Doktorarbeit / Dissertation, 2016
136 Seiten, Note: 3.923
Section 1: Foundation of the Study
Background of the Problem
Problem Statement
Purpose Statement
Nature of the Study
Research Question and Hypotheses
Theoretical Framework
Operational Definitions
Assumptions, Limitations, and Delimitations
Assumptions
Limitations
Delimitations
Significance of the Study
Contribution to Information Technology Practice
Implications for Social Change
A Review of the Professional and Academic Literature
Systems Theory
Evolution of Systems Theory
Application of Systems Theory
Supporting Theories
Contrasting Theories
Bring Your Own Device Implementation
Bring Your Own Device Overview
Benefits of Bring Your Own Device
Security Challenges of Bring Your Own Device Implementation
Compliance
The Need for a Bring Your Own Device Policy
Employees’ Compliance with Policies
Security
Information Security Risk Management
Potential Impact to an Organization
Bring Your Own Device Security Challenges
Bring Your Own Device Security Framework
Gap in the Literature
Transition and Summary
Section 2: The Project
Purpose Statement
Role of the Researcher
Participants
Research Method and Design
Method
Research Design
Population and Sampling
Ethical Research
Data Collection
Instruments
Data Collection Technique
Data Organization Techniques
Data Analysis Techniques
Reliability and Validity
Reliability
Validity
Transition and Summary
Section 3: Application to Professional Practice and Implications for Change
Overview of Study
Presentation of the Findings
Data Management Procedures
Reliability Analysis
Descriptive Statistics
Analysis
Assumptions
Summary
Theoretical Conversation on Findings
Applications to Professional Practice
Implications for Social Change
Recommendations for Action
Recommendations for Further Study
Reflections
Summary and Study Conclusions
References
This study aims to examine the implementation challenges of Bring Your Own Device (BYOD) concepts within small to medium-sized organizations in Kenya, focusing specifically on the correlation between security, compliance, and the intent to implement BYOD among certified information security managers.
Section 1: Foundation of the Study
The use of personal mobile devices in the workplace is gaining prominence and acceptance as many people are using their personal devices to conduct certain aspects of their work (Waterfill and Dilworth, 2014). A bring your own device (BYOD) policy affords the opportunity of using a single personal device for (a) anything, personal and business use; (b) anywhere, mobile use through the Internet or wireless LAN (WLAN); and (c) anytime, working hours and off-duty hours (Disterer & Kleiner, 2013). BYOD benefits such as cost savings, increased productivity, and improved efficiency are factors in its’ gaining popularity and acceptance (Fiorenza, 2013).
While BYOD affords several opportunities and benefits, there are also challenges. The issues of managing security for BYOD, defining what is acceptable use for employees and organizations, and data retrieval from personal devices are key concerns for organizations that have implemented BYOD or are contemplating implementation (Waterfill and Dilworth, 2014; de las Cuevas et al., 2015) Privacy and legal concerns are also issues that need to be addressed from a strategic perspective to ensure a successful BYOD program as BYOD involves both organizational data and employees’ private data residing on a personal device (Peretti & Sarkisian, 2014). A comprehensive BYOD security framework that encompasses people, policy, management, and technology should be developed to address security concerns and ensure organizations can realize the benefits afforded by BYOD (Zahadat, Blessner, Blackburn, & Olson, 2015).
Section 1: Foundation of the Study: This chapter provides an introduction to the BYOD phenomenon, discussing its rise in popularity, associated benefits, and critical security and compliance challenges, while establishing systems theory as the primary theoretical framework.
Section 2: The Project: This chapter explains the methodology and research design used to collect and analyze quantitative data from information security managers to answer the study's research question.
Section 3: Application to Professional Practice and Implications for Change: This chapter presents the findings derived from the survey analysis, discusses theoretical implications, and offers recommendations for IT leaders regarding the strategic implementation of BYOD policies.
BYOD, Bring Your Own Device, Information Assurance, Information Security, Compliance, Systems Theory, Quantitative Research, IT Leadership, Risk Management, Mobile Device Management, CISM, Policy Implementation, Security Framework, Data Protection, Organizational Strategy.
The study focuses on the implementation challenges of the Bring Your Own Device (BYOD) concept, specifically within the context of information assurance and security in small to medium-sized organizations.
The work covers systems theory application, BYOD implementation strategies, the necessity for robust compliance and security policies, and an analysis of the risks and challenges inherent in personal device usage within business environments.
The study seeks to identify the relationship between information security managers’ intentions, their perceptions of security, and their compliance regarding BYOD implementation.
The author employed a quantitative research method utilizing a non-experimental correlational design, involving surveys distributed to certified information security managers.
The main body examines existing literature on BYOD, provides an in-depth analysis of systems theory as a theoretical framework, and describes the data collection and statistical analysis procedures used to test research hypotheses.
The key themes are defined by terms such as BYOD, Information Security, Systems Theory, Compliance, and Organizational Risk Management.
The population was limited to CISM-certified information security managers because they possess the demonstrated expertise required to assess complex security threats and the organizational impact of BYOD implementation.
The statistical analysis indicated that the overall regression model was not significant, meaning no direct relationship was found between the combined values of security and compliance and the intent to implement BYOD, although a weak negative correlation was observed between security and compliance.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

