Factors Affecting Information Security and the Implementation of Bring Your Own Device (BYOD) Programmes in the Kingdom of Saudi Arabia (KSA)

نویسندگان

چکیده

In recent years, desktop computer use has decreased while smartphone increased. This trend is also prevalent in the Middle East, particularly Kingdom of Saudi Arabia (KSA). Therefore, government prioritised overcoming challenges that users face as smartphones are considered critical infrastructure. The high number information security (InfoSec) breaches and concerns prompted most stakeholders to develop comprehensive policies regulations introduce inclusive InfoSec systems. has, mostly, been motivated by a keenness adopt digital transformations increase productivity spending efficiently. present study used quantitative measures assess user acceptance bring your own device (BYOD) programmes identifies main factors affecting their adoption using unified theory technology (UTAUT) model. Constructs, such perceived business (PT-Bs) private threats (PT-Ps) well employer attractiveness (EA), were added UTAUT model provide public, private, non-profit sectors with an acceptable method adopting BYOD programmes. studied KSA derived from responses 857 participants.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BYOD: Bring Your Own Device

In this work, we examine the different types of user interactions and deployment issues surrounding large public displays. We then select and develop a usage paradigm in which people use personal devices to interact with large public displays. Lastly, we present a physical interface for interacting with large public displays based on camera-enabled mobile phones. Our interface uses both Visual ...

متن کامل

Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security

An emerging trend in corporate network administration is BYOD (Bring Your Own Device). Although with many advantages, the paradigm shift presents new challenges in security to enterprise networks. While existing solutions such as Mobile Device Management (MDM) focus mainly on controlling and protecting device data, they fall short in providing a holistic network protection system. New innovatio...

متن کامل

Bring Your Own Device (byod) Adoption

Bring Your Own Device (BYOD) policies permit employees to use personal devices to access organizational information. Users gain convenience from the ability to work in geographically diverse locations, while organizations gain the benefit of increased productivity and reduced information technology expense. However, these symbiotic benefits come at a cost. Organizations’ security boundaries are...

متن کامل

Bring-Your-Own-Device (BYOD): An Evaluation of Associated Risks to Corporate Information Security

This study evaluates the cyber-risks to Business Information Assets posed by the adoption of Bring-YourOwn-Device (BYOD) to the workplace. BYOD is an emerging trend where employees bring and use personal computing devices on the company’s network to access applications and sensitive data like emails, calendar and scheduling applications, documents, etc. Employees are captivated by BYOD because ...

متن کامل

The Implementation of Bring Your Own Device (BYOD) in Primary [Elementary] Schools

The increasing emphasis on one-to-one technology programs has led to schools exploring options for technology provision (Stavert, 2013). This is because of costs involved in ensuring one-toone access to technology for all children (Cardoza and Tunks, 2014). Of interest in the current educational climate are bring your own device (BYOD) approaches to provision where students bring their own tech...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2022

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app122412707