Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 6

Security and Privacy Challenge in Bring Your

Own Device Environment : A Systematic


Literature Review
Tanty Oktavia Yanti
Doctor of Computer Science Doctor of Computer Science
School of Information Systems School of Information Systems
Bina Nusantara University Bina Nusantara University
Jakarta, Indonesia Jakarta, Indonesia
toktavia@binus.edu yanti@binus.edu

Harjanto Prabowo Meyliana


Doctor of Computer Science School of Information Systems
Bina Nusantara University Bina Nusantara University
Jakarta, Indonesia Jakarta, Indonesia
harprabowo@binus.edu meyliana@binus.edu

Abstract— BYOD (Bring Your Own Device) has emerged as However naturally, people prefer to use their own
the fastest growing phenomenon that IT divisions have had to device because it is often their quickest and most pleasant to
deal. Interesting fact that today there are a variety of tools used monitor of their own agendas, reduce personal information
to communicate with stakeholder (supplier, customer, overload, optimize the cognitive effort required to be
distributor, etc) in boundless place, so organizations' data will
be kept in the various device. The changing of this era drives the
multitasking and customize devices that fit personal work
current trend of employees using their own laptop computers, styles[6]. It also along with a number of opportunities for
cellular phones, smart phones, tablet, etc; both for personal and organization itself, one of them is that it cuts costs of
for work related. However to successfully implement BYOD, organization by shifting the price to buy a device to
problems associated with privacy and security in BYOD employee and because people tend to take better care of their
environment should be identified. According to this own devices, so the organization do not need to replace or
circumstance, this study aims to identify some of the legal issues maintenance the broken or stolen devices [7].
related to security and privacy challenge in BYOD (Bring Your The dramatic trend of BYOD brings many challenges
Own Device) era, which can be a suggestion for institution to and concerns. It has forced enterprises to adopt a BYOD
aware with these issues because security and privacy is the most vision that is keeping their IT Division on alert for new
important to any size of organization to run their business
possible security threats coming from internal and
process.
Keywords—component: BYOD, security, privacy challenge external[8]. The organization data accessed by an employee
using its personal device may contain usernames, passwords,
I. INTRODUCTION confidential emails and documents, text messages, call logs,
calendar entries for the meeting, future strategies and
The emergence of Web 2.0 and technology of mobile employees contact list, etc[9]. Since there are many sensitive
devices offer an integral of every aspect in business process and privacy data on the organization are present, the device
and a free environment to share with users and stakeholders must be secured from any attack, so the organization needs to
[1]. This terminology comes from IT Consumerization identify BYOD policy to secure the device [10].
concept [2]. According to this phenomenon, BYOD (Bring In BYOD environment, there are many behavioral
Your Own Device) is becoming more and more popular in the elements, such as personal devices, access environment, and
workplace for official use [3]. The BYOD environment such characteristics make analysis possible through
changes the operational processes and methods of patterning the access of each use[11]. According to these,
organization to operate their business because with BYOD there exist different policies followed by different
allows employees to bring and use their personal mobile organizations as a security solution for BYOD.
device, whether inside or outside of their working place [4].
In some organizations that have more concern on security, II. THEORETICAL BACKGROUND
BYOD is not allowed to be adopted. Moreover, the security 2.1 BYOD
level of the private network generally is lower than that of Prior to 1990s, organizations were used in
public networks[5]. traditional office settings, through face to face environment.
Office equipment consists of telephones, computer, scanner, After we identified the background of study, then we
printer, etc [12]. After over a decade of adoption of internet analyze the finding into some categories, which are :
governance advances in technology and the dramatic change, source of publications, the most prolific authors, the
with increasing use of complementary technologies, such as most productive institutions, authors’ academic
mobile devices [13]. This phenomenon has shifted background, background of authors, university in
organization to be flexible. One of the concepts is Bring country, year of publications, researched industries and
Your Device (BYOD) environment. BYOD sometimes countries, and researched institution size.
called BYOT (Bring Your Own Technology) or “IT The sources of literature gathered from several sources,
Consumerization” is the concept to allow employees to bring which are:
their own personal devices to a workplace that are capable of  IEEEXplore Digital Library (http:/ieeexplore.ieee.org)
connecting to the internet. The devices can include  Science Direct (www.sciencedirect.com)
notebooks, tablets, smartphones, e-readers, etc[14].  Palgrave Macmillan (www.palgrave-journals.com)
BYOD adoption is broadened and still continues to  Wiley Online Library (onlinelibrary.wiley.com)
transform how people and organization operate[15].  Inderscience Publishers (www.inderscience.com)
Enhancing employee satisfaction and productivity of  Emerald Insight (www.emeraldinsight.com)
organization could be as key advantages when implementing  Springer Link (link.springer.com)
BYOD in organizations.  Proquest (http://www.proquest.com/)
 TaylorFrancis
2.2 Security (http://taylorandfrancisgroup.com/journals/)
Organization and individual have been constantly facing  Cambridge University Press
threats when the rely more on the emerging technologies[16]. (http://www.cambridge.org/)
The implementation of BYOD gives impact to the Search Process
organization also give direct impact to the owner or personal The keywords are used to find a literature based on the
devices[17]. In fact, the increasing use of mobile devices and research question of this study using a combination of
adoption of Bring Your Own Device (BYOD) policy suggest Boolean operators (AND / OR). The following pattern of
that event security mistakes, such as what if the device is keyword that is used in this study:
stolen? The fact is not only we lost the device but the Table 1. Searching Process
sensitive data from the organization may be lost too.
Research Question Keyword Search Process
Organization requires secure policy and reliable information
because currently, they depend on Information Technology What are the privacy  (BYOD OR (Bring AND
(IT) to organize their business process. Information security challenges in BYOD Your AND Own AND
itself refers to protection of important asset of the environment? Device)) AND
organization[4]. (Security) AND (Privacy
What are the criteria of AND Challenges)
2.3 Privacy Challenge security in BYOD?  (BYOD AND
The issues about privacy in organizations are always defined (Information AND
to be a significant issue for business. Organizational privacy Security) AND (Privacy
is the behavior of organization to protect their information AND Challenges))
assets and their customer personally identifiable information  (BYOD AND
[18]. With organization continuously facing privacy issues, (Information AND
the organization also need to recognize the importance step Security) OR (Privacy
to keep personal information. AND Challenges))
Inclusion and Exclusion Criteria’s
III. RESEARCH METHOD Each keyword was inserted into journal and conference
In this study, we use a Systematic Literature Review publisher to find a suitable literature according to answer the
(SLR) method to enable us to identify the component of research question. There are a numerous journal and
privacy challenge and information security in Bring Your conference display, then we try to filter the literature using 3
Own Device (BYOD) era. SLR is one of research method to (three) steps, which are:
find a state of the art from researcher before. The result from 1. Studies Found
SLR is summarizing from the result of research before to The paper those related to the specified keyword search
conduct further research. process is classified into studies found.
A systematic literature review is divided into: 2. Studies Candidate
1. Introduction The next step is reading the abstract and paper title of
In this step, we identify a scope, research question, literature. If the abstract and title are sufficient to answer
search process, inclusion and exclusion criteria, and the research question then this paper will be included for
data extraction further step. All of the paper that suitable will be
2. Analysis of the result classified into studies candidate group.
3. Studies Selected 4.1 Source of Publications
After we have studies candidate, for the next step we read There are only a few of published papers that describe a
thoroughly of introduction and conclusion. The paper that component of security and privacy challenge in BYOD.
suitable will be used in this study as “studies selected”. Some of the journals and conferences that are published
about this topic, which are : journal of legal information
The following is searching process of this study: management, 2nd International Symposium on Big Data and
Cloud Computing, Journal Computers & Security, and
Journal of Information Privacy and Security. The following
list of journal for selected paper :
Table 3. List of Journal
Journal/
Title Confere Source # %
nce
Learning on the Journal Legal 1 20%
Wires: BYOD, Information
Embedded Systems, Managemen
Wireless t
Figure 1. Searching Process Technologies
and Cybercrime
Literature was excluded in this study if the publications date Modifying security Conferen 2nd 1 20%
before 2000 and the duplicate paper of the study. policies towards ce Internationa
BYOD l
Data Extraction Symposium
This systematic literature review was examined 41 on Big Data
papers from all publishers. From 41 examined papers, there and Cloud
are 9 papers which were selected to be candidate studies Computing
based on the title of papers and abstract to answer the (ISBCC’15)
research questions of this study. In the last process, we chose Comparing intention Journal Computers 2 40%
5 papers which can be used in this research, based on the to avoid malware & Security
across contexts in a
content of those papers which related to the topic. The BYOD-enabled
following is data extraction result to describe the filtering Australian
process of this study: university: A
Table 2. Data Extraction in Inclusion Criteria Protection Motivation
Source Found Candidate Selected Theory approach [1]
Proquest 29 1 0 BYOD Security
Taylor Francis 5 2 1 Engineering: A
Science Direct 6 5 3 Framework & its
Cambridge 1 1 1 Analysis [2]
Total 41 9 5 Review of the Journal Journal of 1 20%
Information Security Information
IV. RESULT AND DISCUSSION and Privacy Privacy and
Challenges in Bring Security
Increased Bring Your Own Device (BYOD) adoption Your Own Device
must comply with a variety of legal regulations because, in (BYOD)
BYOD, all users need to secure the enterprise’s confidential Environments
resource and data. Moreover, users need to adapt and to Total 5
realize the critical role they play [19]. Hence BYOD threat
can be approached from multiple perspectives including 4.2 The most prolific authors
organizational and technical. According to this fact, we use As seen from table 4, there are 13 authors who have written 5
Systematic Literature Review (SLR) to conceptualize a papers in security and privacy challenge for BYOD
security and privacy challenge in BYOD organization, so the environment, which are : Brunella Longo, Vignesh U,
user will aware with every factor. Asha.S, Duy Dang-Pham, Siddhi Pittayachawan, Nima
The following is the result of analysis using Systematic Zahadat, Paul Blessner, Bill A. Olson, Timothy Blackburn,
Literature Review (SLR) technique :
Abubakar Bello Garbaa, Jocelyn Armaregoa, David Background Author # %
Murraya, and William Kenworthya
Table 4 List of Authors Lecturer 6 46%
Author # % Professional 4 31%
Brunella Longo 1 8% Student 3 23%
Vignesh.U 1 8% Total 13  
4.6 The Most Productive Institutions
Asha.S 1 8% The most productive institutions come from Murdoch
Duy Dang-Pham 1 8% University (4 authors) and The George Washington
Siddhi Pittayachawan 1 8% University (4 authors).
Table 8. University of Author
Nima Zahadat 1 8%
Institution #Authors %
Paul Blessner 1 8%
Murdoch University 4 31%
Bill A. Olson 1 8%
The George Washington University 4 31%
Timothy Blackburn 1 8%
RMIT University 2 15%
Abubakar Bello Garbaa 1 8%
VIT University 2 15%
Jocelyn Armaregoa 1 8%
University of Cambridge 1 8%
David Murraya 1 8%
Total 13  
William Kenworthya 1 8%
4.6 Year of Publications
Total 13   This topic of research is still new, we can check from the
4.3 University Affiliation According to Country year of publication. As seen from table 9, this topic begins to
The most productive affiliation of security and privacy research from 2013. So it means, this topic still new then we
challenge topic in BYOD come from Australia (6 authors) can explore about this topic for further research.
and United States (4 authors). Table 9. Publication Year
Table 5. Researchers’ Country and Institution Year # %
Country #Inst %Inst #Author %Author 2015 3 60%
United 2014 1 20%
Kingdom 1 8% 1 8%
2013 1 20%
India 2 15% 2 15%
Total 5  
Australia 6 46% 6 46% 4.7 Researched Industries and Countries
United This topic come from specific industry, but it can be
States 4 31% 4 31% implemented from various sectors. From the description in
Total table 10, we can see the industry/sector that is possible to
Country : implement.
4 13   13   Table 10. Researched Industries and Countries
4.4 Authors’ academic background In
From table 6, we can conclude the most authors' academic Industry/sector #Papers %
Country
background for this research topic come from an information
system, which are 46%. Education Industry Australia 1 20%
Table 6. Discipline of Author Information
Discipline of Author # % Technology Industry Cambridge 1 20%
United
Computer Science 3 23%
Security Industry State 1 20%
Information System 6 46% India,
Engineering 3 23% General Australia 2 40%
Health 1 8% Total 5  
Total 13  
4.5 Background of Authors 4.8 Researched Institution Size
Table 7 shows the researchers’ background of expertise. The Table 11 shows that research institution falling in the small
13 researcher are categorized into 3 fields, which are lecturer company, which haven't a procedure to manage BYOD
(46%), professional (31%) and student (23%). circumstances.
Table 7. Researchers’ Background Table 11. Researched Institution Size
Company Size #Paper % Data
Leakage
Small 3 60% Ownership   √      
Large 2 40% Password   √      
Total 5   Modify √
4.9 Security and Privacy Challenge Mapping and
BYOD is subject to various threats as the devices damage
involved are controlled by personal. As employee are records        
working for the organization on their personal device, there vandalize √
are many risks of leakage or directly access to personal data technical
[20]. The pace of BYOD environment is increasingly equipment        
complicating the method to identify security and privacy
challenge. The security policy to be followed is different for V. CONCLUSION
an enterprise-owned device and an employee owned These days the distribution and the use personal device
device[21]. Many organizations suffer great losses because have expanded. This phenomenon brings to the Bring Your
of missing implementing standards for information security Own Device (BYOD) era where an employee uses their
with the goal of better dealing with security and privacy personal device [23]. For those organizations that have
vulnerabilities [22]. implemented the Bring Your Own Device (BYOD)
From this study, we classified security and privacy paradigm, both their employees and their business can get
challenge into 13 components (table 12), which are : data, benefit from this concept. In fact, employees gain flexibility
device, network, malware, bandwidth, inconsistent security by being able to work boundless and they also feel
policy, leakage in shared media, readable data, inter- comfortable when using personal devices. On the other side,
application data leakage, ownership, password, modify and an organization can increase employee productivity[24]. But,
damage records, and vandalize technical equipment. there are some security issues. In this study, we investigate a
Table 12. Security and Privacy Challenge critical component according to security and privacy
challenges in BYOD era. For privacy challenge, it consists 4
Vignesh.U, Asha.S, 2015

(four) components, there are data, device, network, and


Siddhi Pittayachawan,
Brunella Longo, 2013

Murraya & William


Nima Zahadat, Paul
Security Challenge

Armaregoa, David

bandwidths. Then, for security, it also consists 9 (nine)


Blackburn, Bill A.
Blessner, Timothy
Duy Dang-Pham ,

Kenworthy, 2015
Garbaa, Jocelyn
Abubakar Bello

components, which are: malware, inconsistent security


Olson, 2015

policy, leakage in shared media, readable data, inter-


2014

application data leakage, ownership, password, modify and


damage records, and vandalize technical equipment. The
organization should change their security policies and adopt
the enhanced security policies to aware with the identified
threat from this study. However, an ideal solution must be
able to separate corporate space from personal data and
Data √       √ protect corporate data[25].
Device √ √ √ √ √
√ VI. FUTURE RESEARCH
Network        
Malware √ This study only defines components of privacy
(viruses)     √   challenges and information security based on the study
Bandwidth √ literature review process. It will need some statistic
Issues         validation to verify all the component can be applied in all
Inconsisten √ organization. Our future work will focus on the proposed
t Security design of a BYOD policy because there are a lot of BYOD
Policies         policies available for organizations [26] so we need to
Leakage in √ identify the appropriate BYOD policies into the organization.
Shared REFERENCES
Media        
[1] M. Eslahi, M.V. Naseri, H. Hashim, N.M. Tahir,
Readable √
E.H.M. Saad, BYOD: Current state and security
Data Stays
challenges, in: ISCAIE 2014 - 2014 IEEE Symp.
in
Comput. Appl. Ind. Electron., 2015: pp. 189–192.
Disposed
doi:10.1109/ISCAIE.2014.7010235.
Devices        
[2] A. Scarfo, New security perspectives around BYOD,
Inter-       √  
Proc. - 2012 7th Int. Conf. Broadband, Wirel.
application
Comput. Commun. Appl. BWCCA 2012. (2012) Benefits, risks and control techniques, Ieee
446–451. doi:10.1109/BWCCA.2012.79. Southeastcon 2014. (2014) 1–6.
[3] I. Woodring, M. El-Said, An economical cluster doi:10.1109/SECON.2014.6950718.
based system for detecting data leakage from BYOD, [16] D. Dang-Pham, S. Pittayachawan, Comparing
ITNG 2014 - Proc. 11th Int. Conf. Inf. Technol. New intention to avoid malware across contexts in a
Gener. (2014) 610–611. doi:10.1109/ITNG.2014.98. BYOD-enabled Australian university: A Protection
[4] A.B. Garba, J. Armarego, D. Murray, W. Kenworthy, Motivation Theory approach, Comput. Secur. 48
Review of the Information Security and Privacy (2015) 281–297. doi:10.1016/j.cose.2014.11.002.
Challenges in Bring Your Own Device (BYOD) [17] N. Selviandro, G. Wisudiawan, S. Puspitasari, M.
Environments, J. Inf. Priv. Secur. 11 (2015) 38–54. Adrian, Preliminary study for determining bring your
doi:10.1080/15536548.2015.1010985. own device implementation framework based on
[5] M. Uehara, Proposal for BYOD based virtual PC organizational culture analysis enhanced by cloud
classroom, Proc. - 16th Int. Conf. Network-Based management control, 2015 3rd Int. Conf. Inf.
Inf. Syst. NBiS 2013. (2013) 377–382. Commun. Technol. ICoICT 2015. (2015) 113–118.
doi:10.1109/NBiS.2013.60. doi:10.1109/ICoICT.2015.7231407.
[6] B. Longo, Learning on the Wires: BYOD, Embedded [18] S.F. Clouse, R.T. Wright, R.E. Pike, Employee
Systems, Wireless Technologies and Cybercrime., Information Privacy Concerns with Employer Held
Leg. Inf. Manag. 13 (2013) 119. Data : A Comparison of two prevalent privacy
doi:10.1017/S1472669613000285. models, J. Inf. Priv. Secur. 6 (2010) 47–71.
[7] M.R. Waterfill, C.A. Dilworth, BYOD: Where the doi:10.1080/15536548.2010.10855893.
Employee and the Enterprise Intersect, Employee [19] N. Zahadat, P. Blessner, T. Blackburn, B. a. Olson,
Relat. Law J. 40 (2014) 26–36. BYOD security engineering: a framework & its
http://search.proquest.com.library.capella.edu/docvie analysis, Comput. Secur. 55 (2015) 81–99.
w/1546570100?accountid=27965\nhttp:// doi:10.1016/j.cose.2015.06.011.
wv9lq5ld3p.search.serialssolutions.com.library.capel [20] G. Kulkarni, R. Shelke, R. Palwe, V. Solanke, S.
la.edu/?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/ Belsare, S. Mohite, Mobile Cloud Computing - Bring
enc:UTF-8&rfr_id=info:sid/ Your Own Device, Commun. Syst. Netw. Technol.
ProQ:abiglobal&rft_val_fmt=info:ofi/fmt: (CSNT), 2014 Fourth Int. Conf. (2014) 565–568.
[8] T.A. Yang, R. Vlas, A. Yang, C. Vlas, Risk doi:10.1109/CSNT.2014.119.
management in the era of BYOD the quintet of [21] M. Dhingra, Legal Issues in Secure Implementation
technology adoption, controls, liabilities, user of Bring Your Own Device (BYOD), Procedia
perception, and user behavior, Proc. - Soc. 2013. Comput. Sci. 78 (2016) 179–184.
(2013) 411–416. doi:10.1109/SocialCom.2013.64. doi:10.1016/j.procs.2016.02.030.
[9] S. Ali, M.N. Qureshi, A.G. Abbasi, Analysis of [22] K. Hajdarevic, V. Dzaltur, Internal penetration
BYOD Security Frameworks, (2015) 56–61. testing of Bring Your Own Device (BYOD) for
doi:10.1109/CIACS.2015.7395567. preventing vulnerabilities exploitation, in:
[10] U. Vignesh, S. Asha, Modifying security policies Information, Commun. Autom. Technol. (ICAT),
towards BYOD, Procedia Comput. Sci. 50 (2015) 2015 XXV Int. Conf., 2015.
511–516. doi:10.1016/j.procs.2015.04.023. [23] E.B. Koh, J. Oh, C. Im, A Study on Security Threats
[11] T. Kim, H. Kim, A system for detection of abnormal and Dynamic Access Control Technology for BYOD
behavior in BYOD based on web usage patterns, , Smart-work Environment, Int. Multiconference
2015 Int. Conf. Inf. Commun. Technol. Converg. Eng. Comput. Sci. II (2014) 6.
(2015) 1288–1293. [24] G. Costantino, F. Martinelli, A. Saracino, D.
doi:10.1109/ICTC.2015.7354798. Sgandurra, Towards enforcing on-the-fly policies in
[12] F. Mamaghani, Impact of Information Technology BYOD environments, 2013 9th Int. Conf. Inf. Assur.
on the Workforce of the Future : An Analysis, Int. J. Secur. IAS 2013. (2014) 61–65.
Manag. 23 (2006) 845. doi:10.1109/ISIAS.2013.6947734.
[13] C. Cromer, Understanding Web 2.0’s influences on [25] Y. Wang, J. Wei, K. Vangury, Bring your own
public e-services: A protection motivation device security issues and challenges, 2014 IEEE
perspective, Innov. Manag. Policy Pract. 12 (2010) 11th Consum. Commun. Netw. Conf. (2014) 80–85.
192–205. doi:10.5172/impp.12.2.192. doi:10.1109/CCNC.2014.6866552.
[14] K. Madzima, M. Moyo, H. Abdullah, Is bring your [26] R. Afreen, Bring Your Own Device (BYOD) in
own device an institutional information security risk Higher Education: Opportunities and Challenges, Int.
for small-scale business organisations?, 2014 Inf. J. Emerg. Trends Technol. Comput. Sci. 3 (2014)
Secur. South Africa - Proc. ISSA 2014 Conf. (2014). 233–236.
doi:10.1109/ISSA.2014.6950497.
[15] T. Shumate, M. Ketel, Bring Your Own Device:

You might also like