his.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
BYOD vs. CYOD: What is the difference?
University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. Actea Consulting AB. (Information Systems)
2016 (English)In: Proceedings of the 9th IADIS International Conference: Information Systems 2016 / [ed] Philip Powell, Miguel Baptista Nunes and Pedro Isaías, IADIS Press, 2016Conference paper, (Refereed)
Abstract [en]

During the last years mobile devices have become very popular to use both for work and pleasure. Different strategies have evolved to increase productivity and to satisfy the employees. In this paper, we look at the two most popular strategies and look at the strengths and weaknesses of those. This is done by a systematic literature review and semi-structured interviews with CIO’s or equivalent roles. We conclude that BYOD and CYOD comes with similar strengths, but CYOD brings a little fewer security risks.

Place, publisher, year, edition, pages
IADIS Press, 2016.
Keyword [en]
BYOD, CYOD, Information Management, Mobile Devices, Mobile strategy, Smartphone, Bring Your Own Device.
National Category
Information Systems
Identifiers
URN: urn:nbn:se:his:diva-12153ISBN: 978-989-8533-50-0 OAI: oai:DiVA.org:his-12153DiVA: diva2:920380
Conference
9th IADIS International Conference Information Systems 2016
Available from: 2016-04-18 Created: 2016-04-18 Last updated: 2016-11-22Bibliographically approved
In thesis
1. Mobile Device Strategy: A management framework for securing company information assets on mobile devices
Open this publication in new window or tab >>Mobile Device Strategy: A management framework for securing company information assets on mobile devices
2016 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The problem addressed by this research is a demand for increased flexibility in access to organisational information, driven by the increasing popularity of mobile devices. Employees increasingly bring private devices to work (Bring Your Own Device, BYOD) or use work devices for private purposes (Choose Your Own Device, CYOD). This puts managers in a difficult position, since they want the benefits of mobility, without exposing organisational data to further risk. The research focuses on management (particularly information security management) issues in the design and implementation of strategies for mobile devices.  There are two objectives. The first is to identify existing information security management strategies for mobile and dual-use devices. The second is to develop a framework for analysing, evaluating and implementing a mobile device strategy.

The overall research strategy is inspired by Design Science; where the mission is to develop an artefact, in this case a framework, which will help to solve a practical problem. Methods include literature review, theoretical development, and the collection and analysis of qualitative data through interviews with executives. The main result of this work is the framework, which deals with the complete process, including analysis, design and implementation of a mobile device management strategy. It helps researchers to understand necessary steps in analysing phenomenon like BYOD and gives practitioners guidance in which analyses to conduct when working on strategies for mobile devices. The framework was developed primarily through theoretical work (with inspiration from the mobile security and strategic management literature, and the ISO/IEC 27000 standard), and evaluated and refined through the empirical studies. The results include twelve management issues, a research agenda, argumentation for CYOD and, guidance for researchers and practitioners.

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2016. 76 p.
Series
Dissertation Series, 15 (2016)
Keyword
Strategic Management, Mobile device, Information security, information security management, information management, BYOD, CYOD, mobile strategy, mobile device strategy, management framework
National Category
Information Systems
Identifiers
urn:nbn:se:his:diva-13125 (URN)978-91-982690-5-5 (ISBN)
Presentation
2016-11-29, G207, Högskolan i Skövde, Skövde, 13:00 (English)
Opponent
Supervisors
Funder
Knowledge Foundation
Available from: 2016-12-05 Created: 2016-11-22 Last updated: 2016-12-05Bibliographically approved

Open Access in DiVA

fulltext(222 kB)1032 downloads
File information
File name FULLTEXT01.pdfFile size 222 kBChecksum SHA-512
d44af501dff5cec455e7285e618e735aa6e17ee04b6e149890619df8973dae0e344f29014025761b5aa5b7ce83d68b33cc772df6dac6a59cf1b69f00ef73b99d
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Brodin, Martin
By organisation
School of InformaticsThe Informatics Research Centre
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 1032 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 5380 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf