ArticlePDF Available

Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm

Authors:

Abstract and Figures

The growing trend of BYOD in the higher education institutions creates a new form of student learning pedagogy in which students are able to use the mobile devices for their academic purposes in anywhere and anytime. Security threat in the paradigm of BYOD creates a great opportunity for hackers or attackers to find new attacks or vulnerabilities that could possibly exploit the students’ mobile devices and gains valuable data from them. A survey was conducted in learning the current awareness of security and privacy importance in BYOD for higher education in Malaysia. Based on the analysis of this survey, it demonstrates that the trend of BYOD in Malaysia has begun. Thoroughly, the survey results have been proven that the current basic fundamental security and privacy awareness and knowledge on mobile devices or applications is important in order to protect their mobile devices or data.
Content may be subject to copyright.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 2, 2017
53 | P a g e
www.ijacsa.thesai.org
Security and Privacy Risks Awareness for Bring Your
Own Device (BYOD) Paradigm
Manmeet Mahinderjit Singh, Chen Wai Chan and Zakiah Zulkefli
School of Computer Sciences, Universiti Sains Malaysia, 11800 Penang, Malaysia
AbstractThe growing trend of BYOD in the higher
education institutions creates a new form of student learning
pedagogy in which students are able to use the mobile devices for
their academic purposes in anywhere and anytime. Security
threat in the paradigm of BYOD creates a great opportunity for
hackers or attackers to find new attacks or vulnerabilities that
could possibly exploit the students’ mobile devices and gains
valuable data from them. A survey was conducted in learning the
current awareness of security and privacy importance in BYOD
for higher education in Malaysia. Based on the analysis of this
survey, it demonstrates that the trend of BYOD in Malaysia has
begun. Thoroughly, the survey results have been proven that the
current basic fundamental security and privacy awareness and
knowledge on mobile devices or applications is important in
order to protect their mobile devices or data.
KeywordsMobile Computing; BYOD Higher Education;
Security; Privacy; Malicious Software; Risk
I. INTRODUCTION
A tremendous growth in lightweight, portable computing
devices and wireless communications has made mobile
computing becomes a next-generation computer technology
that would transform the way of people interact with each
other not just in their daily life, even in their student life.
Smartphones, tablets, PDAs, USB memory drives are the
perfect examples of mobile computing devices. These devices
are equipped with services such as file transfer, internet
browsing, mailing services and web-based applications, where
these services allow the users to access data or information
and collaborate with each other on the move [1]. Thus, there is
an increasing use of mobile computing devices among
students for their higher education purposes as these devices
provide an opportunity for better productivity, performance,
convenience and also a promise of mobility [1]. This
phenomena leads to a trend which is known as Bring Your
Own Device (BYOD) Higher Education, where students are
allowed to bring their own devices into their study place and
they can perform their educational activities through their own
devices.
The increasing use of mobile devices or apps among the
students and the growing popularity of the BYOD Higher
Education have led to a serious security and privacy attacks
towards the campus data and network as well as student’s
personal information stored on their devices such as student’s
records, grades, financial and research information and etc.
For example, spear phishing [2], Advanced Persistent Threat
(APT) attack [3, 4] and malware [4] are the potential attack
vectors for BYOD models. Other than that, most of the
educational institutions have allowed some form of BYOD
trend onto their campus via Network Access Control (NAC)
without implementing any organized BYOD policies. This
approach poses risk towards the institution’s networks as well
as student devices such as unauthorized access, attacks of
malware and viruses, loss of data and etc. [5].
Thus, the main aim of this study is to observe the
awareness of BYOD paradigm and the security and privacy
threats that occur within this environment. The objectives of
the survey are 1) to investigate the growing trend of BYOD
Higher Education and 2) to examine the student’s security and
privacy knowledge and awareness on mobile devices or
applications. The significance of the survey is to understand
the perception of the current generation Y on the concept of
BYOD and its security challenges that comes with it.
The remainder of the paper is structured as the following.
Section 2 covers the background study of BYOD and its
security and privacy issue in higher education. Section 3
focusing on BYOD survey conducted to increase the user
awareness. Section 4 and 5 are respectively provided a
discussion on the survey and the conclusion thoroughly.
II. BACKGROUND AND RELATED WORKS
This chapter comprised of three parts included BYOD in
higher education, m-learning adoption and security and
privacy risks on BYOD.
A. BYOD in Higher Education
Bring Your Own Device (BYOD) Higher Education refers
to the practice of higher education students using their own
mobile computing devices in their lecture hall or classrooms.
Traditionally, BYOD devices include laptops, PDAs, but
recently the growing usage of smartphones and tablets have
become a part of BYOD devices which offers a high degree of
mobility and flexibility. Yu [6] observed that there are three
major ways where smartphones were being used in higher
education, such as using inbuilt web browsers to access
educational materials through online, and using mobile
applications to access and interact with a course or lecture
content. There also have other uses of smartphones such as
recording lectures and seminars, participating in-class polls,
logging academic data, taking notes, scanning documents and
etc. Tablets such as Apple iPad, Amazon’s Kindle, and
Samsung Galaxy Tab offer students and lecturers a portable
tool by expanding the connectivity and mobility of
smartphones through a larger screen and processing power.
Johnson, et al. [7] have defined the uses of tablets in education
with this statement: “… have gained traction in education
This work is supported by the Fundamental Research Grant Scheme
(FRGS) of Universiti Sains Malaysia.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 2, 2017
54 | P a g e
www.ijacsa.thesai.org
because users can seamlessly load sets of apps and content of
their choosing, making the tablet itself a portable personalized
learning environment”.
B. M-Learning Adoption
According to Akour [8], there are various important
factors that influence the acceptance of mobile learning among
university students, such as student readiness, ease of access,
quality of services, extrinsic influences and institutional
commitment. In Lippincott [9], it's believed that the increased
capabilities of mobile devices could lead to a new form of
engagement with student learning pedagogy. The author also
states her belief that student use of mobile devices in higher
education correlates to their major area of study as well.
Nowadays, mobile services are provided widely in many
universities, for example Massachusetts Institute of
Technology (MIT), Stanford University, Harvard University
and etc. Besides, the use of mobile learning (m-learning)
services in higher education are also becoming one of the
active topics in research [10]. In Alzaza and Yaakub [11], the
authors explain that the concept of m-learning is considered as
the next form of e-learning using mobile technologies so that
teachers and learners are able to conduct their learning process
in anywhere and anytime. In addition, the authors also
conducted a study on the students awareness and
requirements of mobile learning services among Malaysian
students in the higher education environment. The results
indicate that the students have adequate knowledge and
awareness to use the mobile technologies as their choice of the
learning environment. M-learning also provides various
advantages including freedom to study, low cost, timely
application [12], authentic and reliable learning situations,
ease of use, support in learning situations [13] , fast
production of digital learning materials and flexibility of
learning [14].
M-learning could provide lecturers to encourage students
to use their devices and some collaborative tools that they
support in order to work together on assignments in both
physical and virtual learning environments [15]. Other than
that, some of the mobile applications could increase the
interaction between students and lecturers through an in-class
tasks, where it allows students to learn in their preferred
places and foster a student-centered learning approach [16].
C. Security and Privacy Risks on BYOD
In this section, security and privacy list will be discussed
thoroughly.
1) Installation of malicious software on BYOD
According to Bandara, Ioras, and Maher [17], university
and college students are the biggest user of social media or
social networking apps such as Facebook, Twitter and
YouTube. However, this can lead malwares and viruses such
as Wildfire, hosting and spreading throughout the student’s
personal devices. Bradley, Loucks, Macaulay, Medcalf, and
Buckalew [18] explained that an accidental malware
downloads not only infects the device itself, it also can easily
spread to an entire organization’s network within a few
seconds. A common mobile malware attack such as Dream
Droid [19] and DroidKungfu [20] are luring users to click on
malicious web links from their smartphones’ web client and
install malicious payloads. Moreover, BYOD can easily
targeted by hackers to break into someone’s devices by
sending malicious software through email or application
download [21] , for example, hackers always lookout for an
opportunity to fool the students through using email or web
accounts to spoof the official school mailings as well as bank
accounts.
Therefore, students may be encountered the risk of being
the victim of a phishing scam that will result in malware or
ransomware downloads [22]. As a result, once the student has
download and execute malware, the possibility of leakage of
student's personal information will increase and the ability of
the attacker to steal sensitive information by installing
backdoor on the campus network will become possible.
2) Use of untrusted mobile OS and applications
With a “hacker” culture has arisen among young adults,
especially when the majority of them are considered as “tech-
savvy” nowadays, some of the students used to play with their
mobile devices and they able to disable the native OS security
feature through the techniques which commonly known as
“jailbreaking” or rooting”. By jailbreaking or rooting their
mobile devices, they allow installing or upgrading their
mobile OS and applications for free that are restricted by
default [23]. However, jailbreaking or rooting enables
unauthorized programs to be installed on mobile devices,
which could probably introduce malware into their devices.
This might cause students’ devices to be compromised as well
as the campus network if student connects his or her devices
to the campus network. Besides, some students intend to
bypass the institution’s proxy servers and access to blocked
sites through the mobile VPN and some of them may install
some applications such as games, entertainment apps, and P2P
video streaming apps which has been restricted by the
university. In this instance, it potentially opens up a security
threat to the campus network as well as the student’s personal
data [24].
3) Use of untrusted networks
According to Paullet and Pinchot [25], the mobile devices
can be used on both secure and unsecure environments. When
users connect their devices to an unsecure network such as
public Wi-Fi, the devices will open for a variety of security
and privacy attacks such as Wi-Fi hijacking, Bluejacking and
etc. For example, Wi-Fi hijacking occurs when a hacker is
able to intercept the communications between smartphones
and unsecured Wi-Fi hotspots, which allows hackers to gain
access to someone’s usernames, passwords if a user logs in to
certain mobile apps or web site. Therefore, students should be
alarmed of the potential risk as many mobile devices have
settings to allow the device to automatically connect to
available rogue wireless access point that might controlled by
hackers [26]. Other than that, forward emails to public Web
mail services over the cellular network via BYOD,
synchronize academic documents using public cloud-based
storage services like Dropbox, iCloud and Google Docs, and
interact smartphones through voice in the public place may
lead to sensitive data leakage [27].
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 2, 2017
55 | P a g e
www.ijacsa.thesai.org
4) Lack of physical security controls
Since the BYOD adoption in the higher education allows
students to bring their personally-owned devices into their
study place, there is a risk of loss of student personal data will
be occurred due to BYOD devices are easy to lose or steal
within the campus or in the public. Furthermore, it also places
an additional risk to the educational institutions as BYOD
devices could contain student’s credentials to access sensitive
institution’s resources or data and also could lead to these data
being compromised or malicious activities executed via
mobile devices that could gather or corrupt data as well [28].
There's also a possibility that an attacker could configure
another device to be a duplicate of a legitimate device which
appeared to be authentic to the campus network and steal all
the information once the cloned device able to access into the
network [23].
5) Privacy risks on BYOD
In term of BYOD, the privacy aspect always refers to the
concerns that the private data such as personal emails, photos,
videos, bank statements, social security numbers, chat
histories, usernames, passwords and other credentials are
exposed to outsiders. While in the context of BYOD Higher
Education, sensitive data such as student’s personal details
and communications, confidential information about students,
assessment data, and confidential institutional data and even
the personal credentials for certain educational mobile apps or
social networking apps could be exposed to various privacy
issues. In Ismail et al. [29], the author states that students are
concerned about their privacy and security when they are
using m-learning or educational applications, they are worried
that their confidential information such as assessment results
might be revealed to others.
Besides, the issues of mobile bullying or cyber bullying
exist within the educational institutions as the mobile devices
can be used for bullying other students and teachers. Some
mobile bullying examples like photographing or videotaping
other students or teachers and publicly posting, sending or
forwarding their photos and videos on the social networking
site, websites, emails or message boards in order to harass or
humiliate them. Some people even get access and copy or
delete someone’s information like electronically submitted or
stored assignments and homework, or important emails. In
addition, some bullies also try to impersonate or pretend to be
someone where his or her account has been hacked in order to
send abusive calls, texts or images through a mobile phone.
This would properly pose a privacy threat to students and
teachers personal mobile data.
Other than that, the device location tracking issues also
one of the serious privacy issues for the context of BYOD.
Although location tracking via a mobile device’s geolocation
service or GPS are useful for locating lost devices, but
illegitimate tracking can cause a serious privacy concern for
mobile users. Mobile device tracking or location snooping
may expose a threat for students as their location has been
recorded and potential criminals will spy on the targeted
student’s daily activities and perform their crimes. Nowadays,
many legitimate or third-party mobile apps provide not just
the capability of device tracking, it also allows the tracking of
mobile usage behavior tracking via the installed application.
This means that the installed apps allow the tracking of
selected events occurred on mobile devices and recording
every action taken by mobile users [23]. This probably poses
another privacy threat to the student if they installed a variety
of third party apps.
III. SURVEY ON SECURITY AND PRIVACY AWARENESS FOR
BYOD HIGHER EDUCATION
The aims of designing this survey are:
To investigate the growing trend of BYOD Higher
Education.
To examine the student’s security and privacy
knowledge and awareness on mobile devices or
applications.
Fig. 1 provides an overview of the survey samples,
methods and variables used in this research work:
Fig. 1. Survey sample, variable and methods
In this research, a data collection method has adopted:
Observation. Observation is the method that the compilation
of data collected through questionnaires or survey. For
example, an online survey will be generated, conducted,
distributed and get responses through online. As a result, a
total of 60 university students of different courses from the
University Sains Malaysia (USM) have taken part in this
survey regarding the security and privacy of BYOD Higher
Education, where 39 of them are males and 21 of them are
females.
IV. SURVEY RESULTS AND FINDINGS
In this section, the survey findings will be displayed.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 2, 2017
56 | P a g e
www.ijacsa.thesai.org
A. Investigate the Growing Trend of BYOD Higher Education
Fig. 2. Use of mobile devices for academic purposes
This survey examines the use of mobile devices for
academic purposes among the university students as well as
the adoption of a BYOD trend throughout the higher
education. A single choice closed question will be asked about
how often the participants on using mobile devices for
academic purposes. Based on the survey result as shown in
Fig. 2, there are 32 participants (54%) use their mobile devices
for academic purposes every day, 14 participants (23%) use
their mobile devices once a week, 3 participants (5%) use their
mobile devices once every two weeks, 6 participants (10%)
use their mobile devices once a month and 5 participants (8%)
not using their mobile devices for academic purposes.
Fig. 3. Use of BYOD-related mobile apps for academic purposes
Next, a multiple choice question will be asked on which
BYOD-related mobile apps that the participants used the
MOST for their academic purposes. Based on the survey result
from Fig. 3, there are two BYOD-related mobile apps that our
participants used the most for their academic purposes:
Google Drive (73%) and Dropbox (72%), followed by a note
taking app, Evernote (10%) and other mobile apps such as
OneNote, Notepad, WPS. Apparently, participants are not
using Skype mobile app (0%) for their academic purposes.
However, there are 5 participants are not using any mobile
apps for their academic purposes as well.
B. Examine the Student’s Security and Privacy Awareness
and Knowledge on BYOD Mobile Device and Apps
In this survey, participants also tested on several questions
that are related to the security and privacy awareness on
downloading the BYOD-related mobile apps as well as their
opinions on how to secure their personal mobile data after
installing and using these mobile apps for their learning
process. From the survey result shown in the Fig. 4, there are
58% of the participants answered that they are viewing on the
reviews of the BYOD-related mobile apps before they
download and install them, while the rest of the participants
(42%) are not viewing on the reviews before they download
and install the apps.
Fig. 4. View on reviews of the BYOD-related mobile apps
From the survey result shown in Fig. 5, there are 89% of
participants answered that they have not read and understand
the BYOD-related mobile app’s “Privacy Policy” before they
download and install the app, while there are only 12% of
participants answered that they have read and understand the
“Privacy Policy” before they download and install.
Fig. 5. View on privacy policy of the BYOD-related mobile apps
From the survey result shown in Fig. 6, there are 43% of
participants answered that they have checked and read the app
permissions that the BYOD-related mobile app could be
accessed before they accept and install the app, while 57% of
participants answered that they have not read the app
permissions before they accept and install the app. So, there
are still a lot of mobile users not checking on the app
permissions to access sensitive information, such as mobile
data, such as identity, contacts, location and device id.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 2, 2017
57 | P a g e
www.ijacsa.thesai.org
Fig. 6. Check the permissions of the BYOD-related mobile apps
For the next question, the participants are required to
provide their opinions on how they feel that is it reasonable
for an app to access too much personal data such as identity,
contacts, location and device id through the stated app
permissions before they decide to install the app. From the
survey result shown in Fig. 7, almost 92% of participants
answered that it is not reasonable for a mobile app to access
too many personal data through the stated app permissions.
Whereas, only 8% of participants answered that it is
reasonable for an app in order to access these personal data by
providing several reasons such as: (a) some mobile apps can
be more reliable and useful once the apps accessed these
personal data, (b) some mobile apps will automatically setup
the app account with syncing the personal data, (c) personal
data which accessed by the mobile apps will not easily expose
to someone else.
Fig. 7. Opinions on accessibility of mobile apps through permissions
From the survey result shown in Fig. 8, there are 85% of
participants answered that they do not feel secure when they
are signing in their BYOD-related mobile app’s accounts
when the app does not have any indication of SSL connection
or a visible HTTPS indicator. Whereas, there are 15% of
participants answered that they are feeling secure when
signing in the BYOD-related mobile app’s accounts even
though there is no HTTPS indicator.
Fig. 8. Opinions on SSL connection for BYOD-related mobile apps
The reasons of some participants answered that they are
feeling secure when they sign in their BYOD-related mobile
app’s accounts even though there is no indication of SSL
connection are: (a) some of the participants believed that there
have many researchers around the world focus on these
mobile app security, (b) some of the participants assume that
these mobile apps have a strong security since these mobile
apps developed by well-known developers, (c) some
participants assume these mobile apps are secured based on
the stated policy, (d) mainstream mobile apps from Google or
Dropbox are generally secure and there will no security issues
should be worry about.
In Fig. 9, there are 83% of participants do not share their
BYOD-related mobile app’s personal login credential to their
family or someone who close to them, whereas there are only
13% of participants are sharing their login credential to their
family or people who close to them. However, only 4% of
participants did not know their login credentials have been
shared with someone else.
Fig. 9. Sharing login credential of the BYOD-related mobile apps
In Fig 10, nearly 38% of participants did not know the
security feature of two-step verification for mobile apps, and
36% of participants did not use two-step verification for their
BYOD-related mobile apps. On the other hand, 26% of
participants are using two-step verification to verify their
BYOD-related mobile apps.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 2, 2017
58 | P a g e
www.ijacsa.thesai.org
Fig. 10. Use of two-step verification for BYOD-related mobile apps
For the next question, participants will be asked for the
opinion on how to create a strong and complex password for
the login credentials of mobile apps. Most of the participants
have provided similar answers, which is a strong and complex
password can be created by the combination of capital and
small letters, mixture of alphabetic, numeric and special
characters/symbols, password length should be at least 8
characters, passwords should not relate to any personal
information such as phone number, IC number and date of
birth. Besides that, different accounts should have different
passwords. Some of the participants also recommended the
implementation of both password and biometric credentials.
In Fig. 11, there are 60% of participants are not syncing or
sharing their personal files through BYOD-related mobile
apps while accessing the public network or open area Wi-Fi.
On the other hand, 40% of participants are accessing the open
area Wi-Fi from any locations (ie: coffee shops and airport)
when they are syncing their BYOD-related mobile apps’ files.
Fig. 11. Access BYOD-related mobile apps through public Wi-Fi
From the survey result shown in Fig. 12, there are nearly
60% of participants are not setting up any passcode/pin-code
or add an encryption option in order to keep their personal
files in a mobile encrypted and safe. Whereas, there are 34%
of participants are adding passcode or encryption option to
protect their valuable files on their mobile devices. In
addition, there also have 6% of participants did not know the
security feature of passcode or encryption option.
Fig. 12. Set passcode/encryption options for mobile files
Next, we will let the participants proceed to the questions
related to the rating of several security and privacy concerns
that will impact the mobile devices. For the security concerns,
the research has listed out several concerns, such as:
Lost or stolen mobile devices with personal data
Malicious applications downloaded to the mobile
devices
Connected mobile devices to unsecured Wi-Fi or
networks
Accessed to insecure web browsing
Lack of security patches on mobile apps
High rate of users changing or upgrading their mobile
devices
Lack of efficient encryption methods on mobile apps
In the Fig. 13, for the first security concern: Lost or stolen
mobile devices with personal data, where there are 33
participants or more than 50% of participants rated this
security concern that can provide 100% of the impact of the
security of mobile devices. For the second security concern:
Malicious applications downloaded to the mobile devices,
where most of the participants are rating this security concern
that provides 80-100% of the impact (40 participants in total)
to the security of mobile devices. Whereas for the third
security concern: Connected mobile devices to unsecured Wi-
Fi or networks, where the majority of the participants (20
participants) rated this security concern can provide 50% of
the impact of the mobile devices.
For the fourth security concern: Accessed to insecure web
browsing, where there are 19 participants (32%) rated it as it
can provide 50% of the impact of the mobile devices instead
of 100% of the impact of the mobile devices. The fifth
security concern: Lack of security patches on mobile apps is
quite similar to the fourth security concern, where there are 23
participants (38%) rated it as it can provide 50% impact of the
mobile devices. On the sixth security concern: High rate of
users changing or upgrading their mobile devices, where the
majority of the participants (19 participants) have rated this
security concern as it can provide 50% of the impact of the
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 2, 2017
59 | P a g e
www.ijacsa.thesai.org
mobile devices. For the last security concern: Lack of efficient
encryption methods on mobile apps, where the majority of the
participants (24 participants) also rated this security concern
as it can provide 50% of the security impact of the mobile
devices.
Fig. 13. Severity of security concerns that impacting mobile devices
For the privacy concerns, the research has listed out
several concerns such as:
Mobile data/information leakage
Mobile user’s location has been tracked and collected
Collection on user identity by service providers
Lack of transparency on mobile app permission
Sniffing and snooping on mobile phone sensors
Losing access of ownership of mobile data
In Fig. 14, for privacy concern, such as mobile
data/information leakage, there are 29 participants rated it as it
can provide 100% of the impact to the mobile devices. For the
second privacy concern: Mobile user’s location has been
tracked and collected, there are also have 25 participants rated
it, as it can provide 100% of the impact of the mobile devices.
For the third privacy concern: Collection on user identity by
service providers, there are 22 participants rated this privacy
concern can provide 80% of the impact of the mobile devices
rather than it can provide 100% of the impact of the mobile
devices.
Next, for the fourth privacy concern: Lack of transparency
on mobile app permission, there have a majority of 20
participants rated it as it can provide 80% of the impact rather
than 100% of the impact to the mobile devices. For the fifth
privacy concern: Sniffing and snooping on mobile device
sensors, there has a majority of 22 participants rated this
privacy concern as it can provide 80% of the impact of the
mobile devices. For the last privacy concern: Losing access of
ownership on mobile data, there has a majority of 21
participants rated it as it can provide 100% of the impact of
the mobile devices.
Fig. 14. Severity of privacy concerns that impacting mobile devices
In order to improve the student awareness on the security
and privacy issues inherent on different types of BYOD-
related mobile apps, there are a set of defined security controls
such as: Authentication, Authorization, Confidentiality,
Integrity, Availability and Non-Repudiation are taken into
account to determine which security controls will be the most
important for protecting the mobile data.
In Fig. 15, there are 67% of participants rated that
Authentication is the most important security control for
mobile user to protect their mobile data. Whereas, there are
23% of participants also indicated that Authentication is a
very important security control which is needed for mobile
devices.
Fig. 15. Security controls for mobile data: Authentication
In Fig. 16, there are 52% of participants rated that
Authorization is one of the most important security controls
for mobile devices followed by 35% of participants also rated
it as it is very important.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 2, 2017
60 | P a g e
www.ijacsa.thesai.org
Fig. 16. Security controls for mobile data: Authorization
Similar to previous two security controls, there are more
than half of participants rated the security control:
Confidentiality (as shown in Fig. 17) as the most important
security control for mobile devices followed by 30% of
participants rated it as a very important security control.
Fig. 17. Security controls for mobile data: Confidentiality
For Integrity security control (see Fig. 18), there also have
62% of participants rated this security control as the most
important security control for protecting the mobile data and
30% of participants rated it as very important.
Fig. 18. Security controls for mobile data: Integrity
Unlike the previous security controls, there have only 43%
of participants rated Availability (see Fig. 19) as the most
important security control of mobile devices while 37% of
participants rated it as very important and 20% of participants
rated it as important.
Fig. 19. Security controls for mobile data: Availability
For the last security control: Non-repudiation (see Fig. 20),
there have about 55% of participants rated it as the most
important security control of mobile devices and 30% of
participants rated it as very important and the rest of
participants rated it as important.
Fig. 20. Security controls for mobile data: Non-Repudiation
V. SURVEY DISCUSSIONS
Survey discussion is given in this section.
A. Growing Trend of BYOD Higher Education
Based on the survey results stated from Fig. 2 and Fig. 3, it
could be concluded that the trend of BYOD is starting to adopt
into the higher education system since there are quite a
number of USM students started to use their own mobile
devices for their academic purposes instead of their personal
usage. Statistics have been proven that many USM students
started to use some of the popular mobile applications such as
Google Drive, Dropbox as their educational apps in order to
use these apps throughout their student life in university.
B. Security and Privacy Awareness on BYOD Mobile Apps
In this survey, the participants are being tested on several
questions that are related to the security and privacy
awareness when downloading the BYOD-related mobile apps.
Based on the survey results obtained from Fig. 4, it can be
proven that there are quite a number of participants that are
still considering the security and safety of downloading and
installing certain mobile apps that might be harmful for their
mobile devices and their personal mobile data by determining
the positivity or negativity of the user reviews posted on
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 2, 2017
61 | P a g e
www.ijacsa.thesai.org
Google Play Store or other sources. But, Fig. 5 and Fig. 6
show that most participants are often just skipped the security
precautions such as checking and reading “Privacy Policy”
and app permissions before they want to download and install
the mobile apps. This probably came out an assumption that
most of the mobile users do not really want to spend their time
on reading and understanding the policies and app permissions
that written by the app developers in order to notify mobile
users that what kind of data that could be collected by the app
itself.
Next, Fig. 8 shows that there are quite a number of
participants (85%) are aware the importance of SSL
connection or a visible HTTPS indicator for signing in the
mobile app’s accounts, which probably suggest that many
participants take the security of their mobile app’s account
seriously. Fig. 11 shows that most of the participants are not
syncing or sharing their files stored in BYOD-related mobile
apps while accessing to the public network or Wi-Fi, this
indicates that many participants aware of the danger of sharing
or sync any mobile data through public Wi-Fi.
Besides, Fig. 10 and Fig. 12 show that most of the
participants are still did not know how to configure several
security features such as two-step verification, pin codes and
encryption option in order to protect their mobile data and
applications. It could be concluded that mobile user education
and awareness programs are needed for educating the mobile
users on how to configure several basic security features for
their mobile devices or applications. In addition, Fig. 9
indicates that there has a very high percentage of participants
are not sharing their login credentials as well.
Based on the survey results from Fig. 13 and Fig. 14, many
participants realized there are several security and privacy
concerns that will probably cause a serious impact to their
mobile devices. Some of these results are supported by the
study of Obodoeze, et al. [30] which demonstrated the various
forms of challenging security concerns, including losses of
mobile devices, virus and malware attacks and etc., and also
the study of Kambourakis [26] that discussed the security and
the privacy challenge of m-learning. Furthermore, survey
results from Fig. 15 to Fig. 20 show that most of the
participants also believed that there should be a list of defined
security controls such as Authentication, Authorization,
Confidentiality, Integrity, Availability and Non-repudiation
used to enhance the security and privacy strengths of the
mobile devices or applications.
As a conclusion of this survey, it has been proven that
most of the USM students have a fundamental knowledge or
awareness about the security and privacy of the mobile
devices or applications, which probably indicates that many
students nowadays start concerning the security and privacy
risks that could be happening on their mobile devices. The
survey conducted here with a small focus group of students in
one of the higher educational centers in Malaysia may project
results and finding that is closely correlated to the samples
size and background. However, to our knowledge, there is yet
for a BYOD in higher education research to be done in
Malaysia. Thus, the survey results and findings can be
generalized as the perception of higher education students or
as the viewpoint of the Y generation as a whole.
VI. CONCLUSION AND FUTURE WORK
This research start with collecting and studying different
approaches on BYOD Higher Education, M-Learning
adoption within higher education institutions as well as the
security and privacy vulnerabilities and attacks that will be
happened on BYOD Higher Education environment in order
to find out an effective solution for solving the research
problem. Hence, this research moves on to conduct the survey
to investigate the security and privacy awareness among
university students in BYOD Higher Education. Based on the
analysis of this survey, it shows that the trend of BYOD is
started among the USM students as many students started to
move towards the trend of BYOD where they are using mobile
devices or applications for their academic tasks. Besides, the
survey results have been proven that the current USM students
have a basic or fundamental security and privacy awareness
and knowledge on mobile devices or applications where most
of the students start concerning the security and privacy
controls or services in order to protect their mobile devices or
data.
Besides that, the growing trend of BYOD in higher
education institutions eventually creates a new form of student
learning pedagogy where students able to use the mobile
devices for their academic purposes anywhere and anytime.
However, this also creates a great opportunity for hackers or
attackers to find new attacks or vulnerabilities that could
possibly exploit the students’ mobile devices and gains
valuable data from them. Hence, a further research in finding
new attacks or vulnerabilities on BYOD Higher Education is
still necessary in order to increase the security and privacy
awareness among the security specialists and university
students. Besides, the existing case studies still require some
additional research in order to improve the details of the case
studies as well as its impacts towards the assets or systems in
terms of confidentiality, integrity and availability. This could
probably make the case studies more concise, detailed and
easy to evaluate using a standardized security metrics
framework.
REFERENCES
[1] B. Alleau and J. Desemery, "Bring your own device: It’s all about
employee satisfaction and productivity, not costs!," Capgemini
Consulting2013.
[2] L. B. Lau, M. M. Singh, and A. Samsudin, "Trusted System modules for
tackling APT via spear-phishing attack in BYOD environment,"
Undergradute Research Thesis, School of Computer Science, Universiti
Sains Malaysia, 2015.
[3] Z. Zulkefli, M. Mahinderjit-Singh, and N. Malim, "Advanced Persistent
Threat mitigation using Multi Level Security Access Control
framework," in Computational Science and Its Applications -- ICCSA
2015. vol. 9158, O. Gervasi, B. Murgante, S. Misra, M. L. Gavrilova, A.
M. A. C. Rocha, C. Torre, et al., Eds., ed: Springer International
Publishing, 2015, pp. 90-105.
[4] M. M. Singh, S. S. Siang, O. Y. San, N. H. A. H. Malim, and A. R. M.
Shariff, "Security attacks taxonomy on Bring Your Own Devices
(BYOD) Model," International Journal of Mobile Network
Communications & Telematics ( IJMNCT) vol. 4, pp. 1-17, October
2014 2014.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 2, 2017
62 | P a g e
www.ijacsa.thesai.org
[5] R. Afreen, "Bring Your Own Device (BYOD) in higher education:
Opportunities and challenges," International Journal of Emerging Trends
& Technology in Computer Science (IJETTCS), vol. 3, pp. 233-236,
2014.
[6] F. A. Yu, "Mobile/smart phone use in higher education " in Southwest
Decision Sciences Institute Conference, 2012, pp. 831-839.
[7] L. Johnson, S. A. Becker, M. Cummins, V. Estrada, A. Freeman, and H.
Ludgate, "The NMC horizon report: 2013 higher education edition,"
New Media Consortium, Texas2013.
[8] H. Akour, "Determinants of mobile learning acceptance: An empirical
investigation in higher education," Ph.D. thesis, Oklahoma State
University, 2010.
[9] J. K. Lippincott, "A mobile future for academic libraries," Reference
Services Review, vol. 38, pp. 205-213, 2010.
[10] A. Samochadin, D. Raychuk, N. Voinov, D. Ivanchenko, and I.
Khmelkov, "MDM based mobile services in universities," in
International Conference on Emerging of Networking,
Communication and Computing Technologies ( ICENCCT 2014 )
Co-jointed with International Conference on Emerging Trends of
Computer Science with Educational Technology ( ICETCSET 2014
), Zurich, Switzerland, 2014, pp. 35-41.
[11] N. S. Alzaza and A. R. Yaakub, "Students' awareness and requirements
of mobile learning services in the higher education environment,"
American Journal of Economics and Business Administration vol. 3, pp.
95-100, 2011.
[12] N. S. Alzaza and A. N. Zulkifli, "Mobile-Based Library Loan Service
(MBLLS)," in Proceedings of the Rural ICT Development Conference
’07 (RICTD’07), Executive Development Centre (EDC), UUM, 2007,
pp. 1-8.
[13] P. Seppälä, J. Sariola, and H. Kynäslahti, "Mobile learning in personnel
training of university teachers," in Wireless and Mobile Technologies in
Education, 2002. Proceedings. IEEE International Workshop on, 2002,
pp. 136-139.
[14] M. Sharples, D. Corlett, and O. Westmancott, "The design and
implementation of a mobile learning resource," Personal and Ubiquitous
Computing, vol. 6, pp. 220-234, 2002.
[15] K.-W. Lai, F. Khaddage, and G. Knezek, "Blending student technology
experiences in formal and informal learning," Journal of Computer
Assisted Learning, vol. 29, pp. 414-425, 2013.
[16] Holzinger, A. Nischelwitzer, and M. Meisenberger, "Mobile phones as a
challenge for m-learning: Examples for mobile interactive learning
objects (milos)," in Pervasive Computing and Communications
Workshops, 2005. PerCom 2005 Workshops. Third IEEE International
Conference on, 2005, pp. 307-311.
[17] Bandara, F. Ioras, and K. Maher, "Cyber security concerns in e-learning
education," 7th International Conference of Education, Research and
Innovation, pp. 728-734, 2014.
[18] J. Bradley, J. Loucks, J. Macaulay, R. Medcalf, and L. Buckalew,
"BYOD: A global perspective harnessing employee-led innovation
(survey report)," 2012.
[19] O. Krehel. (2011). Worse than zombies: The mobile botnets are coming.
Available: http://www.idt911blog.com/2011/06/worse-than-zombies-
the-mobile-botnets-are-coming/
[20] X. Jiang. Security alert: New sophisticated android malware
droidkungfu found in alternative chinese app markets. . Available:
http://www.csc.ncsu.edu/falculty/jiang/DroidKungFu.html
[21] A., "Information Security Risk Management," 2013.
[22] S. Poremba, "5 higher education information security threats you should
know before your child leaves for college," Forbes2014.
[23] D. Caroll, M. Rose, and V. Sritapan, "Mobile Security Reference
Architecture," 2013.
[24] M. Potts, "The state of information security," Network Security, vol.
2012, pp. 9-11, 7// 2012.
[25] K. Paullet and J. Pinchot, "Mobile malware: coming to a smartphone
near you ?," Issues in Information Systems, vol. 15, pp. 116-123, 2014.
[26] G. Kambourakis, "Security and privacy in m-learning and beyond:
Challenges and state-of-the-art," International Journal of U- & E-
Service, Science & Technology, vol. 6, pp. 67-84, 2013.
[27] P. Wei, L. Feng, K. J. Han, Z. Xukai, and W. Jie, "T-dominance:
Prioritized defense deployment for BYOD security," in Communications
and Network Security (CNS), 2013 IEEE Conference on, 2013, pp. 37-
45.
[28] Pillay, H. Diaki, E. Nham, S. Senanayake, G. Tan, and S. Deshpande.
(2013, Does BYOD increase risks or drive benefits? (Unpublished).
Available: http://hdl.handle.net/11343/33345
[29] S. Ismail, S. B. A. Rahman, N. M. Noordin, S. M. S. Mustafa, Z. F.
Zamzuri, M. Manaf, et al., "Student perception on security requirement
of e-learning services," Procedia - Social and Behavioral Sciences in 6th
International Conference on University Learning and Teaching
(InCULT 2012), vol. 90, pp. 923-930, 2013/10/10 2013.
[30] F. C. Obodoeze, F. A. Okoye, C. N. Mba, S. C. Asogwa, and F. E.
Ozioko, "A holistic mobile security framework for nigeria,"
International Journal of Innovative Technology and Exploring
Engineering (IJITEE), vol. 2, pp. 5-11, 2013.
... Educators and institutions must adapt their pedagogical approaches as technology advances rapidly to stay relevant and effective in the modern digital environment. If the potential of mobile devices is ignored, there may be missed opportunities to engage students and offer individualized learning experiences that consider each student's needs and learning preferences (Mahinderjit et al., 2017). Moreover, by granting equal access to educational resources, BYOD and mobile learning have the potential to close the digital divide. ...
... However, it is crucial to acknowledge the significance of responsible and thoughtful technology use, even as we acknowledge the significant role of mobile learning in education. Using mobile devices in the classroom must be balanced with preventing potential distractions or excessive reliance on screens (Mahinderjit et al., 2017). Mobile technology facilitates seamless communication and collaboration between students and teachers, dissolving distance barriers and fostering intercultural understanding. ...
... It is crucial to consider students who might not have access to personal devices in any BYOD initiative. Schools should devise plans to ensure these students do not fall behind (Mahinderjit et al., 2017;Shafik, 2024a). For students without access to personal devices, this might entail setting up computer labs, loaner devices, or alternative learning resources. ...
Chapter
This chapter explores the significance of mobile learning (ML) and bring your own device (BYOD) to enhance education in the digital age (DA). It highlights the growing use of mobile devices in educational settings and their advantages and drawbacks. The literature review analyzes existing research, frameworks , and best practices for utilizing mobile devices and smartphones in educational settings. The study examines pedagogical approaches, mobile resources, and educational apps that utilize mobile technology for personalized and engaging learning. It also discusses BYOD policies, implementation difficulties, and successful case studies of BYOD adoption. The chapter offers best practices for maximizing the benefits of BYOD, including efficient teaching methods, classroom management strategies, and a safe learning environment. The chapter also speculates on future developments and effects of BYOD and mobile learning in the classroom, exploring new technologies and innovations that may influence education.
... For obvious reasons, it is challenging to control the content of such computers and ensure their complete protection. Personal devices can be the most vulnerable to targeted attacks since it is much easier for hackers to attack a "lonely" laptop using an inevitable attack or method of influence than a device under the control of specialists, configured and maintained with appropriate security measures [17]. In most cases, modern users work with local administrator rights, which makes it easier to deliver malicious codes to these devices, for example, using social engineering attacks [17]. ...
... Personal devices can be the most vulnerable to targeted attacks since it is much easier for hackers to attack a "lonely" laptop using an inevitable attack or method of influence than a device under the control of specialists, configured and maintained with appropriate security measures [17]. In most cases, modern users work with local administrator rights, which makes it easier to deliver malicious codes to these devices, for example, using social engineering attacks [17]. Besides, smartphones and tablets are more susceptible to Man-in-the-Middle attacks. ...
Preprint
Modern organizations face rising levels of cyber risks, making cybersecurity a top priority for safeguarding sensitive data and maintaining operational continuity. Recent studies find human factors as the most critical contributors to cyber risks. These human-related risks include user misuse, user mistakes, and user malice. A large proportion of cyber risks arise when hackers use social engineering or phishing techniques to manipulate employees into disclosing confidential information. While some employees knowingly engage in these actions, some incidents occur accidentally due to a lack of awareness about cybersecurity protocols. As a result, governments around the world are enacting data protection legislation aimed at enhancing employees' cyber risk. This study explores the perception of US employees on the effectiveness of data protection legislation in countering cyber threats. It surveyed 30 randomly selected employees from various industries. The results showed that employees perceive data protection legislation as effective in mitigating employee-related cyber risks.
... The benefits of BYOD have been explained in varying papers that focus on financial gain, boosted morale, and greater satisfaction of the employees, improved job efficiency, and enhanced flexibility [19][20][21][22][23][24]. The security risks associated with BYOD have been researched on a large scale with respect to process, technology, and people based on the golden triangle model [25][26][27][28][29][30]. These challenges can be divided into four main categories: deployment, technical, regulation, and human aspects, as shown in Fig 1. ...
... The awareness in dealing with the BYOD approach represents one of the main basic aspects that can have effects in increasing the number of people to be interested in this approach, usage, development, and challenges. Thus, the awareness of BYOD should be increased in the community via several possible methods [27]. An example of these methods is to find appropriate channels to increase awareness of the benefits on the one hand and the risks on the other to integrate appropriate awareness of BYOD among users. ...
Article
Full-text available
The trend of Bring Your Own Device (BYOD) is gaining popularity all over the world with its innumerable benefits such as financial gain, greater employee satisfaction, better job efficiency, boosted morale, and improved flexibility. However, this unstoppable and inevitable trend also brings its own challenges and risks while managing and controlling corporate data and networks. BYOD is vulnerable to attacks by viruses, malware, or spyware that can reach sensitive data and disclose information, modify access policies, disrupt services, create financial issues, minimise productivity, and entail some legal implications. The key focus of this research is how Saudi Arabia has approached BYOD with the help of their 5-step solution model and quantitative research methodology. The result of this study is a statement about what users know about this trend, their opinions about it, and suggestion to increase the employee awareness.
... As noted by Li et al. (2023), the physical and technological openness of the typical university campus complicates the monitoring of malicious software and infected devices on the campus network. Singh et al. (2017) also note that the bring-your-own-device trend in education can heighten phishing susceptibility. Furthermore, unlike other organizations, the population of universities is rather fluid. ...
Article
Full-text available
Universities are frequent targets of cyberattacks. This investigation seeks to explore common phishing techniques targeting institutions of higher education. This study analyzes the content and message features of a sample of 2300 emails from 2010 to 2023 collected from Cornell’s Phish Bowl, including topics, persuasive appeals, emotional appeals, and spelling errors. Using analyses of association and text mining, the work maps out changes in phishing trends over time. One major finding is that security-focused phish have been replaced by those attempting to reflect routine university life, such as job offer scams. Additionally, this study identifies authority and scarcity as common persuasive appeals in phishing attempts and demonstrates a decrease in spelling errors over time. These findings have practical implications for cybersecurity training and awareness. They may also guide future work seeking to determine user susceptibility to phishing by providing insight into frequent attacks.
... Nevertheless, a major limitation of SENSATE is the limited exploration of the human behavioral context concerning intention, device usage, and tasks completed with a smartphone. Resultantly, limited studies have focused on identifying malicious behaviors while a smartphone application retrieves the user's data from sensors [12,193]. ...
Article
Full-text available
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-organized and skilled adversary to remain undetected while systematically and continuously exfiltrating sensitive data. Various APT attack vectors exist, including social engineering techniques such as spear phishing, watering holes, SQL injection, and application repackaging. Various sensors and services are essential for a smartphone to assist in user behavior that involves sensitive information. Resultantly, smartphones have become the main target of APT attacks. Due to the vulnerability of smartphone sensors, several challenges have emerged, including the inadequacy of current methods for detecting APTs. Nevertheless, several existing APT solutions, strategies, and implementations have failed to provide comprehensive solutions. Detecting APT attacks remains challenging due to the lack of attention given to human behavioral factors contributing to APTs, the ambiguity of APT attack trails, and the absence of a clear attack fingerprint. In addition, there is a lack of studies using game theory or fuzzy logic as an artificial intelligence (AI) strategy for detecting APT attacks on smartphone sensors, besides the limited understanding of the attack that may be employed due to the complex nature of APT attacks. Accordingly, this study aimed to deliver a systematic review to report on the extant research concerning APT detection for mobile sensors, applications, and user behavior. The study presents an overview of works performed between 2012 and 2023. In total, 1351 papers were reviewed during the primary search. Subsequently, these papers were processed according to their titles, abstracts, and contents. The resulting papers were selected to address the research questions. A conceptual framework is proposed to incorporate the situational awareness model in line with adopting game theory as an AI technique used to generate APT-based tactics, techniques, and procedures (TTPs) and normal TTPs and cognitive decision making. This framework enhances security awareness and facilitates the detection of APT attacks on smartphone sensors, applications, and user behavior. It supports researchers in exploring the most significant papers on APTs related to mobile sensors, services, applications, and detection techniques using AI.
Preprint
Full-text available
The use of Bring Your Own Device (BYOD) to access resources has extended past the boundaries of major institutions of higher learning. But, at institutions of higher learning, students, faculty, and staff are beginning to connect personal devices to the institution’s network to access resources without much considerations to the security repercussions. Therefore, this research used a university with an estimated population of about 8000 students and 500 employees as a case study and applied stratified random sampling method to classify the study population, that is, students and employees to unravel adaptation of BOYD in institutions of higher learning. A questionnaire was used for data collection and test cases were used to test threats on BYOD devices owned by the respondents to identify challenges with its awareness. The study data was analyzed by descriptive and inferential statistics methods and generalizations inference were made through correlation, regression and Structural Equation Modelling (SEM) methods. The study established a moderate influence of effort expectancy, social influence, performance expectancy, threat appraisal and coping appraisal on Information Security Awareness (ISA). Facilitating conditions had a strong influence, while habit had a weak influence on ISA. General Terms Algorithms, Management, Performance, Design, Reliability, Experimentation, Security, Human Factors, Theory, Verification.
Article
Full-text available
Digital transformation represents one of the main obstacles facing several government, private, and non-profit sectors that help stabilize digital transformation in the Arabic region. One of the helpful ways to improve the level of freedom, productivity, and flexibility among employees to accept the BYOD approach is using their own devices to perform their work both in and outside the workplace. This study focuses to present the differences between the main three economic sectors, which represent the most important pillars of the economy in Saudi Arabia within the Kingdom's Vision 2030. BYOD also has great importance to the stakeholders for raising their awareness by expressing the implications, if the concept of BYOD is widely and correctly adopted. The study uses the diffusion of innovation (DOI) framework and quantitative analysis data to determine the main dimensions and important factors that help increase the awareness of the target audience. The number of participants in this study was 830, and the participants are mixing between the government, private, and non-profit sectors. The main findings showed a significant impact of several factors such as the importance of knowledge, ease of use, employee satisfaction, risk awareness, and attention to increase the level of acceptance in three main sectors study for using the BYOD approach widespread and professional use.
Conference Paper
The growing use of personal devices at workplace due to the Bring Your Own Device (BYOD) paradigm has given rise to new security challenges. Several organizations within Pakistan have recently started adopting the BYOD approach. However, limited work has been carried out to investigate the current state of BYOD security policies in Pakistan. We use a survey-based study to explore the BYOD security policies within four industrial sectors of Pakistan namely, Defence Services, Finance, IT/Telecommunications, and Medical. We highlight the BYOD security issues and currently implemented counter-measures within these sectors, and propose a BYOD security framework and a set of sector-wise recommendations for dealing with the BYOD security issues.
Article
Full-text available
Since the inception of mobile telecommunication in Nigeria in 2002 as Global System for mobile Telecommunication(GSM) and Code Division for Multiple Access(CDMA), there has been a meteoric rise in the number of subscribers as well as the security challenges affecting the mobile telecommunication platforms. Security challenges such as hackers’ attacks to personal data and corporate networks leading to loss of privacy and funds, the threats of malicious programs such as virus, worms, Trojans, bombs, etc as a result of massive interconnectivity to the internet by the majority of the subscribers using mobile phones as well as synchronization of mobile equipment to Personal Computers(PCs) and corporate networks , and the rampant theft of mobile equipment have been identified to constitute the greatest security challenges. This paper examines these challenges and carefully deduced from them the current existing attack models or patterns in the Nigeria telecommunication industry in order to formulate counter solutions to them. This paper finally proposed a five-model corrective and preventive security framework that can tackle and mitigate these identified security challenges if implemented. Index Terms— holistic mobile security, Nigeria, malicious program, CDMA, GSM, smart phone, SIM, IMEI, intranet, security-triad, attack models
Article
Full-text available
This study explored awareness and concern about mobile malware as well as usage habits related to preventative measures used to mitigate mobile malware risk factors. Several mobile malware risk factors were explored, including connecting to unsecured Wi-Fi networks, setting mobile devices to automatically connect to Wi-Fi networks, leaving Bluetooth connectivity on, reading reviews before downloading mobile apps, using anti-malware software or apps, frequency of data backups, and device locks using passwords, PINs, or fingerprints. A total of 187 participants were surveyed, including undergraduates and doctoral students and alumni at a mid-Atlantic university. The study found that among the risk factors explored, participants were not as aware of the dangers associated with connecting mobile devices to unsecured Wi-Fi networks and also were largely unfamiliar with antimalware software and apps. A set of recommendations for increasing awareness of preventative security measures for mobile malware were also presented.
Conference Paper
Full-text available
Cyberspace refers to the boundless space known as the Internet. Cyber security is the body of rules put in place for the protection of this cyberspace. The increasing use of e-Learning systems has been documented by numerous studies and shows continuing growth; little attention has been given to the issue of security of e-Learning systems both in research and education. In this paper, we illustrate an approach to understanding, evaluating, monitoring, measuring and managing cyber security as it relates to e-Learning systems. Security of e-Learning systems represents a unique challenge as numerous systems are accessed and managed via the Internet by thousands of users over hundreds of networks. Moreover, this paper reveals the prevalence of internal cyber-attack as well as a lack of proper IT policies and procedures in e-Learning systems, in light of their standard architecture and their specific security requirements. Also, we discuss the most important security challenges that can be relevant for distributed e-learning systems. Because e-Learning systems are open, distributed and interconnected, then security becomes an important challenge in order to ensure that interested, and authorised, actors only have access to the right information at the appropriate time. Keywords: Cyber security, e-Learning systems, cyber-attack, IT policies, distributed e-Learning
Article
Full-text available
Consumerization of IT or Bring Your Own Device (BYOD) concept is spreading very quickly in the organizations which hugely depend on IT infrastructure and need their employees connected to the organizations computer network for most of their tasks. Simply stating, BYOD means allowing employees to access organization network via their own devices/technology. This has resulted in enhancing ease of work in employees and is contributing in enhanced productivity. Among a lot of challenges, security is the important factor. Also, employers have to decide on working hours and payment procedures accordingly. This paper gives a short introduction to the various advantages and issues involved in general. The paper is mainly focused on how BYOD concept can be helpful in education sector, especially in higher education. Personal devices coming into the workplace are broad and diverse- so there is a challenge for companies to carefully device their BYOD policies and BYOD management systems. BYOD has small investment cost but longtime operational cost. A lot of important factors have to be considered while implementing BYOD policy either at workplace or at education institutes. BYOD may change the concept of computer or internet lab. This concept has its own advantages and challenges which are discussed below. According to a survey for educational institutes in US and UK, 85% of institutes allow students and staff to access the school network. It is also found that personal devices are mostly used as much for educational purposes as for private purposes There are also a lot of BYOD policies available for organizations as well as educational institutes. Most of the educational institutes have allowed some form of BYOD onto their campus mostly via network access control (NAC) without implementing any BYOD policy. This may expose institutes to various risks therefore a well documented BYOD policy is essential.
Conference Paper
Bring Your Own Device (BYOD) concept has become popular amongst organization. However, due to its portability and information available through social network, BYOD has become susceptible to information stealing attacks such as Advanced Persistent Threat (APT) attack. APT attack uses tricky methods in getting access into the target’s machine and mostly motives and stand as a threat to politics, corporate, academic and even military. Various mitigation techniques have been proposed in tackling this attack but, most of them are relying on available information of the attacks and does not provide data protection. Hence, it is challenging in providing protection against APT attack. In this paper, we will investigate on the available mitigation techniques and its problems in tackling APT attack by looking on the root cause of the attack inside BYOD environment. Lastly, based on the information obtained we will propose a new framework in reducing APT attack.
Article
Mobile devices, specifically Smartphone's, have become ubiquitous. For this reason, businesses are starting to develop \"Bring Your Own Device\" (BYOD) policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenues, reduced mobile costs and IT efficiencies. However, due to emerging attacks and limitations on device resources, it is difficult to trust these devices with access to critical proprietary information. Therefore, in this paper, the potential attacks of BYOD and taxonomy of BYOD attacks are presented.
Conference Paper
Bring Your Own Device (BYOD) is an enterprise information technology (IT) policy that encourages employees to use their own devices to access sensitive corporate data at work through the enterprise IT infrastructure. Many current BYOD security practices are costly to implement and intrusive to employees, which, to some degree, negate BYOD's perceived benefits. To address such tension, we propose prioritized defense deployment: Instead of employing the same costly and intrusive security measures on each BYOD smartphone, more stringent threat detection/mitigation mechanisms are deployed on those representative smartphones, each of which represents, security-wise, a group of smartphones in the whole BYOD device pool. To this end, we propose a concept and a distributed algorithm, both named T-dominance, to capture the temporal-spatial pattern in an enterprise environment. We identify a few desirable properties of prioritized defense deployment, and analytically show that T-dominance satisfies such properties. We complement our analysis with simulations on real Wi-Fi association traces.
Article
In this article, we discuss the importance of recognizing students' technology‐enhanced informal learning experiences and develop pedagogies to connect students' formal and informal learning experiences, in order to meet the demands of the knowledge society. The Mobile‐Blended Collaborative Learning model is proposed as a framework to bridge the gap between formal and informal learning and blend them together to form a portable, flexible, collaborative and creative learning environment. Using this model, three categories of mobile application tools, namely tools for collaboration, tools for coordination and tools for communication, have been identified as pertinent in blending formal and informal learning, and they can be connected seamlessly to provide an effective learning mechanism to support the learning process.