Background of the Study
Mobile Device Management (MDM) has become a crucial aspect of cybersecurity strategies in educational institutions as mobile devices proliferate in academic environments. At Federal University Wukari, Taraba State, mobile devices such as smartphones, tablets, and laptops are widely used for accessing academic materials, communication, and administrative functions. However, the integration of mobile devices into university networks introduces significant security risks, including unauthorized access to sensitive student and faculty data, malware infections, and data leakage. As a response, MDM solutions have been deployed to manage and secure mobile devices within the institution.
MDM systems are designed to provide centralized management of mobile devices, enabling universities to enforce security policies, track device usage, and remotely wipe data in the event of loss or theft. These systems are essential for ensuring that mobile devices accessing university resources comply with security protocols, safeguarding against unauthorized access and maintaining the integrity of sensitive information. Despite the increasing use of MDM in universities, the effectiveness of such systems in addressing the diverse security concerns of academic institutions, particularly in Nigeria, remains an area of research interest.
Statement of the Problem
Federal University Wukari, like many other universities, has adopted MDM systems to address mobile device security concerns. However, there is limited empirical data on the actual effectiveness of MDM implementations in safeguarding the university's mobile devices. Challenges such as poor user compliance with security protocols, inadequate device tracking, and insufficient reporting mechanisms may limit the overall impact of MDM solutions. Additionally, the existing MDM system at the university has not been comprehensively evaluated to assess its ability to prevent security incidents, manage device lifecycle effectively, and provide real-time monitoring. Therefore, there is a need to conduct a detailed analysis of the effectiveness of the MDM system at Federal University Wukari.
Objectives of the Study
To evaluate the effectiveness of the Mobile Device Management system in securing mobile devices at Federal University Wukari.
To assess the impact of MDM on device compliance with university security policies and protocols.
To identify the challenges faced by university stakeholders in using the MDM system for mobile device security.
Research Questions
How effective is the MDM system at Federal University Wukari in preventing unauthorized access to university data through mobile devices?
What are the factors influencing the compliance of mobile device users with MDM security policies at the university?
What challenges and limitations are encountered in the implementation of the MDM system at Federal University Wukari?
Significance of the Study
This study will provide valuable insights into the practical challenges and successes of implementing MDM solutions in a Nigerian university context. By assessing the effectiveness of MDM at Federal University Wukari, the research will offer recommendations that could help improve the management and security of mobile devices, ensuring a safer digital learning environment. The findings could also inform other universities in Taraba State and beyond about the potential benefits and pitfalls of MDM adoption.
Scope and Limitations of the Study
The study will focus on the analysis of the MDM system at Federal University Wukari in Taraba State. It will be limited to mobile devices used by students, faculty, and staff who access university systems. The research will primarily examine the effectiveness of security measures, compliance, and the management of mobile devices within the university. Limitations include the reliance on survey responses from users, which may introduce biases, and the study’s inability to generalize the findings to universities outside the region.
Definitions of Terms
Mobile Device Management (MDM): A software solution that allows organizations to manage and secure mobile devices used within their network.
Compliance: Adherence to established policies or standards, especially those regarding security practices.
Unauthorized Access: Access to a system or network by a person or device not authorized to do so.
Device Lifecycle Management: The process of managing the stages of a mobile device's use, from deployment to decommissioning.
BACKGROUND OF THE STUDY
Workers plight in the country today has left many well meaning Nigeria with many q...
ABSTRACT
Natural resources worldwide are a gift of nature and an endowment of comfort that makes the existence of mankind complete. As na...
Background of the Study
Economic diversification involves broadening a country’s or institution’s revenue strea...
Background of the Study
Road infrastructure is critical for socio-economic development, facilitating trade, transportati...
Background of the Study
Blockchain technology, primarily known for its application in cryptocurrency, has gained significan...
Background of the study
Digital neologisms are at the forefront of linguistic innovation in contemporary online spaces. In Nigeria, platf...
Background of the Study
Transportation infrastructure plays a crucial role in determining access to healthcare services, particularly in...
Background of the Study
Ethical financial practices are critical for building trust and maintaining the reputation of or...
Pain management in pediatric nursing is essential for ensuring comfort and im...
Background of the Study
The stock market is often regarded as a barometer of a country’s economic health and investor...