Navigating Legal Implications: The Impact of Enhanced Smartphone Integration on Security in Organizational Networks


Kenneth Ohei(1*)

(1) Mangosuthu University of Technology, South Africa
(*) Corresponding Author

Abstract


The escalating integration of smartphones within organizational frameworks has been driven by their augmented functionality, especially pertinent during the global pandemic. However, this surge in device utilization has concurrently amplified concerns surrounding security, as sensitive data becomes increasingly susceptible. In this context, the study conducted a survey to assess the security implications of smartphone integration while considering the legal aspects. The findings unequivocally substantiate the notion that smartphones pose substantial security risks, particularly when users stray from established protocols, potentially leading to legal consequences. Drawing from prior research emphasizing mobile devices' vulnerability, we advocate for a preemptive legal stance, suggesting the installation of anti-malware software on smartphones as a legally sound countermeasure. By doing so, organizations can thwart potential hacking endeavors, thereby not only fortifying network security but also mitigating legal liabilities and shielding sensitive information in compliance with relevant regulations. The implications of this study extend to organizational management and legal teams, enabling them to enact effective policies that reinforce network security and adhere to evolving legal challenges. This research underscores the significance of striking a balance between technological integration and safeguarding confidentiality within the boundaries of the law, offering essential insights for organizational resilience in an increasingly digitized landscape while avoiding legal pitfalls.

Keywords


Compliance regulations, Information technology (IT), Network security, Attacks, Security concerns, Telecommunication

Full Text:

PDF

References


Abowd, G. D., & Sterbenz, J. P. G. (2000). Final report on the inter-agency workshop on research issues for smart environments. IEEE Personal Communications, 7(5), 36–40.

Androulidakis, I., & Kandus, G. (2011). Mobile phone security awareness and practices of students in budapest. Proceedings of the 6th International Conference on Digital Telecommunications, 17–22.

Aviv, A. J., Sapp, B., Blaze, M., & Smith, J. M. (2012). Practicality of accelerometer side channels on smartphones. Proceedings of the 28th Annual Computer Security Applications Conference, 41–50.

Balacheff, N., Ludvigsen, S., De Jong, T., Lazonder, A., Barnes, S.-A., & Montandon, L. (2009). Technology-enhanced learning. Springer.

Bandara, I., Ioras, F., & Maher, K. (2014). Cyber security concerns in e-learning education. ICERI2014 Proceedings, 728–734. IATED.

Banks, L. (2010). Mobile devices pose security dilemma for CIOs. Retrieved May 13, 2023, from Ananalysis based on PCT patent applications website: http://www.cio.com.au/article/346474/mobile_devices_pose_security_dilemma_cios

Bauman, S., & Del Rio, A. (2006). Preservice teachers’ responses to bullying scenarios: Comparing physical, verbal, and relational bullying. Journal of Educational Psychology, 98(1), 219.

Beghriche, A., & Bilami, A. (2018). A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks. International Journal of Intelligent Computing and Cybernetics, 11(2), 309–340.

Botha, R. A., Furnell, S. M., & Clarke, N. L. (2009). From desktop to mobile: Examining the security experience. Computers & Security, 28(3–4), 130–137.

Chen, Y., & He, W. (2013). Security risks and protection in online learning: A survey. The International Review of Research in Open and Distributed Learning, 14(5).

Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447–459.

Chun, B.-G., & Maniatis, P. (2009). Augmented smartphone applications through clone cloud execution. HotOS, 9, 8–11.

Collin, R. (2019). The Theory of Conscious Harmony. Lulu. com.

Creswell, J. W., & Creswell, J. D. (2017). Research design: Qualitative, quantitative, and mixed methods approaches. Inggris: Sage publications.

Dang-Pham, D., & Pittayachawan, S. (2015). Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Computers & Security, 48, 281–297.

Dwivedi, Y. K., Hughes, D. L., Coombs, C., Constantiou, I., Duan, Y., Edwards, J. S., … Prashant, P. (2020). Impact of COVID-19 pandemic on information management research and practice: Transforming education, work and life. International Journal of Information Management, 55, 102211.

Effiong, A. (2013). Developing meaningful outcome measures for advanced care planning in the context of end stage renal disease (ESRD): going beyond randomised clinical trials (RCTs). BMJ Supportive & Palliative Care, 3(2), 246.

Egners, A., Marschollek, B., & Meyer, U. (2012). Hackers in your pocket: A survey of smartphone security across platforms. RWTH Aachen, Tech. Rep. AIB-2012-07.

Enck, W., Ongtang, M., & McDaniel, P. (2009). On lightweight mobile phone application certification. Proceedings of the 16th ACM Conference on Computer and Communications Security, 235–245.

Ferman, A. M., & İlhan, D. O. (2019). An Evaluation Model Based on Sustainable Development for the Istanbul Shopping Center Market. Aurum Journal of Social Sciences, 4(2), 129–154.

Freiberger-Verizon, M., & Watts-Verizon, M. T. (2018). Low latency networks: future service level use cases and requirements. 2018 Optical Fiber Communications Conference and Exposition (OFC), 1–3. IEEE.

Garfinkel, S. L., Juels, A., & Pappu, R. (2005). RFID privacy: An overview of problems and proposed solutions. IEEE Security & Privacy, 3(3), 34–43.

Gherbi, C., Aliouat, Z., & Benmohammed, M. (2017). A survey on clustering routing protocols in wireless sensor networks. Sensor Review, 37(1), 12–25.

Gikas, J., & Grant, M. M. (2013). Mobile computing devices in higher education: Student perspectives on learning with cellphones, smartphones & social media. The Internet and Higher Education, 19, 18–26.

Godwin-Jones, R. (2017). Smartphones and language learning.

Goggin, G. (2021). Apps: From mobile phones to digital lives. John Wiley & Sons.

Gordon, C. J. (2015). Addressing security risks for mobile devices: What higher education leaders should know. The University of Nebraska-Lincoln.

Goyal, S., Jabbari, S., Kearns, M., Khanna, S., & Morgenstern, J. (2016). Strategic network formation with attack and immunization. Web and Internet Economics: 12th International Conference, WINE 2016, Montreal, Canada, December 11-14, 2016, Proceedings 12, 429–443. Springer.

Guido, M., Ondricek, J., Grover, J., Wilburn, D., Nguyen, T., & Hunt, A. (2013). Automated identification of installed malicious Android applications. Digital Investigation, 10, S96–S104.

Henderson, T. (2011). How mobile device management works. In IT WORLD. IT WORLD.

Holmes, A., Byrne, A., & Rowley, J. (2013). Mobile shopping behaviour: insights into attitudes, shopping process involvement and location. International Journal of Retail & Distribution Management, 42(1), 25–39.

Jansen, W., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing. US Department of Commerce, National Institute of Standards and Technology ….

Karlsson, M., Denk, T., & Åström, J. (2018). Perceptions of organizational culture and value conflicts in information security management. Information & Computer Security, 26(2), 213–229.

Kaufman, L. M. (2009). Data security in the world of cloud computing. IEEE Security & Privacy, 7(4), 61–64.

Kritzinger, E., & Smith, E. (2008). Information security management: An information security retrieval and awareness model for industry. Computers & Security, 27(5–6), 224–231.

Lacey, D. (2010). Understanding and transforming organizational security culture. Information Management & Computer Security, 18(1), 4–13.

Lamey, D. (2018). The evolution of technology: past, present and future. In Discover Tech. Discover Tech.

Layland, R., Wexler, J., Datoo, A., George, A., Rege, O., Marshall, J., … Duckering, B. (2012). The 2011 Mobile Device Management Challenge–Defusing Mobile Anarchy in the Enterprise. Network World and Robin Layland Present. Http://Solutioncenters. Networkworld. Com/Mobile_management_challenge. Accessed, 29.

Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12–22.

Mirzajani, H., Mahmud, R., Fauzi Mohd Ayub, A., & Wong, S. L. (2016). Teachers’ acceptance of ICT and its integration in the classroom. Quality Assurance in Education, 24(1), 26–40.

Moneo, J. M., Caballe, S., & Prieot, J. (2012). Security in learning management systems. Spain: eLearning Papers.

Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), 5–8.

Mukhopadhyay, A., Chatterjee, S., Bagchi, K. K., Kirs, P. J., & Shukla, G. K. (2019). Cyber risk assessment and mitigation (CRAM) framework using logit and probit models for cyber insurance. Information Systems Frontiers, 21, 997–1018.

Muogboh, O. S., & Ojadi, F. (2018). Indigenous logistics and supply chain management practice in Africa. In Indigenous Management Practices in Africa (Vol. 20, pp. 47–70). Emerald Publishing Limited.

Murray, M. (2019). Tutorial: A descriptive introduction to the blockchain. Communications of the Association for Information Systems, 45(1), 25.

Murtagh, F., & Legendre, P. (2014). Ward’s hierarchical agglomerative clustering method: which algorithms implement Ward’s criterion? Journal of Classification, 31, 274–295.

Ngoqo, B., & Flowerday, S. V. (2015). Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users. Computers & Security, 53, 132–142.

O’Connell, M. E., & DiFonzo, J. H. (2018). Reprinted from Vol. 44 No. 4 in Honor of Professor J. Herbie DiFonzo. The Family Law Education Reform Project Final Report. Family Court Review, 56(1), 18–55.

Osterman, A., Vizoso Pinto, M. G., Haase, R., Nitschko, H., Jäger, S., Sander, M., … Baiker, A. (2012). Systematic screening for novel, serologically reactive Hepatitis E Virus epitopes. Virology Journal, 9(1), 1–9.

Ott, D. (2014). Android* Security: Issues and Future Directions. Intel Technology Journal, 18(2), 34–49.

Parkinson, S., & Khan, S. (2018). Identifying irregularities in security event logs through an object-based Chi-squared test of independence. Journal of Information Security and Applications, 40, 52–62.

Picazo-Vela, S., Fernández-Haddad, M., & Luna-Reyes, L. F. (2016). Opening the black box: Developing strategies to use social media in government. Government Information Quarterly, 33(4), 693–704.

Pottie, G. J., & Kaiser, W. J. (2000). Wireless integrated network sensors. Communications of the ACM, 43(5), 51–58.

Puhakainen, P., & Siponen, M. (2010). Improving employees’ compliance through information systems security training: an action research study. MIS Quarterly, 757–778.

Robinson, T. (2014). Study reveals only 56 percent of employees get awareness training. SC Magazine.

Rogers, D. (2013). Mobile Security: A Guide for Users. Lulu. com.

Schaeffer-Filho, A., Smith, P., Mauthe, A., & Hutchison, D. (2014). Management Patterns for Network Resilience: Design and Verification of Policy Configurations. Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns, 85–95.

Seppälä, P., & Alamäki, H. (2003). Mobile learning in teacher training. Journal of Computer Assisted Learning, 19(3), 330–335.

Shammar, E. A., & Zahary, A. T. (2020). The Internet of Things (IoT): a survey of techniques, operating systems, and trends. Library Hi Tech, 38(1), 5–66.

Sharma, I., & Ramkumar, K. R. (2017). A survey on ACO based multipath routing algorithms for ad hoc networks. International Journal of Pervasive Computing and Communications, 13(4), 370–385.

Shinde, D. L. (2002). Cybercrime Scene of the Computer Forensics Handbood.

Talib, S., Clarke, N. L., & Furnell, S. M. (2010). An analysis of information security awareness within home and work environments. 2010 International Conference on Availability, Reliability and Security, 196–203. IEEE.

Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cyber security threats to IoT applications and service domains. Wireless Personal Communications, 95, 169–185.

Von Solms, B. (2001). Corporate governance and information security. Computers & Security, 20(3), 215–218.

Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. Wireless Network Security, 103–135.




DOI: https://doi.org/10.15575/kh.v5i2.28723

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Kenneth Ohei

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


Jl. Raya A.H. Nasution No. 105 Cibiru Kota Bandung, 40614

E-mail: KHukum@uinsgd.ac.id

Lisensi Creative Commons

Khazanah Hukum are licensed under Attribution-ShareAlike 4.0 International