Financial benefits and increased productivity are two reasons companies are embracing the BYOD environment. When permitting users to connect to the organization’s network, security should be a paramount consideration. To ensure the security of the network, client information, and organizational data requires not only the IT security team instituting proper controls, but the user should understand those vulnerabilities, threats and security measures which can mitigate these concerns. The level of secure smartphone use varies from individual to individual and organizations have a vested interest in providing training to their users who wish to connect to company assets, prior to the user being permitted BYOD privileges. This research project examined the security knowledge gaps between users and IT security professionals in the BYOD environment. This was accomplished by reviewing both the users’ and IT professional’s understanding of threats, vulnerabilities and security processes. The users’ perception of training by the organization was also examined and compared to the IT professional’s perception of training offered by their organization. Through analysis of the participants' responses, it was determined that there are security knowledge gaps between the users and IT professionals of smartphone use. The most critical gaps exist with the perceptions of organizational training and information offered. Users consistently identified the lack of training for the BYOD environment. With the identification of security knowledge gaps, recommendations were offered that an organization should consider prior beginning BYOD.
|Advisor:||Paullet, Karen L.|
|Commitee:||Draus, Peter J., Pinchot, Jamie L., Stone, Steven W.|
|School:||Robert Morris University|
|Department:||Information Systems and Communications|
|School Location:||United States -- Pennsylvania|
|Source:||DAI-A 81/2(E), Dissertation Abstracts International|
|Subjects:||Information Technology, Information science|
|Keywords:||Bring Your Own Device, BYOD, IT Security, Mobile apps, Mobile security, Security training|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be