CINXE.COM

Organizational Data Security in Perspective of Ownership of Mobile Devices Used by Employees for Works

<?xml version="1.0" encoding="UTF-8"?> <article key="pdf/10013129" mdate="2023-06-12 00:00:00"> <author>B. Ferdousi and J. Bari</author> <title>Organizational Data Security in Perspective of Ownership of Mobile Devices Used by Employees for Works</title> <pages>343 - 349</pages> <year>2023</year> <volume>17</volume> <number>6</number> <journal>International Journal of Computer and Systems Engineering</journal> <ee>https://publications.waset.org/pdf/10013129</ee> <url>https://publications.waset.org/vol/198</url> <publisher>World Academy of Science, Engineering and Technology</publisher> <abstract>With advancement of mobile computing, employees are increasingly doing their jobrelated works using personally owned mobile devices or organization owned devices. The Bring Your Own Device (BYOD) model allows employees to use their own mobile devices for jobrelated works, while Corporate Owned, Personally Enabled (COPE) model allows both organizations and employees to install applications onto organizationowned mobile devices used for jobrelated works. While there are many benefits of using mobile computing for jobrelated works, there are also serious concerns of different levels of threats to the organizational data security. Consequently, it is crucial to know the level of threat to the organizational data security in the BOYD and COPE models. It is also important to ensure that employees comply with the organizational data security policy. This paper discusses the organizational data security issues in perspective of ownership of mobile devices used by employees, especially in BYOD and COPE models. It appears that while the BYOD model has many benefits, there are relatively more data security risks in this model than in the COPE model. The findings also showed that in both BYOD and COPE environments, a more practical approach towards achieving secure mobile computing in organizational setting is through the development of comprehensive cybersecurity policies balancing employees&amp;rsquo; need for convenience with organizational data security. The study helps to figure out the compliance and the risks of security breach in BYOD and COPE models.</abstract> <index>Open Science Index 198, 2023</index> </article>