Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors

Bring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorize...

Full description

Saved in:
Bibliographic Details
Main Authors: Ibrahim Mohammed Al-Harthy, Fiza Abdul Rahim, Nor'Ashikin Ali, Amando P., Singun Jr.
Format: Conference Proceeding
Language:English
Published: 2020
Subjects:
Online Access:http://dspace.uniten.edu.my/jspui/handle/123456789/15311
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Bring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorized access to policy changes and information, leaking sensitive information to people, breach of organization data and privacy, access control, misuse, and even stolen devices. Privacy violations are of widely security breaches in business organizations when users are using their own personal devices. In this paper, it presents the appropriate theories and models to derive a set of validated determinants of protection intentions towards the protection behaviors of BYOD. The introduction of BYOD calls for a thorough investigation of whether or not such a practice poses vulnerabilities and threats to organizations.