"Bring your own device opportunities", challenges and risks in organizations

Authors

  • David Leonardo Moreno Rojas Universidad Manuela Beltrán de Bogotá-Colombia

DOI:

https://doi.org/10.21754/tecnia.v25i1.17

Keywords:

BYOD, MDM administration, training, increase productivity, organizations challenges, trends mobile devices, consumerization of IT security policies

Abstract

The current availability of 3G services, 4G and growth presented by mobile technology in devices such as smartphones, tablets and laptops have spawned a new phenomenon in organizations which integrates communication and the ability to conduct business from their own devices . BYOD (Bring Your Own Device), means that employees can use their personal devices to access resources within the organization and outside it in order to do their job, this represents new opportunities, but also involves mitigating and assume the risks that are associated. This article presents opportunities, challenges and risks that may arise in organizations when they allow access to the corporate network of personal devices for employees to carry out their activities.

Downloads

Download data is not yet available.

References

[1] Sdad ICO, (2013), “Bring your own device (BYOD)”. [Online]. http://ico.org.uk/news/latest_news/2013/~/me dia/documents/library/Data_Protection/Practi cal_application/ico_bring_y our_own_device_byod_guidance.pdf (Accedida el 2 de Julio,2014.2.

[2] Harkins, M., Mobile. “Learn from Intel's CISO on Securing Employee-Owned Devices”. [Online]. Disponible en: http://www.govinfosecurity.com/webinars/mobile-learn-from-intels-ciso-on-securing-employee-owned-devices-w-264 (Accedido el 15 de Julio2014)

[3] Lui, S., (2012) “Citrix favours selective BYOD program”. [Online]. Disponible en: http://www.zdnet.com/au/citrix-favours-

selective-byod-program-7000008790/ (Accedida el 15 de Julio 2014)

[4] Rege, O., (2011), “Bring Your Own Device: Dealing With Trust and Liability Issues, CIO Network: Insights and Ideas for Technology Leaders, Forbes”. [Online]. Disponible en: http://www.forbes.com/sites/ciocentral/2011/08/17/bring-your-own-device-dealing-with-trust-and-liability-issues/(Accedidoel 16/07/2014).

[5] Johnson, K., Filkins, B. L., (March 2012), “SANS Mobility/BYOD Security Survey”, [Online].Disponibleen: http://www.sans.org/reading_room/analysts_program/mobility-sec-survey.pdf. (Accedido: 16/07/2014).

[6] Willis, D. A., (2013), “Bring Your Own Device: The Facts and the Future, Research G00250384, Gartner”. [Online]. Disponible en:https://l1.osdimg.com/remote-support/dam/pdf/en/bring-your-own-device-the-facts-and-the-future.pdf/jcr:content/renditions/original (Accedido el18/07/2014).

[7] TechRepublic, (2013),“TheExecutive’s Guide to BYOD and the Consumerization of IT”.[Online].Disponibleen: http://www.talkezy.com.au/uploads/whitepap ers/The_Executives_Guide_to_BYOD_and_ the_Consumerisation_of_IT.pdf(Accedido: 21/07/2014).

[8] Ponemon Institute, (2012),” Global Study on Mobility Risks”, [Online]. Disponible en: http://www.ponemon.org/local/upload/file/We bsense_Mobility_ US_Final.pdf (Accedido: 21/07/2014).

[9] Bort, J. (2012) “Managing An Explosion Of MobileDevicesAndAppsInThe Enterprise”. [Online] Disponible en: http://www.businessinsider.com/how-companies-are-managing-the-explosion-of-mobile-devices (Accedido:21/07/2014).

[10] Belak, M. (2011): “Allowing Personal Devices At Work: A Faustian Bargain?, InformationWeek”, [Online]. Disponible en: http://www.informationweek.com/news/globa l-cio/interviews/231601782 (Accedido el 18/07/2014).

[11] SIFMA IT audit session, (2012) “Bring your own device (BYOD) trends and audit considerations”, [Online] Disponible en: http://www.sifma.org/uploadedfiles/societies/sifma_internal_auditors_society/bring%20you r%20own%20device%20trends%20a nd%20audit%20considerations.pdf Accedido el 21/07/2014)

[12] Jen, C. (2013) “What do Employees Really Think about BYOD? “. [Online]. Disponible enhttp://truewirelessinc.com/byod/what-do-employees-really-think-about-byod/ (Accedido:21/07/2014)

[13] BYOD By The Numbers [Infographic] Disponible en: http://readwrite.com/2013/03/26/intel-byod-by-the-numbers (Accedido:23/07/2014)

[14] Morrow, B. (2012). “BYOD security challenges: control and protect your most sensitive data”. [Online] Disponible en http://www.businesscomputingworld.co.uk/byod-security-challenges-control-and-protect-your-most-sensitive-data/(Accedido: 23/07/2014).

[15] ESET (2012) “Retos de la seguridad para las empresas a partir de BYOD”. [Online] Disponible en: http://www.welivesecurity.com/wp-content/uploads/2014/01/seguridad_en_byod. pdf (Accedido el23/07/2014).

[16] Cisco (2012) Disponible en:http://www.cisco.com/web/offer/grs/82089/3/IBSG_Research_Report-BYOD_and_Virtualization_Research_Report. pdf (Accedido:21/07/2014).

[17] Deloitte, (2013) “Tecnología, Medios de Comunicación y Telecomunicaciones Predicciones 2013” [Online] Disponible en: http://webserver2.deloitte.com.co/TMT/Deloitte%20Prediccione s%20TMT%202013%20esp.pdf(Accedido: 23/07/2014).

[18] Ayrapetov, D., (2013), “Cybersecurity challenges in 2013”. [Online]. Disponible en: http://www.techrepublic.com/blog/security/cybersecurity-challenges-in-2013/9038. (Accedido:23/07/2014)

[19] Goldman,J.,(2012),“95Percentof Smartphones and Tablets Are Unprotected”. [Online]. Disponible en: http://www.esecurityplanet.com/mobile-security/95-percent-of-smartphones-and-tablets-are-unprotected.html. (Accedido: 23/07/2014).

[20] Fieldman,M.,(2012),“TheLatest Infographics: Mobile Business StatisticsFor

”.[Online].Disponibleen: http://www.forbes.com/sites/markfidelman/2012/05/02/the-latest-infographics-mobile-business-statistics-for-2012/.(Accedido: 23/07/2014).

[21] Harris, C., (2012), “Mobile Consumerization Trends & Perceptions”. [Online]. Disponible en:http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_decisive-analytics-consumerization-surveys.pdf.(Accedido: 23/07/2014).

[22] Garlati, C., (2013) The Financial Impact of Consumerization–TheHiddenCosts [Online].Disponible en: http://bringyourownit.com/2013/02/04/the-financial-impact-of-consumerization-the-hidden-costs/#more-1127(Accedido: 24/07/2014).

[23] Bestmann, M., (2012) “ TheEvolution of IT: BYODandConsumerization”.,[Online] Disponible en: http://www.technewsworld.com/story/75723. html (Accedido:24/07/2014)

[24] Juniper, (2011), “Mobile Device Security –EmergingThreats,EssentialStrategies”. [Online]. Disponible en: http://www.juniper.net/us/en/local/pdf/whitep apers/2000372-en.pdf.(Accedido: 24/07/2014).

[25] Schneier, B., (2008), “The Psychology of Security”.[Online].Disponibleen: http://www.schneier.com/essay-155.html (Accedido:24/07/2014).

[26] Aranguren, M., Haciendo Inteligente mi movilidad (Oct2011), fDisponible en http://sasorigin.onstreammedia.com/origin/isa ca/LatinCACS/cacs/lat/forSystemUse/papers/ 123.pdf. (Accedido:24/07/2014).

[27] ISO/IEC27002: 2005.“Information technology” —Security techniques —Code ofpracticeforinformationsecurity management.

[28] Rhodes, A., (2013), “5 tips for secure, productive use of BYOD”. [Online]. Disponibleen:http://www.usatoday.com/story/cybertruth/2013/07/17/5-tips-for-secure-productive-use-of-byod/2525663/ (Accedido: 28/07/2014).

[29] Bradford Networks, (2012), “Ten Steps To SecureBYOD”.[e-book]Cambridge: Bradford Networks. http://www.cadincweb.com/wp-content/uploads/2012/04/CAD_BRAD_Ten_ Steps_to_Secure_BYOD.pdf.(Accedido: 28/07/2014).

[30] F-Secure, (2012), “Mobile ThreaT reporT Q4 2012”. [e-book] Finland: F-Secure Labs. http://www.f-secure.com/static/doc/labs_global/Research/ Mobile%20Threat% 20Report%20Q4%202012.pdf.(Accedido: 28/07/2014).

[31] Smith, C., (2014), “Why you should always back up your smartphone before telling off your boss”. [Online]. Disponible en: http://bgr.com/2014/01/22/byod-remote-wipe/(Accedido:28/07/2014).

[32] Ayrapetov, D., (2013), “Cybersecurity challenges in 2013, IT Security, Tech Republic”. [Online]. Disponible en: http://www.techrepublic.com/blog/security/cybersecurity-challenges-in-2013/9038 (Accedido:28/07/2014).

Published

2015-06-01

How to Cite

[1]
D. L. Moreno Rojas, “‘Bring your own device opportunities’, challenges and risks in organizations”, TEC, vol. 25, no. 1, p. 10, Jun. 2015.

Issue

Section

Articles