Information security in the BYOD model

Authors

  • Grzegorz Podgórski University of Łódź

DOI:

https://doi.org/10.15584/nsawg.2018.1.15

Keywords:

BYOD, mobility of users, security of BYOD, information security

Abstract

The development of mobile devices, which can be seen now favors their use not only for communication, or entertainment, but increasingly also for work. New technologies such as Cloud Computing, fast, and public wireless networks, ever more perfect mobile devices, where a wide range available on the market makes that each user can adjust it to their requirements mean that more and more dynamically growing trend of workforce mobility. Mobility of workers, and thus the possibility of mobile computing is growing very rapidly and allows the use of newer and newer technologies. One of the models or trends that can be observed is BYOD (Bring Your Own Device). It is a model that allows for the use of their personal devices for business purposes. Ensure an appropriate level of information security in the case of new technologies related to user mobility is not an easy task. For organizations, this means a complete change of approach to managing the IT network, mobile devices, security management and management employees themselves. In the article will be presented the main aspects of information security, which should be in any organization which implements or has implemented a BYOD model for its IT infrastructure. Also it will be discussed the legal aspects, financial and related to licensing, which are directly connected with the BYOD model.

Published

2020-11-13

How to Cite

Podgórski, G. (2020). Information security in the BYOD model. Social Inequalities and Economic Growth, 1(53), 180–192. https://doi.org/10.15584/nsawg.2018.1.15

Issue

Section

Articles