Location
Harare, Zimbabwe and Virtual
Start Date
12-9-2024 3:25 PM
End Date
12-9-2024 3:50 PM
Description
The Use Your Own Device (UYOD) paradigm is increasingly common in modern digital workplaces, offering benefits like flexibility and cost savings but also introducing significant cybersecurity risks. This study develops a comprehensive framework for constructing a robust human firewall aimed at mitigating these risks. The research employs a systematic literature review (SLR) methodology, starting with a corpus of 198 articles, from which 17 high-quality studies were selected for in-depth analysis. Key components identified include cybersecurity awareness training, regular simulated attacks, clear policies and procedures, technology competence training, and fostering a security-first culture. Findings reveal that integrating these components into an organization’s cybersecurity strategy significantly reduces vulnerability to cyberattacks, particularly in environments where personal devices are used for work. The implications of this research suggest that organizations must prioritize both human and technological aspects of cybersecurity to create an effective defense system. The SLR methodology and the selective analysis of 17 studies provide a robust and replicable approach for researchers and practitioners aiming to strengthen their cybersecurity frameworks.
Included in
Use Your Own Device (UYOD): Framework for Building a Human Firewall
Harare, Zimbabwe and Virtual
The Use Your Own Device (UYOD) paradigm is increasingly common in modern digital workplaces, offering benefits like flexibility and cost savings but also introducing significant cybersecurity risks. This study develops a comprehensive framework for constructing a robust human firewall aimed at mitigating these risks. The research employs a systematic literature review (SLR) methodology, starting with a corpus of 198 articles, from which 17 high-quality studies were selected for in-depth analysis. Key components identified include cybersecurity awareness training, regular simulated attacks, clear policies and procedures, technology competence training, and fostering a security-first culture. Findings reveal that integrating these components into an organization’s cybersecurity strategy significantly reduces vulnerability to cyberattacks, particularly in environments where personal devices are used for work. The implications of this research suggest that organizations must prioritize both human and technological aspects of cybersecurity to create an effective defense system. The SLR methodology and the selective analysis of 17 studies provide a robust and replicable approach for researchers and practitioners aiming to strengthen their cybersecurity frameworks.