• Title/Summary/Keyword: Bring Your Own Device

Search Result 30, Processing Time 0.025 seconds

Effects of Bring Your Own Device (BYOD) Attributes on Work-to-life Conflict

  • Cong Qi
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.831-862
    • /
    • 2023
  • The rapid adoption of smartphones and tablets among employees has recently forced organizations to proactively embrace bring your own device (BYOD). The situation of COVID-19 makes the concept of BYOD even paramount. Allowing employees to bring their own mobile devices to the workplace has helped companies realize productivity gains and cost benefits. However, BYOD has also blurred the boundaries between work and personal life, thereby creating a stressful environment for employees (Doargajudbur and Hosanoo, 2023). This study explores the relationships between several BYOD attributes and investigates the effects of these attributes on work-to-life conflict. It contributes by introducing workplace connectivity after hours as a new dimension of BYOD attribute to influence work-to-life conflict. Based on boundary theory, a theoretical model is developed and tested with an online survey. The results reveal that flexibility and workplace connectivity after hours positively influence productivity, and flexibility helps to relieve instead of increase work overload. Meanwhile, a higher level of flexibility and productivity can help reduce work-to-life conflict, and a higher level of work overload induces a higher level of work-to-life conflict.

Adoption of the Bring Your Own Device (BYOD) Approach in the Health Sector in Saudi Arabia

  • Almarhabi, Khalid A.;Alghamdi, Ahmed M.;Bahaddad, Adel A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.371-382
    • /
    • 2022
  • The trend of Bring Your Own Device (BYOD) is gaining popularity all over the world with its innumerable benefits such as financial gain, greater employee satisfaction, better job efficiency, boosted morale, and improved flexibility. However, this unstoppable and inevitable trend also brings its own challenges and risks while managing and controlling corporate data and networks. BYOD is vulnerable to attacks by viruses, malware, or spyware that can reach sensitive data and disclose information, modify access policies, disrupt services, create financial issues, minimise productivity, and entail some legal implications. The key focus of this research is how Saudi Arabia has approached BYOD with the help of their 5-step solution model and quantitative research methodology. The result of this study is a statement about what users know about this trend, their opinions about it, and suggestion to increase the employee awareness.

The Status of the Bring Your Own Device (BYOD) in Saudi Arabia: Dataset

  • Khalid A. Almarhabi;Adel A. Bahaddad;Ahmed M. Alghamdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.203-209
    • /
    • 2023
  • The paper brings across data that is utilized in the Bring Your Own Device (BYOD) status collected between February and April of 2021 across Saudi Arabia. The data set was collected using questionnaires established through online mechanisms for the respondents. In the questionnaire, personal details included five questions while seven questions addressed the working model of personal mobile devices. Six questions addressed the awareness of employees bring your own device awareness for employees comprised seven questions and two questions addressed the benefits of business achievements. In the identification of suitable respondents for the research, two approaches were applied. The research demanded that the respondents be Saudi Arabian nationals and have attained 18 years. Snowball and purposive techniques were applied in the collection of information from a wide area of Saudi Arabia while employing social media approaches that include the use of WhatsApp and emails in the collection of data. The approach ensured the collection of data from 857 respondents used in the identification of the status as well as issues across the BYOD environment and accompanying solutions. The data was also used in the provision of awareness in the community through short-term courses, cyber security training and awareness programs. The results of the research are therefore applicable to the context of the Saudi Arabian country that is currently facing issues in dealing with the application of personal devices in the work environment.

Access Control Model using RBAC in BYOD(Bring Your Own Device) (RBAC(Role Based Access Control)을 이용한 BYOD(Bring Your Own Device) 접근제어 관한 연구)

  • Bae, Yo-Han;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.379-382
    • /
    • 2014
  • BYOD 는 다양한 기기에서 상호 운용되고, 상황에 따라 다른 접근권한을 가질 수 있다. BYOD 는 기업의 입장에서는 생산성 향상과 기기에 대한 비용 감소 등의 장점을 가지고 있다. 하지만 보안의 중대한 취약점을 가지고 있고 기업은 개인이 사용하는 각기 다른 기기들에 대해서 통제하기 힘들다는 점과 관리비용은 오히려 상승할 수도 있다는 점 등의 단점들이 부각이 되고 있다. BYOD 에 접근 가능한 권한들을 효율적으로 관리하여 접근권한 관련 설정 오류를 최소화하고, 권한이 없는 사용자의 접근을 차단하기 위한 'BYOD 환경에 적합한 접근 제어 기술'이 요구된다. 따라서 본 논문에서는 BYOD 시장의 급속한 발달과, 스마트 폰 하드웨어,소프트웨어의 발전에 맞춰 RBAC(Role Based Access Control)을 이용한 접근제어 방법을 제안한다. 이는 사용자 특성, 역할 특성, 시스템 특성에 따라 권한 활성화 제약이 가능하며, 권한 위임과 권한 상속 시에 시간, 위치정보, 위기 상황 발생여부에 따라 제약을 할 수 있다.

Research on BYOD (Bring Your Own Device) policy guidelines with the extension of the "SMART Education" in Korea based on the analyses of the U.S. cases (스마트교육 확산에 따른 국내 BYOD 정책방안 연구 - 미국사례 분석을 중심으로 -)

  • Lim, Keol;Jang, Yoonho;Lee, Eunhwan
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.21-36
    • /
    • 2014
  • The purposes of the study was to investigate BYOD (Bring Your Own Device) policy since it would be limited to distribute all of the digital devices required for the schools within the budget of the government. First, the concept and characteristics of BYOD were introduced. Then, the pros and cons of BYOD were analyzed according to the case studies of BYOD policies of the U.S. Based on the previous experiences, guidelines of domestic BYOD policies were established. Regarding the institutional aspect, technical issues, usage, damages, digital divide, information security, and resources were discussed. Additionally, conditions of technology, networks, filtering, software were also considered as essential infrastructure. In sum, as an alternative of distributing digital devices in schools, the importance of BYOD should be regarded as top priorities with systematic preparations in launching digital education. It would be expected that this study play a fundamental role in launching domestic BYOD policy by supporting specific strategies.

A Study of Improved Session Management for Mobile Web under BYOD environment (BYOD 환경을 고려한 모바일 웹을 위한 세션 관리 개선 방안 연구)

  • Kim, Young-hun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1117-1124
    • /
    • 2015
  • This paper explains a web session management system for mobile web environment with BYOD(Bring Your Own Device). This system operates by enhanced secure session token. This system consists of an unique identifier, time stamp, and encryption algorithm. The Unique identifier in this system classifies each mobile device for web security based on mobile environment with BYOD. And the Time stamp in this system that determine session effectiveness for web security. Also the Cipher algorithm in this system that protects session token information for web security. This paper analysis a security of session management system running on mobile web environment using the simulation techniques. The proposed method is more suitable than the other methods under enviroment mobile web environment with BYOD.

Light-weight System Design & Implementation for Wireless Intrusion Detection System (무선랜 침입탐지를 위한 경량 시스템 설계 및 구현)

  • Kim, Han-Kil;Kim, Su-Jin;Lee, Hwan-Kyu;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.602-608
    • /
    • 2014
  • Smartphones have become commonplace to use smart, BYOD (Bring Your Own Device) spread the trend of domestic WLAN use is intensifying as a result, the security threat will be greatly increased. Even though WLAN vendors such as Cisco Systems Inc,. Aruba networks released WIPS, MDM, DLP etc, however, these solutions can not be easily introduced for small business due to high cost or administrative reasons. In this paper, without the introduction of expensive H/W equipment, in WLAN environments, packet analysis, AP, Station management, security vulnerabilities can be analyzed by the proposed intrusion detection system.

A Study on Quality Evaluation Model of Mobile Device Management for BYOD (BYOD 환경의 MDM 보안솔루션의 품질평가모델에 관한 연구)

  • Rha, HyeonDae;Kang, SuKyoung;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • A mobile office environment using mobile devices, such as tablet PC, mobile phone is gradually increased in enterprises, banking and public institutions etc which is no limitation on places. It occurs advanced and persist security threats that are required effective security management policy and technical solution to be secure. For BYOD (Bring Your Own Device) environment, technical security management solutions of network control based, MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Contents Management) were released, evolved and mixed used. In perspective of integrated security management solution, mobile security product should be selected to consider user experience and environment and correct quality evaluation model of product is needed which is provided standards and guidance on the selection criteria when it was introduced. In this paper, the most widely used MDM solution is selected to take a look at its features and it was reviewed the product attributes with related international standard ISO/IEC25010 software quality attributes. And then it was derived evaluation elements and calculated the related metrics based on the quality analysis model. For the verification of quality evaluation model, security checks list and testing procedures were established; it applied metrics and analyzed the testing result through scenario based case study.

  • PDF

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.

A Research for Digital Literacy Education Methodlogies based on Mobile Devices (모바일 기기 기반의 디지털 리터러시 교육 방안에 대한 연구)

  • Hong, Myunghui;Lee, Soonyoung
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.1
    • /
    • pp.107-115
    • /
    • 2020
  • The computing environment is rapidly changing to mobile device base, with the development of computer technology. Until now, digital literacy education has been based on desktop PC education, but it is time to change it into literacy education suitable for mobile environment. In this paper, we propose a mobile-based digital literacy MoDL (Mobile Device Digital Literacy). MoDL proposes three phases. One is Mobile Based Digital Environment (MoDE), which builds a mobile digital environment, seconds is Bring Your Own Devices (BYOD) class method when using it for education. Finally, MoDLI (MoDL Instruction) for learning mobile literacy is presented step by step. To verify the validity of the proposed, eight experts were surveyed so that the Content Validity Ratio was calculated. As a result, CVR was ensured in all items except for the applicability of MoDLI.