{"id":"https://openalex.org/W2563771230","doi":"https://doi.org/10.1109/issa.2016.7802925","title":"Mobile device usage in higher education institutions in South Africa","display_name":"Mobile device usage in higher education institutions in South Africa","publication_year":2016,"publication_date":"2016-08-01","ids":{"openalex":"https://openalex.org/W2563771230","doi":"https://doi.org/10.1109/issa.2016.7802925","mag":"2563771230"},"language":"en","primary_location":{"id":"doi:10.1109/issa.2016.7802925","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2016.7802925","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090659356","display_name":"Ryan De Kock","orcid":null},"institutions":[{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Ryan De Kock","raw_affiliation_strings":["Center for Research in Information and Computer Security, Nelson Mandela Metropolitan University"],"affiliations":[{"raw_affiliation_string":"Center for Research in Information and Computer Security, Nelson Mandela Metropolitan University","institution_ids":["https://openalex.org/I99712911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080072349","display_name":"Lynn Futcher","orcid":"https://orcid.org/0000-0003-0406-8718"},"institutions":[{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Lynn A. Futcher","raw_affiliation_strings":["Center for Research in Information and Computer Security, Nelson Mandela Metropolitan University"],"affiliations":[{"raw_affiliation_string":"Center for Research in Information and Computer Security, Nelson Mandela Metropolitan University","institution_ids":["https://openalex.org/I99712911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5090659356"],"corresponding_institution_ids":["https://openalex.org/I99712911"],"apc_list":null,"apc_paid":null,"fwci":3.3174,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.93586947,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9623000025749207,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.949400007724762,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bring-your-own-device","display_name":"Bring your own device","score":0.8618228435516357},{"id":"https://openalex.org/keywords/higher-education","display_name":"Higher education","score":0.6938859224319458},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6678455471992493},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6111013889312744},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5276312232017517},{"id":"https://openalex.org/keywords/academic-integrity","display_name":"Academic integrity","score":0.49041271209716797},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.479331374168396},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4788936674594879},{"id":"https://openalex.org/keywords/academic-institution","display_name":"Academic institution","score":0.4588641822338104},{"id":"https://openalex.org/keywords/mobile-technology","display_name":"Mobile technology","score":0.41548261046409607},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39404362440109253},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.33603736758232117},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2592455744743347},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.22604551911354065},{"id":"https://openalex.org/keywords/economic-growth","display_name":"Economic growth","score":0.1957801878452301},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13826659321784973},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.10946083068847656},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.08854928612709045},{"id":"https://openalex.org/keywords/library-science","display_name":"Library science","score":0.08293631672859192}],"concepts":[{"id":"https://openalex.org/C2778282719","wikidata":"https://www.wikidata.org/wiki/Q917419","display_name":"Bring your own device","level":3,"score":0.8618228435516357},{"id":"https://openalex.org/C120912362","wikidata":"https://www.wikidata.org/wiki/Q136822","display_name":"Higher education","level":2,"score":0.6938859224319458},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6678455471992493},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6111013889312744},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5276312232017517},{"id":"https://openalex.org/C2779390046","wikidata":"https://www.wikidata.org/wiki/Q4671278","display_name":"Academic integrity","level":2,"score":0.49041271209716797},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.479331374168396},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4788936674594879},{"id":"https://openalex.org/C2992478610","wikidata":"https://www.wikidata.org/wiki/Q4671277","display_name":"Academic institution","level":2,"score":0.4588641822338104},{"id":"https://openalex.org/C60952562","wikidata":"https://www.wikidata.org/wiki/Q6887246","display_name":"Mobile technology","level":3,"score":0.41548261046409607},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39404362440109253},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.33603736758232117},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2592455744743347},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.22604551911354065},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.1957801878452301},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13826659321784973},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.10946083068847656},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.08854928612709045},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.08293631672859192},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/issa.2016.7802925","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2016.7802925","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1493449820","https://openalex.org/W2072487961","https://openalex.org/W2141388919","https://openalex.org/W2167928095","https://openalex.org/W2171559153","https://openalex.org/W2272495333","https://openalex.org/W2441609041","https://openalex.org/W2467135787","https://openalex.org/W2524964379","https://openalex.org/W2789274555","https://openalex.org/W2993892026","https://openalex.org/W6629424562","https://openalex.org/W6685087598","https://openalex.org/W6693854328","https://openalex.org/W6718419728"],"related_works":["https://openalex.org/W2136039855","https://openalex.org/W3157223595","https://openalex.org/W4255867944","https://openalex.org/W3202791679","https://openalex.org/W2007437584","https://openalex.org/W4234443860","https://openalex.org/W3017208041","https://openalex.org/W2966233020","https://openalex.org/W2593653312","https://openalex.org/W2607156711"],"abstract_inverted_index":{"Cyber":[0],"security":[1,97,131],"threats":[2,104],"are":[3,14],"on":[4],"the":[5,8,24,28,62,113,136,147,154,158,161,164,172,212,224,241,276],"rise":[6],"as":[7],"use":[9,225],"of":[10,27,38,57,115,128,142,149,160,210,226,244],"personally":[11,79],"owned":[12,80],"devices":[13],"increasing":[15],"within":[16],"higher":[17,58,94,189,229,254,268],"education":[18,59,95,137,190,230,255,269],"institutions.":[19],"This":[20,152,247],"is":[21,86,90,98,215,219,238],"due":[22],"to":[23,74,109,197,240,271],"rapid":[25],"adoption":[26],"Bring":[29],"Your":[30],"Own":[31],"Device":[32],"(BYOD)":[33],"trend.":[34],"In":[35,54,101,260],"2014,":[36,126,170],"92%":[37],"students":[39],"used":[40,47,51,196],"laptops":[41],"globally":[42],"for":[43,223,267,279],"academic":[44,205,242],"purposes,":[45],"44%":[46],"tablets,":[48],"and":[49,65,71,174,235],"68%":[50],"smart":[52],"phones.":[53],"addition,":[55,102,261],"89%":[56],"institutions":[60,231,256,270],"in":[61,93,125,135,146,169,192,203,228,232,253,257],"United":[63,66],"States":[64],"Kingdom":[67],"allow":[68],"students,":[69],"faculty":[70],"non-academic":[72],"staff":[73],"access":[75],"their":[76,107],"network":[77],"using":[78],"mobile":[81,110,117,200,250],"devices.":[82,111],"A":[83,177],"great":[84],"concern":[85],"that":[87,217,236],"although":[88],"BYOD":[89,227,237,280],"widely":[91],"accepted":[92],"institutions,":[96],"somewhat":[99],"lacking.":[100],"cyber-security":[103,167],"have":[105],"switched":[106],"focus":[108],"Therefore,":[112],"number":[114],"new":[116],"vulnerabilities":[118],"reported":[119],"each":[120],"year":[121],"has":[122],"increased.":[123],"Furthermore,":[124],"10%":[127],"global":[129],"cyber":[130],"breaches":[132,144,168],"took":[133],"place":[134],"sector":[138,156],"with":[139,163,181,275],"a":[140,182,188,208,220],"total":[141],"31":[143],"resulting":[145],"exposure":[148],"1,359,190":[150],"identities.":[151],"placed":[153],"educational":[155],"at":[157],"top":[159],"list":[162],"third":[165],"most":[166],"behind":[171],"healthcare":[173],"retail":[175],"sectors.":[176],"literature":[178],"survey,":[179],"together":[180],"single":[183],"explanatory":[184],"case":[185],"study":[186],"involving":[187],"institution":[191],"South":[193,233,258],"Africa":[194,234],"were":[195],"determine":[198],"typical":[199],"device":[201,251],"usage":[202,252],"an":[204],"context.":[206],"As":[207],"result":[209],"completing":[211],"study,":[213],"it":[214,262],"clear":[216],"there":[218],"high":[221],"demand":[222,278],"vital":[239],"success":[243],"its":[245],"students.":[246],"paper":[248],"discusses":[249],"Africa.":[259],"provides":[263],"some":[264],"key":[265],"factors":[266],"consider":[272],"when":[273],"dealing":[274],"increased":[277],"usage.":[281]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
