Show simple item record

dc.contributor.authorNtwari, Richard
dc.contributor.authorHabinka, Annabella E.
dc.contributor.authorKaggwa, Fred
dc.date.accessioned2023-02-28T07:06:19Z
dc.date.available2023-02-28T07:06:19Z
dc.date.issued2022
dc.identifier.citationNtwari, R., Habinka, A. E., & Kaggwa, F. (2022). Enhancing Bring Your Own Device Security in Education. Journal of Science & Technology, 2(4), 1-18.en_US
dc.identifier.urihttp://ir.must.ac.ug/xmlui/handle/123456789/2789
dc.description.abstractBackground: The acceptance and use of personal devices at educational institutions is on the rise, resulting in the education sector's adoption of Bring Your Own Device (BYOD). The institutions benefit from cost reduction in buying and managing IT devices as users purchase and bring their own devices. Users benefit by accessing learning materials and collaboration anytime, anywhere while on the move via institutional network. However, literature on BYOD indicates that various challenges are faced with usage of BYOD such as loss/stolen devices, malware, lack of policy, user negligence among others. This paper examined the literature in order to identify BYOD challenges, solutions, and guidelines that would inform secure BYOD usage in education. Methods: Beginning with a search of selected databases, a systematic review of the literature was conducted. The database and back search generated 1594 items, 14 of which were deemed eligible for inclusion. The People Policy Technology (PPT) approach was used in identifying challenges from literature through grouping them under the Technology challenges, People challenges and Policy challenges. The BYOD security framework was utilized to develop a mitigation strategy. Results: Various risks and threats were identified under the People, policy and technology themes. They include lost/stolen device, lack of policy, inadequate controls, connecting via unsecure networks, malware such as virus, data leakage. The BYOD security framework was followed to give systematic guidelines and controls in overcoming the challenges. The guidelines included BYOD policy development and implementation with in the institution, device enrolment and management using the MDM, scanning for malware, software updates, and regular backups among others. Conclusion: BYOD phenomenon is on the raise and here to stay. It has various benefits but these can be shadowed by threat identified in this review. Before implementing BYOD, educational institutions should ensure that an acceptable BYOD policy is in place to instruct users on how to behave while using BYOD. Users should be trained sufficiently on how to secure their devices and data while using BYOD. Technological solutions such as MDM, antivirus software and NAC should be deployed to manage both devices and data in the BYOD environment. However, these solutions should be used in a balanced manner that does not hinder usability.en_US
dc.language.isoen_USen_US
dc.publisherJournal of Science & Technologyen_US
dc.subjectBring your own device (BYOD)en_US
dc.subjectMobile devicesen_US
dc.subjectSecurityen_US
dc.subjectEducationen_US
dc.subjectControlsen_US
dc.titleEnhancing Bring Your Own Device Security in Educationen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record