, for example, electronic mail recovery and right of access to corporate structure services. As a result of the threats, consideration towards protecting and securing the data is necessary. Technology is used for securing data and the charge partnered to the innovation can be dire. As technology develops with each transient decade, there are diverse phenomenon's that endeavor to process and secure organizational data while reducing cost. The advancement of technology has built up another trend called "Bring Your Own Device"- (BYOD). BYOD is a wonder that allows employees to utilize their very own mobile device to finish the organizational assigned tasks. The implementation of BYOD extends from huge companies to small, intermediate and micro enterprises (SMMEs). With the acceptance of BYOD, there are advantages as well as risks related to it. Traditionally; corporate-level security risks have been catered by adapting a variety of conventional Information Security (IS) methods. This research work aims to recognize how many corporate-level employees are aware of this phenomenon, in this research a survey is conducted online which incorporated questions on awareness, effects, and benefits of BYOD were asked. Moreover, questions regarding the presence of network policies and audit plans for ensuring data security at their organizations were present. Later on, after the identification of these key factors based on our survey results, we presented an analysis of risks associated with BYOD and ways of mitigating them.
Usmani, N. (2018). Bring your own devices (BYOD) (Unpublished survey report). Retrieved from https://ir.iba.edu.pk/research-projects/40
The full text of this document is only accessible to authorized users.