Publication:
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors

dc.citedby1
dc.contributor.authorAl-Harthy I.M.en_US
dc.contributor.authorRahim F.A.en_US
dc.contributor.authorAli N.en_US
dc.contributor.authorSingun A.P.en_US
dc.contributor.authorid57216312549en_US
dc.contributor.authorid57350579500en_US
dc.contributor.authorid54985243500en_US
dc.contributor.authorid57189341111en_US
dc.date.accessioned2023-05-29T07:22:28Z
dc.date.available2023-05-29T07:22:28Z
dc.date.issued2019
dc.descriptionAccess control; Computation theory; Data privacy; Bring your own devices; Business organizations; Personal devices; Privacy and security; Privacy violation; Security breaches; Sensitive informations; Unauthorized access; Intelligent computingen_US
dc.description.abstractBring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorized access to policy changes and information, leaking sensitive information to people, breach of organization data and privacy, access control, misuse, and even stolen devices. Privacy violations are of widely security breaches in business organizations when users are using their own personal devices. In this paper, it presents the appropriate theories and models to derive a set of validated determinants of protection intentions towards the protection behaviors of BYOD. The introduction of BYOD calls for a thorough investigation of whether or not such a practice poses vulnerabilities and threats to organizations. � 2019 IEEE.en_US
dc.description.natureFinalen_US
dc.identifier.ArtNo9035139
dc.identifier.doi10.1109/ICOICE48418.2019.9035139
dc.identifier.scopus2-s2.0-85083080509
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85083080509&doi=10.1109%2fICOICE48418.2019.9035139&partnerID=40&md5=29a623f22b15616729fc5037f2068afb
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/24259
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceScopus
dc.sourcetitle2019 1st International Conference of Intelligent Computing and Engineering: Toward Intelligent Solutions for Developing and Empowering our Societies, ICOICE 2019
dc.titleTheoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviorsen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
Files
Collections