Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors

Bring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorize...

Full description

Saved in:
Bibliographic Details
Main Authors: Ibrahim Mohammed Al-Harthy, Fiza Abdul Rahim, Nor'Ashikin Ali, Amando P., Singun Jr.
Format: Conference Proceeding
Language:English
Published: 2020
Subjects:
Online Access:http://dspace.uniten.edu.my/jspui/handle/123456789/15311
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-15311
record_format dspace
spelling my.uniten.dspace-153112020-09-07T09:11:52Z Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors Ibrahim Mohammed Al-Harthy Fiza Abdul Rahim Nor'Ashikin Ali Amando P. Singun Jr. BYOD Protection Behaviors Bring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorized access to policy changes and information, leaking sensitive information to people, breach of organization data and privacy, access control, misuse, and even stolen devices. Privacy violations are of widely security breaches in business organizations when users are using their own personal devices. In this paper, it presents the appropriate theories and models to derive a set of validated determinants of protection intentions towards the protection behaviors of BYOD. The introduction of BYOD calls for a thorough investigation of whether or not such a practice poses vulnerabilities and threats to organizations. 2020-09-07T09:11:51Z 2020-09-07T09:11:51Z 2020-03 Conference Proceeding http://dspace.uniten.edu.my/jspui/handle/123456789/15311 en 2019 First International Conference of Intelligent Computing and Engineering (ICOICE)
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
language English
topic BYOD
Protection Behaviors
spellingShingle BYOD
Protection Behaviors
Ibrahim Mohammed Al-Harthy
Fiza Abdul Rahim
Nor'Ashikin Ali
Amando P.
Singun Jr.
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors
description Bring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorized access to policy changes and information, leaking sensitive information to people, breach of organization data and privacy, access control, misuse, and even stolen devices. Privacy violations are of widely security breaches in business organizations when users are using their own personal devices. In this paper, it presents the appropriate theories and models to derive a set of validated determinants of protection intentions towards the protection behaviors of BYOD. The introduction of BYOD calls for a thorough investigation of whether or not such a practice poses vulnerabilities and threats to organizations.
format Conference Proceeding
author Ibrahim Mohammed Al-Harthy
Fiza Abdul Rahim
Nor'Ashikin Ali
Amando P.
Singun Jr.
author_facet Ibrahim Mohammed Al-Harthy
Fiza Abdul Rahim
Nor'Ashikin Ali
Amando P.
Singun Jr.
author_sort Ibrahim Mohammed Al-Harthy
title Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors
title_short Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors
title_full Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors
title_fullStr Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors
title_full_unstemmed Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors
title_sort theoretical bases of identifying determinants of protection intentions towards bring-your-owndevice (byod) protection behaviors
publishDate 2020
url http://dspace.uniten.edu.my/jspui/handle/123456789/15311
_version_ 1680859860802994176
score 13.222552