Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors
Bring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorize...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | http://dspace.uniten.edu.my/jspui/handle/123456789/15311 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-15311 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-153112020-09-07T09:11:52Z Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors Ibrahim Mohammed Al-Harthy Fiza Abdul Rahim Nor'Ashikin Ali Amando P. Singun Jr. BYOD Protection Behaviors Bring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorized access to policy changes and information, leaking sensitive information to people, breach of organization data and privacy, access control, misuse, and even stolen devices. Privacy violations are of widely security breaches in business organizations when users are using their own personal devices. In this paper, it presents the appropriate theories and models to derive a set of validated determinants of protection intentions towards the protection behaviors of BYOD. The introduction of BYOD calls for a thorough investigation of whether or not such a practice poses vulnerabilities and threats to organizations. 2020-09-07T09:11:51Z 2020-09-07T09:11:51Z 2020-03 Conference Proceeding http://dspace.uniten.edu.my/jspui/handle/123456789/15311 en 2019 First International Conference of Intelligent Computing and Engineering (ICOICE) |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
language |
English |
topic |
BYOD Protection Behaviors |
spellingShingle |
BYOD Protection Behaviors Ibrahim Mohammed Al-Harthy Fiza Abdul Rahim Nor'Ashikin Ali Amando P. Singun Jr. Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors |
description |
Bring-Your-Own-Device (BYOD) has been
acknowledged as a very good practice in the workplace. With its
increasing popularity where personal as well as organizational
data are accessed using BYOD, there have been raising concerns
on privacy and security. Most BYOD risks are related to
unauthorized access to policy changes and information, leaking
sensitive information to people, breach of organization data and
privacy, access control, misuse, and even stolen devices. Privacy
violations are of widely security breaches in business
organizations when users are using their own personal devices.
In this paper, it presents the appropriate theories and models to
derive a set of validated determinants of protection intentions
towards the protection behaviors of BYOD. The introduction of
BYOD calls for a thorough investigation of whether or not such
a practice poses vulnerabilities and threats to organizations. |
format |
Conference Proceeding |
author |
Ibrahim Mohammed Al-Harthy Fiza Abdul Rahim Nor'Ashikin Ali Amando P. Singun Jr. |
author_facet |
Ibrahim Mohammed Al-Harthy Fiza Abdul Rahim Nor'Ashikin Ali Amando P. Singun Jr. |
author_sort |
Ibrahim Mohammed Al-Harthy |
title |
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors |
title_short |
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors |
title_full |
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors |
title_fullStr |
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors |
title_full_unstemmed |
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors |
title_sort |
theoretical bases of identifying determinants of protection intentions towards bring-your-owndevice (byod) protection behaviors |
publishDate |
2020 |
url |
http://dspace.uniten.edu.my/jspui/handle/123456789/15311 |
_version_ |
1680859860802994176 |
score |
13.222552 |