Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors

Access control; Computation theory; Data privacy; Bring your own devices; Business organizations; Personal devices; Privacy and security; Privacy violation; Security breaches; Sensitive informations; Unauthorized access; Intelligent computing

Saved in:
Bibliographic Details
Main Authors: Al-Harthy I.M., Rahim F.A., Ali N., Singun A.P.
Other Authors: 57216312549
Format: Conference Paper
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-24259
record_format dspace
spelling my.uniten.dspace-242592023-05-29T15:22:28Z Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors Al-Harthy I.M. Rahim F.A. Ali N. Singun A.P. 57216312549 57350579500 54985243500 57189341111 Access control; Computation theory; Data privacy; Bring your own devices; Business organizations; Personal devices; Privacy and security; Privacy violation; Security breaches; Sensitive informations; Unauthorized access; Intelligent computing Bring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorized access to policy changes and information, leaking sensitive information to people, breach of organization data and privacy, access control, misuse, and even stolen devices. Privacy violations are of widely security breaches in business organizations when users are using their own personal devices. In this paper, it presents the appropriate theories and models to derive a set of validated determinants of protection intentions towards the protection behaviors of BYOD. The introduction of BYOD calls for a thorough investigation of whether or not such a practice poses vulnerabilities and threats to organizations. � 2019 IEEE. Final 2023-05-29T07:22:28Z 2023-05-29T07:22:28Z 2019 Conference Paper 10.1109/ICOICE48418.2019.9035139 2-s2.0-85083080509 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083080509&doi=10.1109%2fICOICE48418.2019.9035139&partnerID=40&md5=29a623f22b15616729fc5037f2068afb https://irepository.uniten.edu.my/handle/123456789/24259 9035139 Institute of Electrical and Electronics Engineers Inc. Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Access control; Computation theory; Data privacy; Bring your own devices; Business organizations; Personal devices; Privacy and security; Privacy violation; Security breaches; Sensitive informations; Unauthorized access; Intelligent computing
author2 57216312549
author_facet 57216312549
Al-Harthy I.M.
Rahim F.A.
Ali N.
Singun A.P.
format Conference Paper
author Al-Harthy I.M.
Rahim F.A.
Ali N.
Singun A.P.
spellingShingle Al-Harthy I.M.
Rahim F.A.
Ali N.
Singun A.P.
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors
author_sort Al-Harthy I.M.
title Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors
title_short Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors
title_full Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors
title_fullStr Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors
title_full_unstemmed Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors
title_sort theoretical bases of identifying determinants of protection intentions towards bring-your-own-device (byod) protection behaviors
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2023
_version_ 1806423323354071040
score 13.18916