Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk
The use of mobile devices by employees to access organizational Information Systems (IS) is common nowadays, and it can be seen from the trend to the formalization of Bring Your Own Device (BYOD) and remote working settings. However, allowing IS resources to be accessed by mobile devices that enable...
Published in: | Proceedings - 2nd International Conference on Computer Science and Engineering: The Effects of the Digital World After Pandemic (EDWAP), IC2SE 2021 |
---|---|
Main Author: | |
Format: | Conference paper |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2021
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133141073&doi=10.1109%2fIC2SE52832.2021.9791959&partnerID=40&md5=15e80913abe691edd2620d7be267f61c |
id |
2-s2.0-85133141073 |
---|---|
spelling |
2-s2.0-85133141073 Abu Othman N.A.; Norman A.A.; Kiah L.M.; Mutlaq Alnajrani H. Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk 2021 Proceedings - 2nd International Conference on Computer Science and Engineering: The Effects of the Digital World After Pandemic (EDWAP), IC2SE 2021 10.1109/IC2SE52832.2021.9791959 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133141073&doi=10.1109%2fIC2SE52832.2021.9791959&partnerID=40&md5=15e80913abe691edd2620d7be267f61c The use of mobile devices by employees to access organizational Information Systems (IS) is common nowadays, and it can be seen from the trend to the formalization of Bring Your Own Device (BYOD) and remote working settings. However, allowing IS resources to be accessed by mobile devices that enable work flexibility across time, location, and network also increased the cybersecurity risk and vulnerabilities towards organizational resources, including network, system, and data. Therefore, this paper presents a systematic literature review on this context to explore the cybersecurity deficiency and mitigating techniques proposed for mobile device risk mitigation in organizational IS. Following the Systematic Literature Review protocol, 31 research articles are selected and reviewed using Thematic Analysis. Three themes were set to classify the output presented by the selected articles according to the context of Security Control, Cybersecurity Pillars, and Information System Management (ISM). This thematic analysis has successfully integrated various terms and narratives. Through analysis, nine security controls have been identified, with the most frequent concern being on Cybersecurity systems and Mobile Device profiling. The authors also discovered that deficiency in the Process factor is mostly discussed compared to the People and Technology factor, which also called for improvement in the ISM Planning phase. This study is beneficial in understanding the organizational cybersecurity deficiency in mitigating the risk of mobile devices and providing a reference for the significant security control in the context of the discussed environment. © 2021 IEEE. Institute of Electrical and Electronics Engineers Inc. English Conference paper |
author |
Abu Othman N.A.; Norman A.A.; Kiah L.M.; Mutlaq Alnajrani H. |
spellingShingle |
Abu Othman N.A.; Norman A.A.; Kiah L.M.; Mutlaq Alnajrani H. Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk |
author_facet |
Abu Othman N.A.; Norman A.A.; Kiah L.M.; Mutlaq Alnajrani H. |
author_sort |
Abu Othman N.A.; Norman A.A.; Kiah L.M.; Mutlaq Alnajrani H. |
title |
Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk |
title_short |
Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk |
title_full |
Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk |
title_fullStr |
Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk |
title_full_unstemmed |
Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk |
title_sort |
Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk |
publishDate |
2021 |
container_title |
Proceedings - 2nd International Conference on Computer Science and Engineering: The Effects of the Digital World After Pandemic (EDWAP), IC2SE 2021 |
container_volume |
|
container_issue |
|
doi_str_mv |
10.1109/IC2SE52832.2021.9791959 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133141073&doi=10.1109%2fIC2SE52832.2021.9791959&partnerID=40&md5=15e80913abe691edd2620d7be267f61c |
description |
The use of mobile devices by employees to access organizational Information Systems (IS) is common nowadays, and it can be seen from the trend to the formalization of Bring Your Own Device (BYOD) and remote working settings. However, allowing IS resources to be accessed by mobile devices that enable work flexibility across time, location, and network also increased the cybersecurity risk and vulnerabilities towards organizational resources, including network, system, and data. Therefore, this paper presents a systematic literature review on this context to explore the cybersecurity deficiency and mitigating techniques proposed for mobile device risk mitigation in organizational IS. Following the Systematic Literature Review protocol, 31 research articles are selected and reviewed using Thematic Analysis. Three themes were set to classify the output presented by the selected articles according to the context of Security Control, Cybersecurity Pillars, and Information System Management (ISM). This thematic analysis has successfully integrated various terms and narratives. Through analysis, nine security controls have been identified, with the most frequent concern being on Cybersecurity systems and Mobile Device profiling. The authors also discovered that deficiency in the Process factor is mostly discussed compared to the People and Technology factor, which also called for improvement in the ISM Planning phase. This study is beneficial in understanding the organizational cybersecurity deficiency in mitigating the risk of mobile devices and providing a reference for the significant security control in the context of the discussed environment. © 2021 IEEE. |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
issn |
|
language |
English |
format |
Conference paper |
accesstype |
|
record_format |
scopus |
collection |
Scopus |
_version_ |
1809678027893768192 |