SciELO - Scientific Electronic Library Online

 
vol.20 número1 índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Articulo

Indicadores

Links relacionados

  • En proceso de indezaciónCitado por Google
  • En proceso de indezaciónSimilares en Google

Compartir


South African Journal of Information Management

versión On-line ISSN 1560-683X
versión impresa ISSN 2078-1865

Resumen

MUSARURWA, Alfred; FLOWERDAY, Stephen  y  CILLIERS, Liezel. An information security behavioural model for the bring-your-own-device trend. SAJIM (Online) [online]. 2018, vol.20, n.1, pp.1-9. ISSN 1560-683X.  http://dx.doi.org/10.4102/sajim.v20i1.980.

BACKGROUND: Organisations have found themselves in a race to embrace bringing your own device (BYOD) in their day-to-day business operations, while at the same time needing to maintain their information security management standards. BYOD is convenient for employees as it allows them to conduct business anywhere and at any time. However, this has resulted in organisations having to rethink their information security management, as BYOD now extends the information security management boundaries to wherever the employees takes their device and wherever there is a network access point. OBJECTIVE: While technical solutions are offered by various BYOD solution providers, the theme of this article is to propose employee behavioural change for organisations to mitigate the risks that are associated with the BYOD phenomenon. METHODS: For this purpose, a literature review was conducted, culminating in the identification of six key traits for the development of a behavioural intention model towards information security. Using the six traits, a questionnaire was developed and loaded on SurveyMonkey, and a survey was subsequently conducted among 270 employees of a selected bank in Zimbabwe. RESULTS: A total of 205 employees responded to the survey, with 179 of the responses being deemed usable (i.e. a response rate of 87%). Data obtained from the survey were subjected to statistical tests, the conclusions of which were used to create the BYOD information security behavioural (BISB) model. CONCLUSION: The article concludes by proposing the BISB model as an effective option for mitigating the information security challenges in BYOD.

        · texto en Inglés     · Inglés ( pdf )

 

Creative Commons License Todo el contenido de esta revista, excepto dónde está identificado, está bajo una Licencia Creative Commons