1 Department of Cybersecurity, Faculty of Computing, Delta State University, Abraka.
2 Department of Cybersecurity, School of Physics, Engineering and Computer Science, University of Hertfordshire, College Lane Campus, UK.
International Journal of Science and Research Archive, 2025, 16(02), 965-970
Article DOI: 10.30574/ijsra.2025.16.2.2392
Received on 07 July 2025; revised on 15 August; accepted on 18 August 2025
Mobile devices are now central to personal and corporate digital ecosystems, yet traditional security strategies often fail to address their unique vulnerabilities. This study introduces the Adaptive Mobile Vulnerability Management Framework (AMVMF), a sector-tested model that integrates Mobile Device Management (MDM), real-time threat intelligence, and context-aware risk scoring into a continuous defense cycle. Using a mixed-methods approach, including a systematic literature review, multi-sector case studies (healthcare, finance, education), and expert validation via the Delphi method, we identified and mitigated both technical and human-centric risks. Results demonstrate notable improvements, including reduced vulnerability remediation times, increased patch adoption rates, and fewer security incidents such as mobile phishing. The AMVMF’s layered approach bridges the gap between policy and execution, providing a scalable solution for securing mobile endpoints in both BYOD and corporate settings. By uniting automation, proactive monitoring, and context-driven prioritisation, this framework advances mobile cybersecurity resilience while maintaining operational flexibility.
Mobile security; Vulnerability management; Mobile Device Management (MDM); BYOD security; Adaptive cybersecurity; Threat mitigation; Endpoint protection
Preview Article PDF
Chika Lilian Onyagu and Izunna Lucky Chibuike. Fortifying the Mobile Frontier: An Adaptive Framework for Proactive Vulnerability Management in the Era of BYOD. International Journal of Science and Research Archive, 2025, 16(02), 965-970. Article DOI: https://doi.org/10.30574/ijsra.2025.16.2.2392.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0







