DOI QR코드

DOI QR Code

Adoption of the Bring Your Own Device (BYOD) Approach in the Health Sector in Saudi Arabia

  • Almarhabi, Khalid A. (Department of Computer Science, College of Computing in Al-Qunfudah, Umm Al-Qura University) ;
  • Alghamdi, Ahmed M. (Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah) ;
  • Bahaddad, Adel A. (Department of Information System, Faculty of Computing and Information Technology, King Abdulaziz University)
  • Received : 2022.07.05
  • Published : 2022.07.30

Abstract

The trend of Bring Your Own Device (BYOD) is gaining popularity all over the world with its innumerable benefits such as financial gain, greater employee satisfaction, better job efficiency, boosted morale, and improved flexibility. However, this unstoppable and inevitable trend also brings its own challenges and risks while managing and controlling corporate data and networks. BYOD is vulnerable to attacks by viruses, malware, or spyware that can reach sensitive data and disclose information, modify access policies, disrupt services, create financial issues, minimise productivity, and entail some legal implications. The key focus of this research is how Saudi Arabia has approached BYOD with the help of their 5-step solution model and quantitative research methodology. The result of this study is a statement about what users know about this trend, their opinions about it, and suggestion to increase the employee awareness.

Keywords

Acknowledgement

This research work was funded by the Makkah Digital Gate Initiative under Grant No. (MDP-IRI-13-2020). Therefore, authors gratefully acknowledge technical and financial support from the Emirate Of Makkah Province and King Abdulaziz University, Jeddah, Saudi Arabia.

References

  1. C. Matt, T. Hess, and A. Benlian, "Digital transformation strategies," Business & Information Systems Engineering, vol. 57, no. 5, pp. 339-343, 2015. https://doi.org/10.1007/s12599-015-0401-5
  2. D. Goerzig and T. Bauernhansl, "Enterprise architectures for the digital transformation in small and medium-sized enterprises," Procedia Cirp, vol. 67, pp. 540-545, 2018. https://doi.org/10.1016/j.procir.2017.12.257
  3. I. Mergel, N. Edelmann, and N. Haug, "Defining digital transformation: Results from expert interviews," Government Information Quarterly, vol. 36, no. 4, p. 101385, 2019. https://doi.org/10.1016/j.giq.2019.06.002
  4. S. Bartsch, E. Weber, M. Buttgen, and A. Huber, "Leadership matters in crisis-induced digital transformation: how to lead service employees effectively during the COVID-19 pandemic," Journal of Service Management, 2020.
  5. Y. N. Azizaha et al., "Transformational or Transactional Leadership Style: Which Affects Work Satisfaction and Performance of Islamic University Lecturers During COVID-19 Pandemic," Systematic Reviews in Pharmacy, vol. 11, no. 7, pp. 577-588, 2020.
  6. S. C. o. Economic and D. Affairs, "Saudi vision 2030," 2016.
  7. A. S. Alharbi, G. Halikias, A. M. Basahel, and M. Yamin, "Digital Governments of Developed Nations and Saudi Arabia: A Comparative Study," in 2020 7th International Conference on Computing for Sustainable Global Development (INDIACom), 2020, pp. 255-260: IEEE.
  8. B. Carin, "G20 safeguards digital economy vulnerabilities with a financial sector focus," Economics: The Open-Access, Open-Assessment E-Journal, vol. 11, no. 2017-19, pp. 1-11, 2017. https://doi.org/10.5018/economics-ejournal.ja.2017-19
  9. K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "Survey on access control and management issues in cloud and BYOD environment," International Journal of Computer Science and Mobile Computing, vol. 6, no. 12, pp. 44-54, 2017.
  10. A. B. Garba, J. Armarego, D. Murray, and W. Kenworthy, "Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments," Journal of Information privacy and security, vol. 11, no. 1, pp. 38-54, 2015. https://doi.org/10.1080/15536548.2015.1010985
  11. K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "A Proposed Framework for Access Control in the Cloud and BYOD Environment," IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 18, no. 2, pp. 144-152, 2018.
  12. M. Finneran, "Mobile security gaps abound," Information Week, no. 1333, 2012.
  13. A. Ghosh, P. K. Gajar, and S. Rai, "Bring your own device (BYOD): Security risks and mitigating strategies," Journal of Global Research in Computer Science, vol. 4, no. 4, pp. 62-70, 2013.
  14. N. Zahadat, P. Blessner, T. Blackburn, and B. A. Olson, "BYOD security engineering: A framework and its analysis," Computers & Security, vol. 55, pp. 81-99, 2015. https://doi.org/10.1016/j.cose.2015.06.011
  15. M. P. Morolong, F. B. Shava, and A. M. Gamundani, "Bring Your Own Device (BYOD) Information Security Risks: Case of Lesotho," in International Conference on Cyber Warfare and Security, 2020, pp. 346-XVI: Academic Conferences International Limited.
  16. K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "An Evaluation of the Proposed Framework for Access Control in the Cloud and BYOD Environment," INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, vol. 9, no. 10, pp. 213-221, 2018.
  17. K. W. Miller, J. Voas, and G. F. Hurlburt, "BYOD: Security and privacy considerations," It Professional, vol. 14, no. 5, pp. 53-55, 2012. https://doi.org/10.1109/MITP.2012.93
  18. H. Chen, Y. Li, L. Chen, and J. Yin, "Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue," Journal of Enterprise Information Management, 2020.
  19. K. E. Welsh, A. L. Mauchline, D. France, V. Powell, W. B. Whalley, and J. Park, "Would Bring Your Own Device (BYOD) be welcomed by undergraduate students to support their learning during fieldwork?," Journal of Geography in Higher Education, vol. 42, no. 3, pp. 356-371, 2018. https://doi.org/10.1080/03098265.2018.1437396
  20. A. V. Herrera, M. Ron, and C. Rabadao, "National cyber-security policies oriented to BYOD (bring your own device): Systematic review," in 2017 12th Iberian Conference on Information Systems and Technologies (CISTI), 2017, pp. 1-4: IEEE.
  21. F. Portela, A. M. da Veiga, and M. F. Santos, "Benefits of bring your own device in healthcare," in Next-Generation Mobile and Pervasive Healthcare Solutions: IGI Global, 2018, pp. 32-45.
  22. C. Z. Tu, J. Adkins, and G. Y. Zhao, "Complying with BYOD security policies: A moderation model based on protection motivation theory," Journal of the Midwest Association for Information Systems (JMWAIS), vol. 1, pp. 11-28, 2019.
  23. M. Shabazi, M. Amini Rarani, S. Tahmasebian, and M. Jahanbakhsh, "BYOD and its Application in the Healthcare Environment," Applied Health Information Technology, vol. 1, no. 1, pp. 60-64, 2020.
  24. M. H. U. Sharif, R. Datta, S. N. Sankarasetty, H. Garikapati, M. Valavala, and S. Maraboyina, "BRING YOUR OWN DEVICE (BYOD) PROGRAM," International Journal of Engineering Applied Sciences and Technology, vol. 4, no. 4, pp. 2455-2143, 2019.
  25. B. Alotaibi and H. Almagwashi, "A Review of BYOD security challenges, solutions and policy best practices," in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018, pp. 1-6: IEEE.
  26. R. Palanisamy, A. A. Norman, and M. L. Mat Kiah, "BYOD policy compliance: Risks and strategies in organizations," Journal of Computer Information Systems, pp. 1-12, 2020.
  27. M. M. Singh, C. W. Chan, and Z. Zulkefli, "Security and privacy risks awareness for bring your own device (BYOD) paradigm," International Journal of Advanced Computer Science and Applications, vol. 8, no. 2, pp. 53-62, 2017.
  28. B. Morrow, "BYOD security challenges: control and protect your most sensitive data," Network Security, vol. 2012, no. 12, pp. 5-8, 2012. https://doi.org/10.1016/S1353-4858(12)70111-3
  29. M. Dhingra, "Legal issues in secure implementation of bring your own device (BYOD)," Procedia Computer Science, vol. 78, pp. 179-184, 2016. https://doi.org/10.1016/j.procs.2016.02.030
  30. O. Ehikioya, A. P. Binitie, and A. Joe-Obasi, "SECURITY RISKS ASSOCIATED WITH BRING YOUR OWN DEVICE BYOD AND POSSIBLE MITIGATION TECHNIQUES," SOUTH EASTERN JOURNAL OF RESEARCH AND SUSTAINABLE DEVELOPMENT (SEJRSD), vol. 2, no. 1, pp. 148-165, 2019.
  31. K. Downer and M. Bhattacharya, "BYOD security: A new business challenge," in 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), 2015, pp. 1128-1133: IEEE.
  32. B. Lebek, K. Degirmenci, and M. Breitner, "Investigating the influence of security, privacy, and legal concerns on employees' intention to use BYOD mobile devices," in Proceedings of the nineteenth Americas conference on information systems, 2013, pp. 1-8: Association for Information Systems (AIS).
  33. A. Gustav and S. Kabanda, "BYOD adoption concerns in the South African financial institution sector," in CONF-IRM, 2016, p. 59.
  34. J. E. Moyer, "Managing mobile devices in hospitals: A literature review of BYOD policies and usage," Journal of Hospital Librarianship, vol. 13, no. 3, pp. 197-208, 2013. https://doi.org/10.1080/15323269.2013.798768
  35. K. AlHarthy and W. Shawkat, "Implement network security control solutions in BYOD environment," in 2013 IEEE International Conference on Control System, Computing and Engineering, 2013, pp. 7-11: IEEE.
  36. A. Scarfo, "New security perspectives around BYOD," in 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, 2012, pp. 446-451: IEEE.
  37. T. Alhussain, R. AlGhamdi, S. Alkhalaf, and O. Alfarraj, "Users" Perceptions of Mobile Phone Security: A Survey Study in the Kingdom of Saudi Arabia," international journal of computer theory and engineering, vol. 5, no. 5, p. 793, 2013.
  38. M. F. Mohammed, "Privacy and Social Networking: WhatsApp Users' Perception in Saudi Arabia Researchers: Ms. Nemah Alsayed Ms. Haifaa Alakel," 2016.
  39. P. Saa, O. Moscoso-Zea, and S. Lujan-Mora, "Bring your own device (BYOD): Students perception-Privacy issues: A new trend in education?," in 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), 2017, pp. 1-5: IEEE.
  40. F. Mohammed, F. Olayah, A. Ali, and N. A. Gazem, "The effect of cloud computing adoption on the sustainability of e-government services: A review," International Journal of Advanced Science and Technology, vol. 29, no. 5, pp. 2636-2642, 2020.
  41. https://www.imf.org/ar/News/Articles/2020/11/06/blog-bridging-digital-divide-to-scale-up-covid19-recovery
  42. https://www.itu.int/en/ITU-D/Regional-Presence/ArabStates/Documents/events/2020/RDF/Presentations/Session1/KSA.pdf
  43. Michelberger, Pal, and Pal Feher-Polgar. "BYOD SECURITY STRATEGY (ASPECTS OF A MANAGERIAL DECISION)." Journal of Security & Sustainability Issues 9.4 (2020).