Papers by Njeri Michelle
Ethical AI guidelines, 2024
This paper explored the need for ethical guidelines to guide the proper use of Microsoft Copilot.... more This paper explored the need for ethical guidelines to guide the proper use of Microsoft Copilot. Particularly, this tool operates as generative AI, which allows users of Microsoft Copilot AI 1 applications such as Microsoft 365 to input prompts and get immediate responses for their queries. However, lack of proper ethical guidelines introduces usage concerns like using published materials without proper referencing when providing user responses. To solve this issue, this study used content analysis to explore literature. This method was preferred because identifies re-occurring themes, which helps to find valuable insights. Importantly, this study determined that ethical guidelines for Microsoft Copilot improve the quality of user responses. Hence, Microsoft 365users become more aware of the implications of misusing generative AI, which allows them to focus on its value. This tool enhances user experiences by streamlining workflows and enhancing their productivity. Consequently, user perceptions regarding the use of Microsoft Copilot change by realizing the value of this tool.
Best Practices For Bring Your Own Devices Implementation (BYOD)., 2023
The widespread adoption of Bring Your Own Device (BYOD) policies in modern workplaces, while offe... more The widespread adoption of Bring Your Own Device (BYOD) policies in modern workplaces, while offering convenience and flexibility, has ushered in significant security challenges and risks. This project delves into the intricacies of BYOD, focusing on identifying and mitigating security risks while implementing effective BYOD policies. By exploring the evolution, benefits, and challenges of BYOD, the study provides a detailed roadmap for secure and productive BYOD environments, emphasizing the importance of comprehensive policy development and robust security measures. Key findings reveal that BYOD enhances productivity and cost-efficiency but poses serious threats like data breaches and network vulnerabilities. The study highlights best practices including establishing clear BYOD policies, employee training, compliance monitoring, robust device management, data encryption, network security, and the use of Mobile Device Management (MDM) solutions. Effective VPN usage, regular software updates, and application security measures like whitelisting and containerization are also recommended. In conclusion, the project underscores the need for a comprehensive strategy that integrates security, policy, and employee engagement, providing a robust framework for organizations to leverage BYOD benefits while safeguarding their digital assets and maintaining regulatory compliance.
Book Reviews by Njeri Michelle
Mitigating Security Risks in Bring Your Own Device (BYOD) Environments, 2024
Bring your own device (BYOD) is increasingly popular as employees use smartphones, tablets, and l... more Bring your own device (BYOD) is increasingly popular as employees use smartphones, tablets, and laptops to work, blending personal lifestyle and lifestyle (Njeri, 2023). This trend is common in today's workplaces and provides convenience and ease of comparison. Employees can work from anywhere using familiar devices as a replacement for the traditional workplace. BYOD demonstrates its growing impact on today's workplaces by providing easy access to customers, increasing productivity and employee satisfaction.
Uploads
Papers by Njeri Michelle
Book Reviews by Njeri Michelle