Factors Affecting Information Security and the Implementation of Bring Your Own Device (BYOD) Programmes in the Kingdom of Saudi Arabia (KSA)
نویسندگان
چکیده
In recent years, desktop computer use has decreased while smartphone increased. This trend is also prevalent in the Middle East, particularly Kingdom of Saudi Arabia (KSA). Therefore, government prioritised overcoming challenges that users face as smartphones are considered critical infrastructure. The high number information security (InfoSec) breaches and concerns prompted most stakeholders to develop comprehensive policies regulations introduce inclusive InfoSec systems. has, mostly, been motivated by a keenness adopt digital transformations increase productivity spending efficiently. present study used quantitative measures assess user acceptance bring your own device (BYOD) programmes identifies main factors affecting their adoption using unified theory technology (UTAUT) model. Constructs, such perceived business (PT-Bs) private threats (PT-Ps) well employer attractiveness (EA), were added UTAUT model provide public, private, non-profit sectors with an acceptable method adopting BYOD programmes. studied KSA derived from responses 857 participants.
منابع مشابه
BYOD: Bring Your Own Device
In this work, we examine the different types of user interactions and deployment issues surrounding large public displays. We then select and develop a usage paradigm in which people use personal devices to interact with large public displays. Lastly, we present a physical interface for interacting with large public displays based on camera-enabled mobile phones. Our interface uses both Visual ...
متن کاملTowards SDN-Defined Programmable BYOD (Bring Your Own Device) Security
An emerging trend in corporate network administration is BYOD (Bring Your Own Device). Although with many advantages, the paradigm shift presents new challenges in security to enterprise networks. While existing solutions such as Mobile Device Management (MDM) focus mainly on controlling and protecting device data, they fall short in providing a holistic network protection system. New innovatio...
متن کاملBring Your Own Device (byod) Adoption
Bring Your Own Device (BYOD) policies permit employees to use personal devices to access organizational information. Users gain convenience from the ability to work in geographically diverse locations, while organizations gain the benefit of increased productivity and reduced information technology expense. However, these symbiotic benefits come at a cost. Organizations’ security boundaries are...
متن کاملBring-Your-Own-Device (BYOD): An Evaluation of Associated Risks to Corporate Information Security
This study evaluates the cyber-risks to Business Information Assets posed by the adoption of Bring-YourOwn-Device (BYOD) to the workplace. BYOD is an emerging trend where employees bring and use personal computing devices on the company’s network to access applications and sensitive data like emails, calendar and scheduling applications, documents, etc. Employees are captivated by BYOD because ...
متن کاملThe Implementation of Bring Your Own Device (BYOD) in Primary [Elementary] Schools
The increasing emphasis on one-to-one technology programs has led to schools exploring options for technology provision (Stavert, 2013). This is because of costs involved in ensuring one-toone access to technology for all children (Cardoza and Tunks, 2014). Of interest in the current educational climate are bring your own device (BYOD) approaches to provision where students bring their own tech...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2022
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app122412707