June'20

The IUP Journal of Information Technology

Focus

Although remote work is not new and existed for some of the employees in select organizations as a flexible practice long before the pandemic erupted, it has become a new normal for many organizations of late. A recent survey by Gartner reveals that about 74% of the surveyed organizations expect at least 5% of their workforce to remain as WFH employees even after the pandemic ends. About 25% of the respondents reveal that 20% of their workforce will remain remote permanently. Indian software services giant, TCS has announced that up to 75% of its global workforce will work from home by 2025. The major reason for this move is that CFOs clearly sense a better way to manage cost, particularly the facility cost which is very significant.

While it is still a bit early to say that this new work environment will bring new type of employee-contracts, policies and procedures, it will definitely pose security and privacy issues for many organizations if they are not properly equipped with necessary infrastructure in place to support the changing environment. In particular, when organizations roll out remote workforce and workers access the organization's data and system online, it increases the risk of cyber security. Unlike company office, home environment has a different physical and digital space where the employee uses his computer and devices to access the organizational systems. Home setups are often infected with malware, made up of compromised hardware, have inadequate endpoint integrity checking and thus remain insecure. Increased data-sharing over the Internet that is full of malicious actors heightens security risks. Hackers can also manipulate Virtual Private Network (VPN) of the organization through the mobile endpoints and home networks to stage attacks. According to a recent report, most of the organizations experience an increase in cyber attacks surrounding a pandemic. There has been a 600% increase in phishing emails since February 2020. World Health Organization (WHO) reports a fivefold dramatic increase in cyber attacks directed at its staff. Consequently, the new work environment necessitates technology researchers and business leaders to innovate new means and measures to mitigate the risks associated with the remote workforce that are likely to continue post-pandemic years.

The first paper, "Threats Introduced by Bring Your Own Devices (BYOD) Adoption in an Ethiopian Higher Educational Institution: Solutions to Security and Privacy", by Kibreab Adane, analyzes the security and privacy considerations used by educational institutions of Ethiopia when they decide the strategic adoption of BYOD. The paper, "Development of Smart Agriculture Monitoring System Using IOT", by Raktim Pratihar and Bansari Deb Majumder, proposes an IoT system for irrigation which can increase the agricultural productivity of farmers.

The last paper, "Criteria for Choosing the Right Software Development Life Cycle Method for the Success of Software Project", by Amaefule Angela Adanna and Ogwueleka Francisca Nonyelum, discusses the suitability of SDLC method to achieve success of software projects in an organization.

-A C Ojha
Consulting Editor

Article   Price (₹)
Threats Introduced by Bring Your Own Devices (BYOD) Adoption in an Ethiopian Higher Educational Institution: Solutions to Security and Privacy
100
Development of Smart Agriculture Monitoring System Using IoT
100
Criteria for Choosing the Right Software Development Life Cycle Method for the Success of Software Project
100
Articles

Threats Introduced by Bring Your Own Devices (BYOD) Adoption in an Ethiopian Higher Educational Institution: Solutions to Security and Privacy
Kibreab Adane

The higher educational institutions of Ethiopia are seriously susceptible to cyber attacks. If malicious actors succeeded, it can adversely affect the security of sensitive information of stakeholders. The overall impact on security and privacy along with credibility of the institutions will be questioned. Usually, it is found that most of the organizations that encourage the culture of "Personal or Bring your Own Devices (BYOD)"are vulnerable to security and privacy breaches. The paper investigates and analyzes the security and privacy strategic considerations used by educational institutions when deciding the strategic adoption of BYOD. Further, the study finds out the cost-effective and secured solutions that can help these institutions balance the trade-offs between excessive-freedom of network access and protecting from BYOD security and privacy risks. The data was collected using interview of experts and a survey questionnaire to voluntary stakeholders. The findings reveal that BYOD is already in practice and adopted without considering transparent policies, security and privacy issues, device and application management tools, end-user security/privacy awareness and training. Also, there is excessive freedom of network access to whosoever is part of the network. This freedom causes security and privacy risks and bandwidth constraints. Finally, the study has made a comparative analysis of latest BYOD management tools using selected parameters like cost, diversified device and application management capability including device registration, remote tracking, wiping, locking and training/support from vendors for alleviating the issues and challenges. After critical analysis of mobile device management tools, the Manage Engine Mobile Device Manager (MEMDM) is proposed as the most fit software to meet the necessary criteria set.


© 2020 IUP. All Rights Reserved.

Article Price : Rs.100

Development of Smart Agriculture Monitoring System Using IoT
Raktim Pratihar and Bansari Deb Majumder

Agriculture is an important sector for developing countries like India. However, the development of agricultural production has been hindered by certain issues related to the use of traditional systems. In the past, much research has been carried out to modernize the agricultural system. However, there is a need for low-cost and easy-to-use technological solutions to the poor farmers of the country. Hence, the paper aims at making the existing agricultural system smart by using IoT. A compact, lightweight and integrated system has been developed comprising multi-sensors to measure all the parameters and continuously monitor the soil content, weather conditions, temperature and humidity. All parameters are real-time monitored over the Internet of Things (IoT), thereby making it remotely accessible from anywhere with the help of an android application. The paper proposes an arduino-based automatic irrigation IoT system which can increase the productivity of the crop eventually. Thus, a basic implementation of some sensors along with wireless networking would come out as a boon to the farmers. The results obtained are considerable and under tolerable ranges.


© 2020 IUP. All Rights Reserved.

Article Price : Rs.100

Criteria for Choosing the Right Software Development Life Cycle Method for the Success of Software Project
Amaefule Angela Adanna and Ogwueleka Francisca Nonyelum

The paper aims at employing selected criteria for a suitable Software Development Life Cycle (SDLC) method to achieve success in a software project. Various terms like life cycle of software development, Software Development Methodology (SDM), various phases of SDM, models of SDLC, benefits and drawbacks of models were discussed. Based on the review of literature, a comparative analysis was performed on various models of SDLC. Some criteria that determine the choice of a suitable model for software project success were identified. A comparison from different approaches was done using different parameters like analysis of requirement, development team's status, participation of the user, type of project and risk associated based on the various criteria against different models. The results showed that the best suitable method was the spiral model for the success of the development of a software project.


© 2020 IUP. All Rights Reserved.

Article Price : Rs.100