当前位置: X-MOL 学术Comput. Secur. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Compliance with Bring Your Own Device security policies in organizations: A systematic literature review
Computers & Security ( IF 4.8 ) Pub Date : 2020-11-01 , DOI: 10.1016/j.cose.2020.101998
Rathika Palanisamy , Azah Anir Norman , Miss Laiha Mat Kiah

Abstract The omnipresence of Bring Your Own Device (BYOD) in organizations and employees’ lives makes it a challenge to ensure adherence to security policy. In such situation, it is vital to understand the features of BYOD that impact the threat landscape, as well as identifying factors that contribute to security policy compliant behavior to create a secure environment in organizations. Though research on BYOD has progressed, the field still lacks a systematic literature analysis, as previous reviews have focused on traditional computing security policy compliance, leaving out the BYOD environment. A total of 21 articles published from 2012 to 2019 were reviewed systematically to answer a formulated set of research questions. The study reveals the unique features of the BYOD computing environment in organizations. This review provides an overview of the theories used to explain and predict security behaviors in this field and a detailed understanding of factors that influence BYOD security policy compliance behavior. Literature gaps for further research are proposed in this paper to present new insights in this field of research. Studies on BYOD security policy compliance remain scarce, which makes this review a novel contribution to human security behavioral studies.

中文翻译:

在组织中遵守自带设备安全策略:系统文献综述

摘要 组织和员工生活中随处可见的自带设备 (BYOD) 使得确保遵守安全策略成为一项挑战。在这种情况下,了解 BYOD 影响威胁格局的特征以及确定有助于安全策略合规行为的因素以在组织中创建安全环境至关重要。尽管 BYOD 的研究取得了进展,但该领域仍然缺乏系统的文献分析,因为之前的评论都集中在传统计算安全策略合规性上,而忽略了 BYOD 环境。系统地审查了 2012 年至 2019 年发表的 21 篇文章,以回答一组制定的研究问题。该研究揭示了组织中 BYOD 计算环境的独特功能。本综述概述了用于解释和预测该领域安全行为的理论,并详细了解影响 BYOD 安全策略合规行为的因素。本文提出了进一步研究的文献空白,以提出该研究领域的新见解。关于 BYOD 安全策略合规性的研究仍然很少,这使得这篇评论对人类安全行为研究做出了新的贡献。
更新日期:2020-11-01
down
wechat
bug