Cybersecurity Strategies for Universities With Bring Your Own Device Programs
The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT)...
Main Author: | |
---|---|
Format: | Others |
Language: | en |
Published: |
ScholarWorks
2019
|
Subjects: | |
Online Access: | https://scholarworks.waldenu.edu/dissertations/7887 https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=9159&context=dissertations |
id |
ndltd-waldenu.edu-oai-scholarworks.waldenu.edu-dissertations-9159 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-waldenu.edu-oai-scholarworks.waldenu.edu-dissertations-91592020-01-08T15:44:32Z Cybersecurity Strategies for Universities With Bring Your Own Device Programs Nguyen, Hai Vu The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. The data collection process included interviews with 10 IT security professionals and the gathering of publicly-accessible documents retrieved from the Internet (n = 59). Data collected from the interviews and member checking were triangulated with the publicly-accessible documents to identify major themes. Thematic analysis with the aid of NVivo 12 Plus was used to identify 4 themes: the ubiquity of BYOD in higher education, accessibility strategies for mobile devices, the effectiveness of BYOD strategies that minimize risk, and IT security professionals' tasks include identifying and implementing network security strategies. The study's implications for positive social change include increasing the number of users informed about cybersecurity and comfortable with defending their networks against foreign and domestic threats to information security and privacy. These changes may mitigate and reduce the spread of malware and viruses and improve overall cybersecurity in BYOD-enabled organizations. 2019-01-01T08:00:00Z text application/pdf https://scholarworks.waldenu.edu/dissertations/7887 https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=9159&context=dissertations Walden Dissertations and Doctoral Studies en ScholarWorks byod cybersecurity higher education strategies Databases and Information Systems |
collection |
NDLTD |
language |
en |
format |
Others
|
sources |
NDLTD |
topic |
byod cybersecurity higher education strategies Databases and Information Systems |
spellingShingle |
byod cybersecurity higher education strategies Databases and Information Systems Nguyen, Hai Vu Cybersecurity Strategies for Universities With Bring Your Own Device Programs |
description |
The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. The data collection process included interviews with 10 IT security professionals and the gathering of publicly-accessible documents retrieved from the Internet (n = 59). Data collected from the interviews and member checking were triangulated with the publicly-accessible documents to identify major themes. Thematic analysis with the aid of NVivo 12 Plus was used to identify 4 themes: the ubiquity of BYOD in higher education, accessibility strategies for mobile devices, the effectiveness of BYOD strategies that minimize risk, and IT security professionals' tasks include identifying and implementing network security strategies. The study's implications for positive social change include increasing the number of users informed about cybersecurity and comfortable with defending their networks against foreign and domestic threats to information security and privacy. These changes may mitigate and reduce the spread of malware and viruses and improve overall cybersecurity in BYOD-enabled organizations. |
author |
Nguyen, Hai Vu |
author_facet |
Nguyen, Hai Vu |
author_sort |
Nguyen, Hai Vu |
title |
Cybersecurity Strategies for Universities With Bring Your Own Device Programs |
title_short |
Cybersecurity Strategies for Universities With Bring Your Own Device Programs |
title_full |
Cybersecurity Strategies for Universities With Bring Your Own Device Programs |
title_fullStr |
Cybersecurity Strategies for Universities With Bring Your Own Device Programs |
title_full_unstemmed |
Cybersecurity Strategies for Universities With Bring Your Own Device Programs |
title_sort |
cybersecurity strategies for universities with bring your own device programs |
publisher |
ScholarWorks |
publishDate |
2019 |
url |
https://scholarworks.waldenu.edu/dissertations/7887 https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=9159&context=dissertations |
work_keys_str_mv |
AT nguyenhaivu cybersecuritystrategiesforuniversitieswithbringyourowndeviceprograms |
_version_ |
1719307345437130752 |