THE IMPACT OF BRING YOUR OWN DEVICE (BOYD) AND NOMADIC COMPUTING ON ENTERPRISE SECURITY POLICIES’ COMPLIANCE: THE CASE OF HIGHER LEARNING INSTITUTIONS IN KENYA.

Show simple item record

dc.contributor.author WANGARI, EDWIN NG’ANG’A
dc.date.accessioned 2024-05-09T06:34:32Z
dc.date.available 2024-05-09T06:34:32Z
dc.date.issued 2023
dc.identifier.uri https://ir.gretsauniversity.ac.ke/xmlui/handle/20.500.12736/4057
dc.description.abstract Mobility is driving network design, and as such, wireless local area networks (WLANs) have become an important part of enterprise networks in today's business environment. A trend is emerging where consumer adoption of smartphones and tablets is exploding due to their low price and the broad application support that these devices offer because they are Wi-Fi enabled. Desktop computers and laptops are used to gather information; while tablets consume information and smartphones communicate that information. BYOD (Bring Your Own Device) is a term that refers to instances where employees use their personal computing devices (usually smartphones, tablets, and laptops) in the workplace. This trend will continue, and the challenge is that it is a double-edged sword: user satisfaction and productivity on the one hand and enterprise data security on the other. As more employees want to access corporate networks with their personal mobile devices, vendors need to find ways to help companies provide that access in a secure and efficient manner. This is due to the fact that technology is changing very fast and with the consumerization of the IT revolution, there has been a cultural shift, so the users are the ones who get the latest cutting-edge technologies first and want to get these devices working. BYOD is changing the security model for protecting corporate data, blurring the definition of this perimeter by physical location and asset ownership. In this study, bring your own device (BYOD) and nomadic computing were examined for corporate security compliance in HLIs in Africa. A quantitative survey approach was used at ten university campuses to identify BYOD security compliance issues. The study found that Perceived probability of security breach, Perceived severity of security breach, security breach concern level and response efficacy had an impact on Enterprise Security Policies’ Compliance in an enterprise. en_US
dc.publisher Gretsa University en_US
dc.title THE IMPACT OF BRING YOUR OWN DEVICE (BOYD) AND NOMADIC COMPUTING ON ENTERPRISE SECURITY POLICIES’ COMPLIANCE: THE CASE OF HIGHER LEARNING INSTITUTIONS IN KENYA. en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search the Digital Repository


Browse

My Account