Research Article | Open Access | Download Full Text
Volume 3 | Issue 1 | Year 2025 | Article Id: CYS-V3I1P101 DOI: https://doi.org/10.59232/CYS-V3I1P101
Improved Bring Your Own Device Policy Framework for Mitigation of Malware Threats in Higher Institutions of Learning
Wesimika Andrew, Olawale Surajudeen Adebayo, Manana Peter, Mubuke Faisal
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 04 Jan 2025 | 07 Feb 2025 | 15 Mar 2025 | 31 Mar 2025 |
Citation
Wesimika Andrew, Olawale Surajudeen Adebayo, Manana Peter, Mubuke Faisal. “Improved Bring Your Own Device Policy Framework for Mitigation of Malware Threats in Higher Institutions of Learning.” DS Journal of Cyber Security, vol. 3, no. 1, pp. 1-23, 2025.
Abstract
Keywords
Application whitelisting policy, Bring your own device policy, Cyber security, Higher institutions of learning, Malware mitigation.
References
[1] Ben Scott, Raina Mason, and Patryk Szewczyk, “A Snapshot Analysis of Publicly Available BYOD Policies,” Proceedings of the 2021 Australasian Computer Science Week Multiconference, Dunedin New Zealand, pp. 1-6, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Ntwari Richard, Annabella E. Habinka, and Fred Kaggwa, “BYOD Systematic Literature Review: A Layered Approach,” European Journal of Technology, vol. 6, no. 1, pp. 69-85, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Melina Seedoyal Doargajudhur, and Peter Dell “The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation,” Journal of Computer Information Systems, vol. 60, no. 6, pp. 518-529, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Oluranti Jonathan, and Sanjay Misra, “Policy Framework for Adoption of Bring your Own Device (BYOD) by Institutions in Nigeria,” International Journal of Control Theory and Applications, vol. 9, no. 23, pp. 377-385, 2016.
[5] Kibreab Adane, “Threats Introduced by Bring Your Own Devices (BYOD) Adoption in an Ethiopian Higher Educational Institution: Solutions to Security and Privacy,” IUP Journal of Information Technology, vol. 16, no. 2, pp. 7-29, 2020.
[Google Scholar] [Publisher Link]
[6] Aliyu Aliyu et al., “A Holistic Cyber Security Maturity Assessment Framework for Higher Education Institutions in the United Kingdom,” Applied Sciences, vol. 10, no. 10, pp. 1-15, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Alexei Arina, and Alexei Anatolie, “Cyber Security Threat Analysis in Higher Education Institutions as a Result of Distance Learning,” International Journal of Scientific and Technology Research, vol. 10, no. 3, pp. 128-133, 2021.
[Google Scholar] [Publisher Link]
[8] Joachim Bjørge Ulven, and Gaute Wangen, “A Systematic Review of Cyber Security Risks in Higher Education,” Future Internet, vol. 13, no. 2, pp. 1-40, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Oonge S. Omboga, Muhambe T. Mukisa, and Ratemo M. Cyprian, “A Bring Your Own Device Risk Assessment Model,” International Journal of Security, vol. 12, no. 2, pp. 15-34, 2021.
[Google Scholar] [Publisher Link]
[10] Scott N. Romaniuk, and David Andrew Omona, “Uganda's Cyber Security Capacities and Challenges,” Companion to Global Cyber-Security Strategy, pp. 573-632, 2021.
[11] Eric C.K. Cheng, and Tianchong Wang, “Institutional Strategies for Cyber Security in Higher Education Institutions,” Information, vol. 13, no. 4, pp. 1-14, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Diptiben Ghelani, “Cyber Security, Cyber Threats, Implications and Future Perspectives: A Review,” Authorea Preprints, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Kanos Matyokurehwa et al., “Cyber Security Awareness in Zimbabwean Universities: Perspectives from the Students,” Security and Privacy, vol. 4, no. 2, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Richard Ntwari, Annabella E. Habinka, and Fred Kaggwa, “Enhancing Bring Your Own Device Security in Education,” Journal of Science & Technology, vol. 2, no. 4, pp. 1-18, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Md Alimul Haque et al., “Cyber Security in Universities: An Evaluation Framework,” SN Computer Science, vol. 4, no. 5, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Simon Kramer, and Julian C. Bradfield, “A General Definition of Malware,” Journal in Computer Virology, vol. 6, no. 2, pp. 105-114, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Antonina Pavlovna Sokolova et al., “Influence of BYOD Concept on Development of the Learning Process in Universities,” Propositus Representations, vol. 9, no. 2, pp. 1-10, 2021.
[Google Scholar] [Publisher Link]
[18] Stanford Musarurwa, Attlee M. Gamundani, and Fungai Bhunu Shava, “An Assessment of BYOD Control in Higher Institution of Learning: A Namibian Perspective,” 1st Africa Week Conference (IST-Africa), Nairobi, Kenya, pp. 1-9, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Eric B. Blancaflor, and Joel R. Hernandez, “A Compliance Based and Security Assessment of Bring Your Own Device (BYOD) in Organizations,” International Conference on Computer and Communication Engineering, Switzerland, pp. 116-127, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Nida AL-Sous et al., “Integrated E-Learning for Knowledge Management and its Impact on Innovation Performance Among Jordanian Manufacturing Sector Companies,” International Journal of Data and Network Science, vol. 7, no. 1, pp. 495-504, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Bashayer Alotaibi, and Haya Almagwashi, “A Review of BYOD Security Challenges, Solutions and Policy Best Practices,” 1st International Conference on Computer Applications & Information Security, Riyadh, Saudi Arabia, pp. 1-6, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Faizal Dine, “Cyber Threat Analysis and the Development of Proactive Security Strategies for Risk Mitigation,” 2024.
[23] Selma Şenel, and Hüseyin Can Şenel, “Remote Assessment in Higher Education during The COVID-19 Pandemic,” International Journal of Assessment Tools in Education, vol. 8, no. 2, pp. 181-199, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[24] V. Joseph Raymond, and R. Jeberson Retna Raj, “Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm,” Computer Systems Science and Engineering, vol. 44, no. 3, pp. 2147-2163, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Francis Ssekitto, “Staying Safe While Teaching and Learning Online in Library and Information Science Training Schools in Uganda: The Case of Makerere University,” Library Philosophy and Practice, vol. 7085, pp. 1-13, 2022.
[Google Scholar] [Publisher Link]
[26] Sadaf Hina, and P. Dhanapal Durai Dominic, “Information Security Policies' Compliance: A Perspective for Higher Education Institutions,” Journal of Computer Information Systems, vol. 60, no. 3, pp. 201-211, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[27] James Chester Hyatt, “External, Internal, and Inherent Factors Affecting End-User Security Awareness within Institutions of Higher Learning,” Walden University, 2015.
[Google Scholar] [Publisher Link]
[28] Norshima Humaidi, and Vimala Balakrishnan, “Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness,” International Journal of Information and Education Technology, vol. 5, no. 4, pp. 311-318, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Eric C.K. Cheng, and Tianchong Wang, “Editorial for the Special Issue ‘Information Technologies in Education, Research, and Innovation,” Information, vol. 15, no. 1, pp. 1-3, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Ieda M. Santos, “BYOD in the Classroom, Opportunities, Issues, and Policies,” Encyclopedia of Education and Information Technologies, pp. 267-272, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Katherine A. Clark et al., “Do Educators Realize the Value of Bring Your Own Device (BYOD) in Fieldwork Learning?,” Journal of Geography in Higher Education, vol. 45, no. 2, pp. 255-278, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Melva Ratchford et al., “BYOD Security Issues: A Systematic Literature Review,” Information Security Journal: A Global Perspective, vol. 31, no. 3, pp. 253-273, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Rathika Palanisamy et al., “BYOD Policy Compliance: Risks and Strategies in Organizations,” Journal of Computer Information Systems, vol. 62, no. 1, pp. 61-72, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Judith Schoonenboom, “The Fundamental Difference Between Qualitative and Quantitative Data in Mixed Methods Research,” Forum Qualitative Sozialforschung/Forum: Qualitative Social Research, vol. 24, no. 1, pp. 1-24, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Rayyan Aqila Praditya, and Agus Purwanto, “Linking The Influence of Dynamic Capabilities and Innovation Capabilities on Competitive Advantage: PLS-SEM Analysis,” Professor: Professional Education Studies and Operations Research, vol. 1, no. 2, pp. 6-10, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Julio Cabero-Almenara et al., “Development of the Teacher Digital Competence Validation of DigCompEdu Check-In Questionnaire in the University Context of Andalusia (Spain),” Sustainability, vol. 12 no. 15, pp. 1-14, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Gordon W. Cheung et al., “Reporting Reliability, Convergent and Discriminant Validity with Structural Equation Modelling: A Review and Best-Practice Recommendations,” Asia Pacific Journal of Management, vol. 41, no. 2, pp. 745-783, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Noora Shrestha, “Factor Analysis as a Tool for Survey Analysis,” American Journal of Applied Mathematics and Statistics, vol. 9, no. 1, pp. 4-11, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Dong Kyu Lee et al., “Data Transformation: A Focus on the Interpretation,” Korean Journal of Anesthesiology, vol. 73, no. 6, pp. 503-508, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Kathleen Downer, and Maumita Bhattacharya, “BYOD Security: A Study of Human Dimensions,” Informatics, vol. 9, no. 1, pp. 1-21, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Khalid A. Almarhabi, “An Improved Smart Contract-Based Bring-Your-Own-Device (BYOD) Security Control Framework,” Alexandria Engineering Journal, vol. 105, pp. 598-612, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Izzah Inani Abdul Halim et al., “BYOD Security Policy Model: A Systematic Literature Review,” Journal of Advanced Research in Applied Sciences and Engineering Technology, vol. 60, no. 4, pp. 170-186, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Indunil Karunarathna et al., “Comprehensive Data Collection: Methods, Challenges, and the Importance of Accuracy,” 2024.
[44] A.N. Datta, Shinu Abhi, and Nishanth Kumar, “Enhancing BYOD Security: A Risk Assessment Framework for Corporate Resources,” International Conference on Computing and Machine Learning, Singapore, pp. 483-496, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Harjinder Singh Lallie et al., “Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector,” Computers, vol. 14, no. 2, pp. 1-28, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[46] Noor Rahmawati Alias et al., “Investigating Factors Affecting the Adoption of BYOD in Educational Sectors: A Structured Literature Review Approach,” Journal of Islamic, vol. 9, no. 66, pp. 682-697, 2024.
[Google Scholar] [Publisher Link]
[47] Christian Odo et al., “Strengthening Cyber Security Resilience: the Importance of Education, Training, and Risk Management,” Training and Risk Management, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Rebecca Fioravanti et al., “Bring Your Own Device (BYOD) Student Experiences and Policy Considerations for Nontraditional Colleges,” The International Journal of Adult, Community and Professional Learning, vol. 31, no. 2, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[49] Mohammed Althamir et al., “Enhancing Malware Detection Efficacy: A Comparative Analysis of Endpoint Security and Application Whitelisting,” Journal of Theoretical and Applied Information Technology, vol. 102, no. 6, pp. 2451-2465, 2024.
[Google Scholar] [Publisher Link]
[50] Oluwatoyin Ajoke Farayola, Oluwabukunmi Latifat Olorunfemi, and Philip Olaseni Shoetan, “Data Privacy and Security In It: A Review Of Techniques and Challenges,” Computer Science & IT Research Journal, vol. 5, no. 3, pp. 606-615, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[51] Dina Moloja, Tembisa Ngqondi, and Noluntu Mpekoa, “BYODelving: Unmasking Security Risks in Higher Education Learning Management Systems South African Perspective,” 1st Africa Conference (IST-Africa), pp. 1-8, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[52] Mohammed Althamir et al., “Enhancing Malware Detection Efficacy: A Comparative Analysis of Endpoint Security and Application Whitelisting,” Journal of Theoretical and Applied Information Technology, vol. 102, no. 6, pp. 2451-2465, 2024.
[Google Scholar] [Publisher Link]
[53] Anirudh Khanna, Ransomware Prevention, Securing an Enterprise, Apress, Berkeley, CA, pp. 119-138, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[54] Dipo Dunsin et al., “Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response,” High-Confidence Computing, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[55] Muhammad Amirrudin, Khoirunnisa Nasution, and Supahar Supahar, “Effect of Variability on Cronbach Alpha Reliability in Research Practice,” Journal of Mathematics, Statistics and Computation, vol. 17, no. 2, pp. 223-230, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[56] Meltem Yalin-Uçar et al., “Development of the Reasoning Ways Scale: Validity and Reliability Study,” Kalem Education Human Science Journal, vol. 14, no. 1, pp. 129-153, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[57] V.T. Jimshith, and V. Mary Amala Bai, “Evaluation of Security Framework for BYOD Device in Cloud Environment,” Automatika, vol. 65, no. 3, pp. 803-814, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[58] Tafheem Ahmad Wani et al., “Status of Bring-Your-Own-Device (BYOD) Security Practices in Australian Hospitals-A National Survey,” Health Policy and Technology, vol. 11, no. 3, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[59] Aljuaid Turkea Ayedh M et al., “Systematic Literature Review on Security Access Control Policies and techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions,” Applied Sciences, vol. 13, no. 14, pp. 1-37, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[60] National Council for Higher Education, Guidelines for Acceptable and Responsible Access and Use of Digital Materials in Higher Education, 2024. [Online]. Available: https://unche.or.ug/wp-content/uploads/2024/05/Guidelines-for-acceptable-and-responsible-access-and-use-of-digital-materials-in-Higher-Education_2024-1.pdf
[61] Gema Howell et al., “Mobile Device Security: Bring Your Own Device (BYOD),” National Institute of Standards and Technology, 2023.
[CrossRef] [Google Scholar] [Publisher Link]