Presentation 2014-07-25
Systematic analysis for the decision guidelines in the adoption and operation of BYOD : Contradiction between rules and information security
Takashi HATASHIMA, Yoshiaki SEKI, Yasuhisa SAKAMOTO, Shigeru KAYAGUCHI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) As performance and portability of information device are getting improved, companies take to the concept of new working style using mobile device privately owned by employees. It is called BYOD (Bring Your Own Device). According to surveys on BYOD, companies think information leakage is the biggest demerit and issue. As a countermeasure, companies prefer to set terms and pledges with employees than the use of ICT solutions. It follows that dealing with ICT risk is dependent on human attention to compliance with the rules by employee. Our research goal is to make a decision guideline for starting BYOD and mobile work, which considers merit and demerit factor from not only ICT but also various points of view. In this paper, we show a case of security issue caused by the contradiction in BYOD, which means that employees possibly use in non-compliance with the rules to pursue this benefit, although the improvement of convenience and productivity of employees are regarded as a benefit of both the employee and the company.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) BYOD / mobile work / smartphone and tablet / information leakage / shadow IT
Paper # LOIS2014-16
Date of Issue

Conference Information
Committee LOIS
Conference Date 2014/7/17(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Life Intelligence and Office Information Systems (LOIS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Systematic analysis for the decision guidelines in the adoption and operation of BYOD : Contradiction between rules and information security
Sub Title (in English)
Keyword(1) BYOD
Keyword(2) mobile work
Keyword(3) smartphone and tablet
Keyword(4) information leakage
Keyword(5) shadow IT
1st Author's Name Takashi HATASHIMA
1st Author's Affiliation NTT Secure Platform Laboratories()
2nd Author's Name Yoshiaki SEKI
2nd Author's Affiliation Department of Information Systems, Faculty of Informatics, Tokyo City University
3rd Author's Name Yasuhisa SAKAMOTO
3rd Author's Affiliation NTT Secure Platform Laboratories
4th Author's Name Shigeru KAYAGUCHI
4th Author's Affiliation NTT Secure Platform Laboratories
Date 2014-07-25
Paper # LOIS2014-16
Volume (vol) vol.114
Number (no) 150
Page pp.pp.-
#Pages 6
Date of Issue