A Bring Your Own Device Risk Assessment Model
View/ Open
Publication Date
2021Author
M. Cyprian Oonge S. Omboga, Muhambe, T. Mukisa , Ratemo
Metadata
Show full item recordAbstract/ Overview
Bring Your Own Device (BYOD), a technology where individuals or employees use their own
devices on the organization’s network to perform tasks assigned to them by the organization has
been widely embraced. The reasons for adoption are diverse in every organization. In spite of the
security control strategies implemented by these organizations to safeguard their information
resources, there has been an upsurge in information security breaches as a result of existing
vulnerabilities in these systems and the legacy systems in use. Various approaches have been
employed to deal with security challenges in BYOD, but according to literature, risk assessment
has proved to be the first key step towards improving security of the BYOD environment in an
enterprise. Risk assessment models have been proposed by various researchers, although, most
are largely influenced by the degree of technological advancement and utilization as well as the
working cultures within institutions. The existing models were largely developed in technologically
advanced countries and thus do not fit well in developing countries. This study sought to develop
flexible BYOD risk assessment model that can be adopted by varied institutions to secure their
information resources. The study was carried out in Five (5) purposively selected state
universities in Kenya. The research adopted a mixed research design approach with mixed
sampling technique utilized to select the participants. Reliability and validity of data collection
tools were evaluated and recommended by IT security and network experts. The qualitative and
quantitative data was collected by interviewing experts and administering a questionnaire to
sampled participants. The developed model was validated both statistically and by experts. The
findings revealed that threats and vulnerabilities contributed to 39.9% and 69.2% respectively to
the risk of the BYOD environment while Data Encryption (DE) and Software Updates (SU) came
out strongly as intervening variables which have a major impact on the relationship between the
dependent and independent variables.