Beruflich Dokumente
Kultur Dokumente
18/12/2018
Computação Móvel Aplicada
2
Summary:
1. Introduction
2. Objectives
3. Methodology
4. Challenges that BYOD presents in Tertiary Institutions
5. Considerations and Best Practices for BYOD
6. Existing Control Methods of BYOD
7. Guidelines Towards Improving BYOD in Tertiary Institutions
8. Findings and Discussion
9. Conclusion
The use of wireless networks has significantly increased and has become
the most ideal method to share computer resources in many organizations.
Today, many companies are implementing enterprise mobility strategies in
order to improve efficiency and gain competitive advantage. In tertiary
institutions, wireless network has become a critical part of IT infrastructure as
large number of users use mobile devices to access educational resources.
The adoption of BYOD in tertiary institutions allows staff and students to
connect personal mobile devices to institution’s wireless networks to access
networked resources. The fact that many universities experience budgetary
constraints, BYOD adoption has gained popularity as a cost-effective way
to enhance technological progress, by which instructors can engage
students to improve learning.
The main objective of the study was to review the extent of wireless security
challenges presented by the adoption of BYOD in tertiary institutions. The
study also analyzed the existing solutions that have been employed by
tertiary institutions to control BYOD in wireless network infrastructure, it
assessed whether these measures have been effective in dealing with the
security problem and what were shortfalls. Elements which are required to
ensure success of these solutions were identified.
Over the past few years there is influx of low cost smartphones which
penetrated in most African countries according to a 2015 IDG Connect
report. As a result, it is not surprising that many people have now upgraded
to a state of the art device. However, on the other hand, there is still lack of
understanding of risks associated with the use of these devices and how to
mitigate those risks. Most smartphone users do little or almost nothing, to
protect data on their mobile devices. Users frequently connect their mobile
devices to unsecured public wireless networks such restaurants and
shopping malls negligently without taking into consideration of risks such as
viruses, worms, spyware and other malware programs on such networks
which may cause devastating effects to personal information.