Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk

The use of mobile devices by employees to access organizational Information Systems (IS) is common nowadays, and it can be seen from the trend to the formalization of Bring Your Own Device (BYOD) and remote working settings. However, allowing IS resources to be accessed by mobile devices that enable...

Full description

Bibliographic Details
Published in:Proceedings - 2nd International Conference on Computer Science and Engineering: The Effects of the Digital World After Pandemic (EDWAP), IC2SE 2021
Main Author: Abu Othman N.A.; Norman A.A.; Kiah L.M.; Mutlaq Alnajrani H.
Format: Conference paper
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2021
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133141073&doi=10.1109%2fIC2SE52832.2021.9791959&partnerID=40&md5=15e80913abe691edd2620d7be267f61c
id 2-s2.0-85133141073
spelling 2-s2.0-85133141073
Abu Othman N.A.; Norman A.A.; Kiah L.M.; Mutlaq Alnajrani H.
Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk
2021
Proceedings - 2nd International Conference on Computer Science and Engineering: The Effects of the Digital World After Pandemic (EDWAP), IC2SE 2021


10.1109/IC2SE52832.2021.9791959
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133141073&doi=10.1109%2fIC2SE52832.2021.9791959&partnerID=40&md5=15e80913abe691edd2620d7be267f61c
The use of mobile devices by employees to access organizational Information Systems (IS) is common nowadays, and it can be seen from the trend to the formalization of Bring Your Own Device (BYOD) and remote working settings. However, allowing IS resources to be accessed by mobile devices that enable work flexibility across time, location, and network also increased the cybersecurity risk and vulnerabilities towards organizational resources, including network, system, and data. Therefore, this paper presents a systematic literature review on this context to explore the cybersecurity deficiency and mitigating techniques proposed for mobile device risk mitigation in organizational IS. Following the Systematic Literature Review protocol, 31 research articles are selected and reviewed using Thematic Analysis. Three themes were set to classify the output presented by the selected articles according to the context of Security Control, Cybersecurity Pillars, and Information System Management (ISM). This thematic analysis has successfully integrated various terms and narratives. Through analysis, nine security controls have been identified, with the most frequent concern being on Cybersecurity systems and Mobile Device profiling. The authors also discovered that deficiency in the Process factor is mostly discussed compared to the People and Technology factor, which also called for improvement in the ISM Planning phase. This study is beneficial in understanding the organizational cybersecurity deficiency in mitigating the risk of mobile devices and providing a reference for the significant security control in the context of the discussed environment. © 2021 IEEE.
Institute of Electrical and Electronics Engineers Inc.

English
Conference paper

author Abu Othman N.A.; Norman A.A.; Kiah L.M.; Mutlaq Alnajrani H.
spellingShingle Abu Othman N.A.; Norman A.A.; Kiah L.M.; Mutlaq Alnajrani H.
Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk
author_facet Abu Othman N.A.; Norman A.A.; Kiah L.M.; Mutlaq Alnajrani H.
author_sort Abu Othman N.A.; Norman A.A.; Kiah L.M.; Mutlaq Alnajrani H.
title Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk
title_short Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk
title_full Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk
title_fullStr Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk
title_full_unstemmed Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk
title_sort Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk
publishDate 2021
container_title Proceedings - 2nd International Conference on Computer Science and Engineering: The Effects of the Digital World After Pandemic (EDWAP), IC2SE 2021
container_volume
container_issue
doi_str_mv 10.1109/IC2SE52832.2021.9791959
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133141073&doi=10.1109%2fIC2SE52832.2021.9791959&partnerID=40&md5=15e80913abe691edd2620d7be267f61c
description The use of mobile devices by employees to access organizational Information Systems (IS) is common nowadays, and it can be seen from the trend to the formalization of Bring Your Own Device (BYOD) and remote working settings. However, allowing IS resources to be accessed by mobile devices that enable work flexibility across time, location, and network also increased the cybersecurity risk and vulnerabilities towards organizational resources, including network, system, and data. Therefore, this paper presents a systematic literature review on this context to explore the cybersecurity deficiency and mitigating techniques proposed for mobile device risk mitigation in organizational IS. Following the Systematic Literature Review protocol, 31 research articles are selected and reviewed using Thematic Analysis. Three themes were set to classify the output presented by the selected articles according to the context of Security Control, Cybersecurity Pillars, and Information System Management (ISM). This thematic analysis has successfully integrated various terms and narratives. Through analysis, nine security controls have been identified, with the most frequent concern being on Cybersecurity systems and Mobile Device profiling. The authors also discovered that deficiency in the Process factor is mostly discussed compared to the People and Technology factor, which also called for improvement in the ISM Planning phase. This study is beneficial in understanding the organizational cybersecurity deficiency in mitigating the risk of mobile devices and providing a reference for the significant security control in the context of the discussed environment. © 2021 IEEE.
publisher Institute of Electrical and Electronics Engineers Inc.
issn
language English
format Conference paper
accesstype
record_format scopus
collection Scopus
_version_ 1809678027893768192