dc.description.abstract |
Mobility is driving network design, and as such, wireless local area networks (WLANs) have
become an important part of enterprise networks in today's business environment. A trend is
emerging where consumer adoption of smartphones and tablets is exploding due to their low
price and the broad application support that these devices offer because they are Wi-Fi enabled.
Desktop computers and laptops are used to gather information; while tablets consume
information and smartphones communicate that information. BYOD (Bring Your Own Device)
is a term that refers to instances where employees use their personal computing devices (usually
smartphones, tablets, and laptops) in the workplace. This trend will continue, and the challenge
is that it is a double-edged sword: user satisfaction and productivity on the one hand and
enterprise data security on the other. As more employees want to access corporate networks
with their personal mobile devices, vendors need to find ways to help companies provide that
access in a secure and efficient manner. This is due to the fact that technology is changing very
fast and with the consumerization of the IT revolution, there has been a cultural shift, so the
users are the ones who get the latest cutting-edge technologies first and want to get these
devices working. BYOD is changing the security model for protecting corporate data, blurring
the definition of this perimeter by physical location and asset ownership. In this study, bring
your own device (BYOD) and nomadic computing were examined for corporate security
compliance in HLIs in Africa. A quantitative survey approach was used at ten university
campuses to identify BYOD security compliance issues. The study found that Perceived
probability of security breach, Perceived severity of security breach, security breach concern
level and response efficacy had an impact on Enterprise Security Policies’ Compliance in an
enterprise. |
en_US |