Location

Harare, Zimbabwe and Virtual

Start Date

12-9-2024 3:25 PM

End Date

12-9-2024 3:50 PM

Description

The Use Your Own Device (UYOD) paradigm is increasingly common in modern digital workplaces, offering benefits like flexibility and cost savings but also introducing significant cybersecurity risks. This study develops a comprehensive framework for constructing a robust human firewall aimed at mitigating these risks. The research employs a systematic literature review (SLR) methodology, starting with a corpus of 198 articles, from which 17 high-quality studies were selected for in-depth analysis. Key components identified include cybersecurity awareness training, regular simulated attacks, clear policies and procedures, technology competence training, and fostering a security-first culture. Findings reveal that integrating these components into an organization’s cybersecurity strategy significantly reduces vulnerability to cyberattacks, particularly in environments where personal devices are used for work. The implications of this research suggest that organizations must prioritize both human and technological aspects of cybersecurity to create an effective defense system. The SLR methodology and the selective analysis of 17 studies provide a robust and replicable approach for researchers and practitioners aiming to strengthen their cybersecurity frameworks.

Share

COinS
 
Sep 12th, 3:25 PM Sep 12th, 3:50 PM

Use Your Own Device (UYOD): Framework for Building a Human Firewall

Harare, Zimbabwe and Virtual

The Use Your Own Device (UYOD) paradigm is increasingly common in modern digital workplaces, offering benefits like flexibility and cost savings but also introducing significant cybersecurity risks. This study develops a comprehensive framework for constructing a robust human firewall aimed at mitigating these risks. The research employs a systematic literature review (SLR) methodology, starting with a corpus of 198 articles, from which 17 high-quality studies were selected for in-depth analysis. Key components identified include cybersecurity awareness training, regular simulated attacks, clear policies and procedures, technology competence training, and fostering a security-first culture. Findings reveal that integrating these components into an organization’s cybersecurity strategy significantly reduces vulnerability to cyberattacks, particularly in environments where personal devices are used for work. The implications of this research suggest that organizations must prioritize both human and technological aspects of cybersecurity to create an effective defense system. The SLR methodology and the selective analysis of 17 studies provide a robust and replicable approach for researchers and practitioners aiming to strengthen their cybersecurity frameworks.