Loading

Empirical Survey on BYOD Security and Usage
P. Soubhagyalakshmi1, K. Satyanarayan Reddy2
1P. Soubhagyalakshmi, Research Scholar, Visvesvaraya Technological University, Belagavi, India.
2Dr. K. Satyanarayan Reddy, Department of ISE, Cambridge Institute of Technology, Bangalore, India.

Manuscript received on 01 April 2019 | Revised Manuscript received on 04 May 2019 | Manuscript published on 30 May 2019 | PP: 2784-2788 | Volume-8 Issue-1, May 2019 | Retrieval Number: A1820058119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Recently, Bring Your own Device or BYOD has become one of the most popular models for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral parts of every aspect of daily business activities. Also, mobile networks are now well integrated with the Internet (e.g. 3G, 4G and LTE technologies), therefore, in BYOD, the personal devices (i.e. mobile devices) can be used to increase employees’ satisfaction and reduce an organization’s device costs. Mobile devices are not well protected compared to computer and computer networks and users pay less attention to security updates and solutions. In this paper, the work focus on identifying the willingness to adopt BYOD in Companies in Bangalore by conducting a Questionnaire Survey so that their views are understood appropriately. From this survey, it is possible to identify the importance and requirement of the BYOD deployment in various business verticals in near future. Even, it gives the understanding of the usage of types of BYOD schemes or policies adopted by the employees in various organizations. This survey paper helpful and led to the origin of research by analyzing BYOD policies to avoid the security breaches with better capabilities of policies. Using the employee own devices at workplace causes the security risks. This paper highlights the need and necessity to mitigate the security issues related to the sensible data as the employees are willing to make use of their own devices at workplace. This paper conveys that, there is a need of security as the use of BYOD usage by the employees in the various organizations.
Index Terms: BYOD, Security & Deployments.

Scope of the Article: Empirical Software Engineering