Internet of Things and Cloud Computing

| Peer-Reviewed |

Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices

Received: 05 September 2014    Accepted: 26 September 2014    Published: 30 October 2014
Views:       Downloads:

Share This Article

Abstract

In this era, commercialization of IT and enterprise mobility has been envisaged where corporate employees utilized mobile devices such as laptops, smartphones and tablets, to work at anytime, anywhere and from any-device for personal and business purposes. In this way corporates improved productivity, employee retention, flexible work environment, IT value-added to business and reduced running costs. Nevertheless, it also culminated into critical risks to company’s systems since employees had uncontrolled access to the infrastructure as such vulnerable to security and data abuse. It was in view of that this work envisaged on the Telecom Namibia Enterprise Mobile Architecture (TNEMA), a system developed to enhance security measures, manage and control the use of bring your own device (BYOD) against the company’s infrastructure. The TNEMA architecture composed of five integrated functional components that included: User Interaction, User Mobile Devices, Access Networks, Enterprise Mobility Infrastructure and Enterprise Backend System. The TNEMA architecture security consists of firewalls installed and configured between the components to filter out the malicious and non-corporate operational data. Also, enhanced in the TNEMA are the layers of encryption, authentication and authorization, boundary protection, possible hardening of devices, and mobile device provisioning and management, all contribute to overall security. In addition, TNEMA adequately protects sensitive data using Internet Protocol Security (IPsec) and Virtual Private Network (VPN) that established a secured path between the mobile devices and the Enterprise Mobility Infrastructure and Public Key Infrastructure (PKI) to provide greater control over issuing, renewing, revoking, and managing Secure Sockets Layer (SSL) certificates while still gaining the advantages of using a trusted Certificate Authority (CA).

DOI 10.11648/j.iotcc.20140204.12
Published in Internet of Things and Cloud Computing (Volume 2, Issue 4, August 2014)
Page(s) 26-31
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Bring Your -Own Device (BYOD), Enterprise Mobility (EM) ,TNEMA, Mobile Device Management (MDM), Integrated Architecture

References
[1] Basole, R.C., (2008). Enterprise mobility: Researching a new paradigm. Information Knowledge Systems Management 7 (1). IOS Press
[2] Basole R. C., (2007). Strategic planning for enterprise mobility: A readiness-centric approach. Keystone, CO, USA, Association for Information Systems.
[3] Ernst and Young. (2013). Bring your own device: Security and risk considerations for your mobile device program. Retrieved on 15 January 2014 from www.ey.com/Publication/vwLUAssets/EY_Bring_your_own_device:_mobile_security_and_risk/$FILE/Bring_your_own_device.pdf
[4] Muneer S., Sharma C. (2008). Enterprise mobile product strategy using scenario planning. Information Knowledge Systems Management 7, 211–224. IOS Press
[5] Price Water house Coopers. 2010. Bring your own device: Agility through consistent delivery. Retrieved on November 2013 from http://www.pwc.com/en_US/us/increasing-it-effectiveness/assets/BYOD-1-2011.pdf
[6] MTC (2013, March 27). MTC Namibia celebrates strong annual results; positions for 2012. Windhoek. Namibia
[7] Tao, J. & Chen, X., 2010. Web Service Based Enterprise Mobile Information System. Nanjing, Jiangsu, China, IEEE Computer Society, pp. 320-323.
[8] Kakihara, M., & Sørensen, C. (2002). Post-Modern Professionals Work and Mobile Technology. In Proceedings of the Paper presented at the New Ways of Working in IS: 25th Information Systems Research Seminar in Scandinavia (IRIS25)
[9] Krishnan, S. (2013). Enterprise mobility putting people first. Retrieved on 3rd December 2013 from www.pwc.in/en_IN/in/.../enterprise-mobility-putting-people-first.pdf‎
[10] World Bank (2011). World Development Indicators (WDI) database. Washington, DC: Author.
[11] Kornak, A., Teutloff, J., Welin-Berger, M. (2004). Enterprise Guide to Gaining Business Value from Mobile Technologies. John Wiley & Sons.
[12] Leedy, P.D., and Ormrod, J.E., (2010). Practical Research: Planning and Design, 10th Edition: New Jersey, USA.
[13] Maree, K., (2007). First Steps in Research, Pretoria, Van Schaik Publishers.
[14] Kietzman, J., Planggera, K., Eaton, B., Heilgenberg, K., Pitt, L., & Berthon, P., (2013). Mobility at work: A typology of mobile communities of practice and contextual ambidexterity. Journal of Strategic Information Systems. 3, 1-2
Author Information
  • IT Factory, Telecom Namibia, Windhoek, Namibia

  • Copperbelt University, Department of Computer Science, Kitwe, Zambia

Cite This Article
  • APA Style

    Valerie Garises, Jameson Mbale. (2014). Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices. Internet of Things and Cloud Computing, 2(4), 26-31. https://doi.org/10.11648/j.iotcc.20140204.12

    Copy | Download

    ACS Style

    Valerie Garises; Jameson Mbale. Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices. Internet Things Cloud Comput. 2014, 2(4), 26-31. doi: 10.11648/j.iotcc.20140204.12

    Copy | Download

    AMA Style

    Valerie Garises, Jameson Mbale. Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices. Internet Things Cloud Comput. 2014;2(4):26-31. doi: 10.11648/j.iotcc.20140204.12

    Copy | Download

  • @article{10.11648/j.iotcc.20140204.12,
      author = {Valerie Garises and Jameson Mbale},
      title = {Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices},
      journal = {Internet of Things and Cloud Computing},
      volume = {2},
      number = {4},
      pages = {26-31},
      doi = {10.11648/j.iotcc.20140204.12},
      url = {https://doi.org/10.11648/j.iotcc.20140204.12},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.iotcc.20140204.12},
      abstract = {In this era, commercialization of IT and enterprise mobility has been envisaged where corporate employees utilized mobile devices such as laptops, smartphones and tablets, to work at anytime, anywhere and from any-device for personal and business purposes. In this way corporates improved productivity, employee retention, flexible work environment, IT value-added to business and reduced running costs. Nevertheless, it also culminated into critical risks to company’s systems since employees had uncontrolled access to the infrastructure as such vulnerable to security and data abuse. It was in view of that this work envisaged on the Telecom Namibia Enterprise Mobile Architecture (TNEMA), a system developed to enhance security measures, manage and control the use of bring your own device (BYOD) against the company’s infrastructure. The TNEMA architecture composed of five integrated functional components that included: User Interaction, User Mobile Devices, Access Networks, Enterprise Mobility Infrastructure and Enterprise Backend System. The TNEMA architecture security consists of firewalls installed and configured between the components to filter out the malicious and non-corporate operational data. Also, enhanced in the TNEMA are the layers of encryption, authentication and authorization, boundary protection, possible hardening of devices, and mobile device provisioning and management, all contribute to overall security.  In addition, TNEMA adequately protects sensitive data using Internet Protocol Security (IPsec) and Virtual Private Network (VPN) that established a secured path between the mobile devices and the Enterprise Mobility Infrastructure and Public Key Infrastructure (PKI) to provide greater control over issuing, renewing, revoking, and managing Secure Sockets Layer (SSL) certificates while still gaining the advantages of using a trusted Certificate Authority (CA).},
     year = {2014}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices
    AU  - Valerie Garises
    AU  - Jameson Mbale
    Y1  - 2014/10/30
    PY  - 2014
    N1  - https://doi.org/10.11648/j.iotcc.20140204.12
    DO  - 10.11648/j.iotcc.20140204.12
    T2  - Internet of Things and Cloud Computing
    JF  - Internet of Things and Cloud Computing
    JO  - Internet of Things and Cloud Computing
    SP  - 26
    EP  - 31
    PB  - Science Publishing Group
    SN  - 2376-7731
    UR  - https://doi.org/10.11648/j.iotcc.20140204.12
    AB  - In this era, commercialization of IT and enterprise mobility has been envisaged where corporate employees utilized mobile devices such as laptops, smartphones and tablets, to work at anytime, anywhere and from any-device for personal and business purposes. In this way corporates improved productivity, employee retention, flexible work environment, IT value-added to business and reduced running costs. Nevertheless, it also culminated into critical risks to company’s systems since employees had uncontrolled access to the infrastructure as such vulnerable to security and data abuse. It was in view of that this work envisaged on the Telecom Namibia Enterprise Mobile Architecture (TNEMA), a system developed to enhance security measures, manage and control the use of bring your own device (BYOD) against the company’s infrastructure. The TNEMA architecture composed of five integrated functional components that included: User Interaction, User Mobile Devices, Access Networks, Enterprise Mobility Infrastructure and Enterprise Backend System. The TNEMA architecture security consists of firewalls installed and configured between the components to filter out the malicious and non-corporate operational data. Also, enhanced in the TNEMA are the layers of encryption, authentication and authorization, boundary protection, possible hardening of devices, and mobile device provisioning and management, all contribute to overall security.  In addition, TNEMA adequately protects sensitive data using Internet Protocol Security (IPsec) and Virtual Private Network (VPN) that established a secured path between the mobile devices and the Enterprise Mobility Infrastructure and Public Key Infrastructure (PKI) to provide greater control over issuing, renewing, revoking, and managing Secure Sockets Layer (SSL) certificates while still gaining the advantages of using a trusted Certificate Authority (CA).
    VL  - 2
    IS  - 4
    ER  - 

    Copy | Download

  • Sections