Högskolan i Skövde

his.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Mobile Device Strategy: A management framework for securing company information assets on mobile devices
University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. Actea Consulting AB. (Information Systems)
2016 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The problem addressed by this research is a demand for increased flexibility in access to organisational information, driven by the increasing popularity of mobile devices. Employees increasingly bring private devices to work (Bring Your Own Device, BYOD) or use work devices for private purposes (Choose Your Own Device, CYOD). This puts managers in a difficult position, since they want the benefits of mobility, without exposing organisational data to further risk. The research focuses on management (particularly information security management) issues in the design and implementation of strategies for mobile devices.  There are two objectives. The first is to identify existing information security management strategies for mobile and dual-use devices. The second is to develop a framework for analysing, evaluating and implementing a mobile device strategy.

The overall research strategy is inspired by Design Science; where the mission is to develop an artefact, in this case a framework, which will help to solve a practical problem. Methods include literature review, theoretical development, and the collection and analysis of qualitative data through interviews with executives. The main result of this work is the framework, which deals with the complete process, including analysis, design and implementation of a mobile device management strategy. It helps researchers to understand necessary steps in analysing phenomenon like BYOD and gives practitioners guidance in which analyses to conduct when working on strategies for mobile devices. The framework was developed primarily through theoretical work (with inspiration from the mobile security and strategic management literature, and the ISO/IEC 27000 standard), and evaluated and refined through the empirical studies. The results include twelve management issues, a research agenda, argumentation for CYOD and, guidance for researchers and practitioners.

Place, publisher, year, edition, pages
Skövde: University of Skövde , 2016. , p. 76
Series
Dissertation Series ; 15 (2016)
Keywords [en]
Strategic Management, Mobile device, Information security, information security management, information management, BYOD, CYOD, mobile strategy, mobile device strategy, management framework
National Category
Information Systems
Research subject
Information Systems
Identifiers
URN: urn:nbn:se:his:diva-13125ISBN: 978-91-982690-5-5 (print)OAI: oai:DiVA.org:his-13125DiVA, id: diva2:1048747
Presentation
2016-11-29, G207, Högskolan i Skövde, Skövde, 13:00 (English)
Opponent
Supervisors
Funder
Knowledge FoundationAvailable from: 2016-12-05 Created: 2016-11-22 Last updated: 2023-01-03Bibliographically approved
List of papers
1. Management issues for Bring Your Own Device
Open this publication in new window or tab >>Management issues for Bring Your Own Device
2015 (English)In: Proceedings of 12th European, Mediterranean & Middle Eastern Conference on Information Systems 2015 (EMCIS2015) / [ed] Kostantinos Lambrinoudakis, Vincenzo Morabito, Marinos Themistocleous, European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS) , 2015Conference paper, Published paper (Refereed)
Abstract [en]

Bring Your Own Device (BYOD) is an emerging research area focusing on the organisational adoption of (primarily mobile) devices used for both private and work purposes. There are many information security related problems concerning the use of BYOD and it should therefore be considered an issue of strategic importance for senior managers. This paper presents a systematic literature analysis using a BYOD strategic management framework to assess developing research trends. The analysis reveals early work in the analysis and design aspects of BYOD strategies, but a lack of research in operationalizing (planning, implementation and evaluating) strategy – the action phase. The resulting research agenda identifies twelve management issues for further research and four overall research directions that may stimulate future research.

Place, publisher, year, edition, pages
European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS), 2015
Keywords
BYOD Bring Your Own Device, information security management, strategic management
National Category
Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-11004 (URN)2-s2.0-85084023843 (Scopus ID)1 2 (Local ID)978-960-6897-08-5 (ISBN)1 2 (Archive number)1 2 (OAI)
Conference
European, Mediterranean & Middle Eastern Conference on Information Systems 2015 (EMCIS2015), 1-2 June, Athens, Greece
Note

Received the Best Paper Award

Available from: 2015-06-08 Created: 2015-06-08 Last updated: 2020-08-10Bibliographically approved
2. Combining ISMS with strategic management: The case of BYOD
Open this publication in new window or tab >>Combining ISMS with strategic management: The case of BYOD
2015 (English)In: Information Systems 2015: Proceedings of the 8th IADIS International Conference / [ed] Miguel Baptista Nunes, Pedro Isaias, Philip Powell, IADIS Press, 2015, p. 161-168Conference paper, Published paper (Refereed)
Abstract [en]

Bring Your Own Device (BYOD) (where employees use their private devices for work) causes problems for organisations since their management systems are seldom designed for this purpose. If BYOD is not adequately regulated, many security and privacy issues may result. This paper proposes an analysis-design-action framework for designing a suitable security management strategy by combining Johnson and Scholes’ strategic management model with the ISO/IEC 27000-series.

Place, publisher, year, edition, pages
IADIS Press, 2015
Keywords
ISO/IEC 27000-series, BYOD, Information Security Management, Strategic Management
National Category
Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-10931 (URN)2-s2.0-84944035669 (Scopus ID)978-989-8533-33-3 (ISBN)
Conference
8th IADIS International Conference on Information Systems 2015, 14–16 March, Madeira, Portugal
Note

The full-text published here is a reprint from a paper published in the Proceedings of the 8th IADIS International Conference on Information Systems 2015, IADIS, http://www.iadis.org.

Available from: 2015-05-12 Created: 2015-05-12 Last updated: 2020-08-10Bibliographically approved
3. BYOD vs. CYOD: What is the difference?
Open this publication in new window or tab >>BYOD vs. CYOD: What is the difference?
2016 (English)In: Proceedings of the 9th IADIS International Conference: Information Systems 2016 / [ed] Miguel Baptista Nunes, Pedro Isaías, Philip Powell, IADIS Press, 2016, p. 55-62Conference paper, Published paper (Refereed)
Abstract [en]

During the last years mobile devices have become very popular to use both for work and pleasure. Different strategies have evolved to increase productivity and to satisfy the employees. In this paper, we look at the two most popular strategies and look at the strengths and weaknesses of those. This is done by a systematic literature review and semi-structured interviews with CIO’s or equivalent roles. We conclude that BYOD and CYOD comes with similar strengths, but CYOD brings a little fewer security risks.

Place, publisher, year, edition, pages
IADIS Press, 2016
Keywords
BYOD, CYOD, Information Management, Mobile Devices, Mobile strategy, Smartphone, Bring Your Own Device
National Category
Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-12153 (URN)2-s2.0-84976351093 (Scopus ID)978-989-8533-50-0 (ISBN)978-1-5108-2369-3 (ISBN)
Conference
9th IADIS International Conference Information Systems, 9-11 April 2016, Vilamoura, Portugal
Available from: 2016-04-18 Created: 2016-04-18 Last updated: 2024-05-31Bibliographically approved
4. Management of Mobile Devices: How to Implement a New Strategy
Open this publication in new window or tab >>Management of Mobile Devices: How to Implement a New Strategy
2016 (English)In: Proceedings of The 27th International Business Information Management Association Conference: Innovation Management and Education Excellence Vision 2020: From Regional Development Sustainability to Global Economic Growth / [ed] Khalid S. Soliman, International Business Information Management Association (IBIMA), 2016, p. 1261-1268Conference paper, Published paper (Refereed)
Abstract [en]

Since smartphones entered the market the need for them has exploded, today 85 % believe that their mobile is a central part of their life. Despite the major focus on mobile devices and increased budgets, there are still many organisations missing a strategy for mobile devices. This article investigates the most important steps to take when implementing a mobile device strategy by conducting an empirical study with interviews with CIO or equivalent roles in 13 organisations with 50 to 15 000 employees. The result is an improved framework for mobile device implementation.

Place, publisher, year, edition, pages
International Business Information Management Association (IBIMA), 2016
Keywords
Information Management, Mobile Device, BYOD, CYOD
National Category
Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-12228 (URN)000381172300142 ()2-s2.0-84984664024 (Scopus ID)978-0-9860419-6-9 (ISBN)
Conference
The 27th International Business Information Management Association Conference, IBIMA 2016, Milan, Italy, May 4-5, 2016
Available from: 2016-05-11 Created: 2016-05-11 Last updated: 2019-03-06Bibliographically approved

Open Access in DiVA

MOBILE DEVICE STRATEGY(1545 kB)4692 downloads
File information
File name FULLTEXT01.pdfFile size 1545 kBChecksum SHA-512
f794a38d5d5a12a6ed8740f33470764bd945fd36233c32f43d1063ed29347cdb7f1b7d91a341828faae5f4a46aefc7ea5675ede530e6a8472074f7d82eefc34e
Type fulltextMimetype application/pdf

Authority records

Brodin, Martin

Search in DiVA

By author/editor
Brodin, Martin
By organisation
School of InformaticsThe Informatics Research Centre
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 4695 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 2438 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf