Cybersecurity Strategies for Universities With Bring Your Own Device Programs

The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT)...

Full description

Bibliographic Details
Main Author: Nguyen, Hai Vu
Format: Others
Language:en
Published: ScholarWorks 2019
Subjects:
Online Access:https://scholarworks.waldenu.edu/dissertations/7887
https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=9159&context=dissertations
id ndltd-waldenu.edu-oai-scholarworks.waldenu.edu-dissertations-9159
record_format oai_dc
spelling ndltd-waldenu.edu-oai-scholarworks.waldenu.edu-dissertations-91592020-01-08T15:44:32Z Cybersecurity Strategies for Universities With Bring Your Own Device Programs Nguyen, Hai Vu The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. The data collection process included interviews with 10 IT security professionals and the gathering of publicly-accessible documents retrieved from the Internet (n = 59). Data collected from the interviews and member checking were triangulated with the publicly-accessible documents to identify major themes. Thematic analysis with the aid of NVivo 12 Plus was used to identify 4 themes: the ubiquity of BYOD in higher education, accessibility strategies for mobile devices, the effectiveness of BYOD strategies that minimize risk, and IT security professionals' tasks include identifying and implementing network security strategies. The study's implications for positive social change include increasing the number of users informed about cybersecurity and comfortable with defending their networks against foreign and domestic threats to information security and privacy. These changes may mitigate and reduce the spread of malware and viruses and improve overall cybersecurity in BYOD-enabled organizations. 2019-01-01T08:00:00Z text application/pdf https://scholarworks.waldenu.edu/dissertations/7887 https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=9159&context=dissertations Walden Dissertations and Doctoral Studies en ScholarWorks byod cybersecurity higher education strategies Databases and Information Systems
collection NDLTD
language en
format Others
sources NDLTD
topic byod
cybersecurity
higher education
strategies
Databases and Information Systems
spellingShingle byod
cybersecurity
higher education
strategies
Databases and Information Systems
Nguyen, Hai Vu
Cybersecurity Strategies for Universities With Bring Your Own Device Programs
description The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. The data collection process included interviews with 10 IT security professionals and the gathering of publicly-accessible documents retrieved from the Internet (n = 59). Data collected from the interviews and member checking were triangulated with the publicly-accessible documents to identify major themes. Thematic analysis with the aid of NVivo 12 Plus was used to identify 4 themes: the ubiquity of BYOD in higher education, accessibility strategies for mobile devices, the effectiveness of BYOD strategies that minimize risk, and IT security professionals' tasks include identifying and implementing network security strategies. The study's implications for positive social change include increasing the number of users informed about cybersecurity and comfortable with defending their networks against foreign and domestic threats to information security and privacy. These changes may mitigate and reduce the spread of malware and viruses and improve overall cybersecurity in BYOD-enabled organizations.
author Nguyen, Hai Vu
author_facet Nguyen, Hai Vu
author_sort Nguyen, Hai Vu
title Cybersecurity Strategies for Universities With Bring Your Own Device Programs
title_short Cybersecurity Strategies for Universities With Bring Your Own Device Programs
title_full Cybersecurity Strategies for Universities With Bring Your Own Device Programs
title_fullStr Cybersecurity Strategies for Universities With Bring Your Own Device Programs
title_full_unstemmed Cybersecurity Strategies for Universities With Bring Your Own Device Programs
title_sort cybersecurity strategies for universities with bring your own device programs
publisher ScholarWorks
publishDate 2019
url https://scholarworks.waldenu.edu/dissertations/7887
https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=9159&context=dissertations
work_keys_str_mv AT nguyenhaivu cybersecuritystrategiesforuniversitieswithbringyourowndeviceprograms
_version_ 1719307345437130752