103
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A study on e-commuting: Alleviating technical and mobility threats in a BYOD-enabled banking environment in Nigeria

ORCID Icon & ORCID Icon

References

  • Apandi, S. H., J. Sallim, and R. M. Sidek. 2020. “Types of Anti-Phishing Solutions for Phishing Attack.” Paper presented at the IOP Conference Series: Materials Science and Engineering, 769(1), 012072. Pahang, Malaysia. IOP publishing. February, 1–4.
  • Arregui, D. A., S. B. Maynard, and A. Ahmad. 2016. “Mitigating BYOD Information Security Risks.” Masters thesis, The University of Melbourne, Melbourne, Australia. Accessed 14 April 2019. http://hdl.handle.net/11343/56627
  • Banti, E. T., and S. Nalliah. 2017. “Performing Operations on Deleted Items Using Deleted Property Information.” U.S. Patent 9,852,402, filed December 26.
  • Bello, A., J. Armarego, and D. Murray. 2015. “Bring Your Own Device Organizational Information Security and Privacy.” ARPN Journal of Engineering and Applied Sciences 10 (3): 1279–1287.
  • Brown, M. K., M. S. Brown, H. A. Little, and S. W. Totzke. 2020. “Selectively Wiping a Remote Device.” US Patents 2016O253.529A1, filed September 01.
  • Bryman, A., and E. Bell. 2015. Business Research Methods. Oxford University Press, England.
  • Chan, S. 2017. “Using Keystroke Logging to Understand Writers’ Processes on a Reading-Into-Writing Test.” Language Testing in Asia 7 (10): 1–27. doi: https://doi.org/10.1186/s40468-017-0040-5
  • Chen, H., Y. Li, L. Chen, and J. Yin. 2020. “Understanding Employees’ Adoption of the Bring-Your-Own-Device (BYOD): the Roles of Information Security–Related Conflict and Fatigue.” Journal of Enterprise Information Management. Advance online publication. doi:https://doi.org/10.1108/JEIM-10-2019-0318.
  • Christensen, T. 2019. “Organization Theory and Public Administration.” In Oxford Research Encyclopedia of Politics. Advance online publication. doi:https://doi.org/10.1093/acrefore/9780190228637.013.1439.
  • Cruttenden, W., D. Mark, J. Martell, S. Tyszka, J. Zeineh, W. Scacchi, Y. Yao, and B. Bekce. 2019. “Platform, Systems, and Methods for Interception of Data Stream Triggers.” US Patent 20190012734A1, filed September 7.
  • Cruttenden, W., D. Mark, J. Martell, S. Tyszka, J. Zeineh, W. Scacchi, Y. Yao, and B. Bekce. 2019. “Platform, Systems, and Methods for Interception of Data Stream Triggers.” In: Google Patents.
  • El-Moussa, F. 2018. “Method and System for Malicious Code Detection. US Patent 9,954,889, filed March 20.
  • Ferdous, J. 2017. “A Journey of Organization Theories: From Classical To Modern.” International Journal of Business, Economics and Law 12(2): 1–4. url: http://ijbel.com/wp-content/uploads/2017/05/BUS-61.pdf
  • Freudendal-Pedersen, M., and S. Kesselring. 2017. Exploring Networked Urban Mobilities: Theories, Concepts, Ideas. Abingdon: Routledge.
  • Gai, K., M. Qiu, L. Tao, and Y. Zhu. 2016. “Intrusion Detection Techniques for Mobile Cloud Computing in Heterogeneous 5G.” Security and Communication Networks 9 (16): 3049–3058.
  • Geist, D., M. Nigmatullin, and R. Bierens. 2016. “Jailbreak/Root Detection Evasion Study on iOS and Android.” MSc System and Network Engineering.
  • Gupta, B. B., A. Tewari, A. K. Jain, and D. P. Agrawal. 2017. “Fighting Against Phishing Attacks: State of the Art and Future Challenges.” Neural Computing and Applications 28 (12): 3629–3654.
  • Hwang, J., M. J. Eyring, J. E. Nye, and J. B. Warren. 2017. “Geo-Location Services.” In: Google Patents.
  • Jaiswal, S., and D. Gupta. 2018. “Measuring Security: A Step Towards Enhancing Security of System.” International Journal of Information Systems in the Service Sector 10 (1): 28–53.
  • Johnston, A. C., M. Warkentin, M. McBride, and L. Carter. 2016. “Dispositional and Situational Factors: Influences on Information Security Policy Violations.” European Journal of Information Systems 25 (3): 231–251.
  • Karen, Taylor. 2015. “Device Debacles – Lost, Stolen, and Neglected Data Risks”. AllClear ID. Accessed March 12, 2019. http://www.allclearid.com/blog/device-debacles-lost-stolen-and-neglected-data-risks
  • Ketel, M., and T. Shumate. 2015. “Bring Your Own Device: Security Technologies.” Paper presented at the SoutheastCon, pp. 1–7, IEEE. Fort Lauderdale, FL, April 9–12. doi: https://doi.org/10.1109/SECON.2015.7132981.
  • Kim, E., and J. Moon. 2016. “A new Approach to Deploying Private Mobile Network Exploits.” The Journal of Supercomputing 72 (1): 46–57.
  • Krejcie, R. V., and D. W. Morgan. 1970. “Determining Sample Size for Research Activities.” Educational and Psychological Measurement 30 (3): 607–610.
  • Kruse, W. F. H., M. J. Campagna, N. S. Mehr, H. Nagda, R. Berciu, and G. B. Roth. 2018. “Data Obfuscation.” U.S. Patent 9,946,895, filed April 17.
  • Lee, N. 2015. “Cyber Attacks, Prevention, and Countermeasures.” In Counterterrorism and Cybersecurity, edited by Lee Newton, 249–286. Switzerland: Springer, Cham. https://doi.org/https://doi.org/10.1007/978-3-319-17244-6_10.
  • Lindström, J., and C. Hanken. 2018. “Wearable Computing: Security Challenges, BYOD, Privacy, and Legal Aspects.” In Wearable Technologies: Concepts, Methodologies, edited by Lindström, John, 1043-1067. Hershey, PA: IGI Global.
  • Ling, C.-H., C.-C. Lee, C. C. Yang, and M.-S. Hwang. 2017. “A Secure and Efficient One-Time Password Authentication Scheme for WSN.” IJ Network Security 19 (2): 177–181.
  • Luo, W., Y. Hu, H. Jiang, and J. Wang. 2018. “Authentication by Encrypted Negative Password.” IEEE Transactions on Information Forensics and Security 14 (1): 114–128.
  • Marion, E. M. 2017. “Mobile Device Data Encryption.” In: Google Patents.
  • Mishra, R. 2017. “Byod (Bring Your Own Device): Security Issues.” Mangalmay Journal of Management & Technology 7 (2): 343–352.
  • Nagasundaram, S., and S. Aissi. 2019. “Privacy Firewall.” U.S. Patent 9,665,722, filed May 30.
  • Nguyen, L., Y. Tian, S. Cho, W. Kwak, S. Parab, Y. Kim, P. Tague, and J. Zhang. 2013. “UnLocIn: Unauthorized Location Inference on Smartphones Without Being Caught.” Paper presented at the 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1–8. IEEE. Atlantic City, NJ, USA. June 24–27.
  • Ofusori, L. O. 2019. “Three-Dimensional Security Framework for BYOD Enabled Banking Institutions in Nigeria.” PhD dissertation, University of KwaZulu-Natal, South Africa.
  • Ofusori, L. O., Dlamini, N. N. J., & Prabhakar, R. S. (2018). Optimized Three-Dimensional Security Framework to Mitigate Risks Arising From BYOD-Enabled Business Environment. In Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution. IGI Global, edited by Ziska Fields, 205–233, Durban: South Africa.
  • Ojeka, S., E. Ben-Caleb, and E.-O. I. Ekpe. 2017. “Cyber Security in the Nigerian Banking Sector: An Appraisal of Audit Committee Effectiveness.” International Review of Management and Marketing 7 (2): 340–346.
  • Ometov, A., S. Bezzateev, N. Mäkitalo, S. Andreev, T. Mikkonen, and Y. Koucheryavy. 2018. “Multi-Factor Authentication: A Survey.” Cryptography 2 (1): 1–31.
  • Parulekar, C. 2019. “Minimize Phishing Attacks: Securing Spear Attacks.” International Research Journal of Engineering and Technology 6 (6): 3054–3058.
  • Ponsini, N., and E. Vetillard. 2018. “Enforcing Server Authentication Based on a Hardware Token.” US Patent 201701 18196A1, filed February 26.
  • Radoglou-Grammatikis, P. I., and P. G. Sarigiannidis. 2017. “Flow Anomaly Based Intrusion Detection System for Android Mobile Devices.” Paper presented at the 2017 6th International Conference on Modern Circuits and Systems Technologies (MOCAST).
  • Raffaele, C., and J. Connell. 2016. “Telecommuting and Co-Working Communities: What Are the Implications for Individual and Organizational Flexibility?” In Flexible Work Organizations, edited by Sushil, Connell J., Burgess J, 21–35. Springer, New Delhi. https://doi.org/https://doi.org/10.1007/978-81-322-2834-9_2
  • Ramirez, J. B. Q., J. Canto, and A. Bermudez. 2018. “Scanning Files Using Antivirus Software.” US Patent 20190130105A1, filed May 2.
  • Schneier, J., and P. Kudenov. 2018. “Texting in Motion: Keystroke Logging and Observing Synchronous Mobile Discourse.” Mobile Media & Communication 6 (3): 309–330.
  • Sekaran, U., and R. Bougie. 2009. Research Methods of Business-A Skill-Building Approach. Chichester: England, United Kingdom John Wiley & Sons.
  • Sekgweleo, T., P. Makovhololo, and T. Iyamu. 2017. “The Connectedness in Selecting Socio-Technical Theory to Underpin Information Systems Studies.” Journal of Contemporary Management 14 (1): 1097–1117.
  • Shazmeen, S. F., and S. Prasad. 2012. “A Practical Approach for Secure Internet Banking Based on Cryptography.” International Journal of Scient Ific and Research Publications 2 (12): 1–6.
  • Shumate, T., and M. Ketel. 2014. “Bring Your Own Device: Benefits, Risks and Control Techniques.” Paper presented at the SOUTHEASTCON 2014, pp. 1–6, IEEE. Lexington, KY, USA, March 13–16. doi:https://doi.org/10.1109/SECON.2014.6950718
  • Srivastava, J., and K. Nanath. 2017. “Adoption of Cloud Computing in UAE: A Survey of Interplay Between Cloud Computing Ecosystem and its Organizational Adoption in UAE.” International Journal of Information Systems in the Service Sector 9 (4): 1–20.
  • Talbot, C. M., M. A. Temple, T. J. Carbino, and J. A. Betances. 2018. “Detecting Rogue Attacks on Commercial Wireless Insteon Home Automation Systems.” Computers & Security 74: 296–307.
  • Wang, Y., J. Wei, and K. Vangury. 2014. “Bring Your Own Device Security Issues and Challenges.” Paper presented at the 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) pp. 80-85. Las Vegas, NV, January 10–13, doi:https://doi.org/10.1109/CCNC.2014.6866552.
  • Xavier, J., A. M. Mitchell, B. J. Tsang, G. A. Herbert, H. I. Savastano, L. Khandelwal, R. C. Pengelly, R. Novitskey, and S. Grant. 2018. “Anti-Phishing Protection.” U.S. Patent 7,975,297, filed July 5.
  • Zhang, L. Z., Mouritsen, M., and Miller J. R. 2019. “Role of Perceived Value in Acceptance of ‘Bring Your Own Device’ Policy.” Journal of Organizational and End User Computing 31 (2): 65–82.
  • Zhang, L., L. Zhao, Z. Wang, and J. Liu. 2017. “WiFi Networks in Metropolises: From Access Point and User Perspectives.” IEEE Communications Magazine 55 (5): 42–48.
  • Zhou, T. 2017. “Understanding Location-Based Services Users’ Privacy Concern.” Internet Research 27(2): 506-519.
  • Zou, Y., J. Zhu, X. Wang, and L. Hanzo. 2016. “A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends.” Proceedings of the IEEE 104 (9): 1727–1765.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.