Acknowledgement
This research work was funded by the Makkah Digital Gate Initiative under Grant No. (MDP-IRI-13-2020). Therefore, authors gratefully acknowledge technical and financial support from the Emirate Of Makkah Province and King Abdulaziz University, Jeddah, Saudi Arabia.
References
- C. Matt, T. Hess, and A. Benlian, "Digital transformation strategies," Business & Information Systems Engineering, vol. 57, no. 5, pp. 339-343, 2015. https://doi.org/10.1007/s12599-015-0401-5
- D. Goerzig and T. Bauernhansl, "Enterprise architectures for the digital transformation in small and medium-sized enterprises," Procedia Cirp, vol. 67, pp. 540-545, 2018. https://doi.org/10.1016/j.procir.2017.12.257
- I. Mergel, N. Edelmann, and N. Haug, "Defining digital transformation: Results from expert interviews," Government Information Quarterly, vol. 36, no. 4, p. 101385, 2019. https://doi.org/10.1016/j.giq.2019.06.002
- S. Bartsch, E. Weber, M. Buttgen, and A. Huber, "Leadership matters in crisis-induced digital transformation: how to lead service employees effectively during the COVID-19 pandemic," Journal of Service Management, 2020.
- Y. N. Azizaha et al., "Transformational or Transactional Leadership Style: Which Affects Work Satisfaction and Performance of Islamic University Lecturers During COVID-19 Pandemic," Systematic Reviews in Pharmacy, vol. 11, no. 7, pp. 577-588, 2020.
- S. C. o. Economic and D. Affairs, "Saudi vision 2030," 2016.
- A. S. Alharbi, G. Halikias, A. M. Basahel, and M. Yamin, "Digital Governments of Developed Nations and Saudi Arabia: A Comparative Study," in 2020 7th International Conference on Computing for Sustainable Global Development (INDIACom), 2020, pp. 255-260: IEEE.
- B. Carin, "G20 safeguards digital economy vulnerabilities with a financial sector focus," Economics: The Open-Access, Open-Assessment E-Journal, vol. 11, no. 2017-19, pp. 1-11, 2017. https://doi.org/10.5018/economics-ejournal.ja.2017-19
- K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "Survey on access control and management issues in cloud and BYOD environment," International Journal of Computer Science and Mobile Computing, vol. 6, no. 12, pp. 44-54, 2017.
- A. B. Garba, J. Armarego, D. Murray, and W. Kenworthy, "Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments," Journal of Information privacy and security, vol. 11, no. 1, pp. 38-54, 2015. https://doi.org/10.1080/15536548.2015.1010985
- K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "A Proposed Framework for Access Control in the Cloud and BYOD Environment," IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 18, no. 2, pp. 144-152, 2018.
- M. Finneran, "Mobile security gaps abound," Information Week, no. 1333, 2012.
- A. Ghosh, P. K. Gajar, and S. Rai, "Bring your own device (BYOD): Security risks and mitigating strategies," Journal of Global Research in Computer Science, vol. 4, no. 4, pp. 62-70, 2013.
- N. Zahadat, P. Blessner, T. Blackburn, and B. A. Olson, "BYOD security engineering: A framework and its analysis," Computers & Security, vol. 55, pp. 81-99, 2015. https://doi.org/10.1016/j.cose.2015.06.011
- M. P. Morolong, F. B. Shava, and A. M. Gamundani, "Bring Your Own Device (BYOD) Information Security Risks: Case of Lesotho," in International Conference on Cyber Warfare and Security, 2020, pp. 346-XVI: Academic Conferences International Limited.
- K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "An Evaluation of the Proposed Framework for Access Control in the Cloud and BYOD Environment," INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, vol. 9, no. 10, pp. 213-221, 2018.
- K. W. Miller, J. Voas, and G. F. Hurlburt, "BYOD: Security and privacy considerations," It Professional, vol. 14, no. 5, pp. 53-55, 2012. https://doi.org/10.1109/MITP.2012.93
- H. Chen, Y. Li, L. Chen, and J. Yin, "Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue," Journal of Enterprise Information Management, 2020.
- K. E. Welsh, A. L. Mauchline, D. France, V. Powell, W. B. Whalley, and J. Park, "Would Bring Your Own Device (BYOD) be welcomed by undergraduate students to support their learning during fieldwork?," Journal of Geography in Higher Education, vol. 42, no. 3, pp. 356-371, 2018. https://doi.org/10.1080/03098265.2018.1437396
- A. V. Herrera, M. Ron, and C. Rabadao, "National cyber-security policies oriented to BYOD (bring your own device): Systematic review," in 2017 12th Iberian Conference on Information Systems and Technologies (CISTI), 2017, pp. 1-4: IEEE.
- F. Portela, A. M. da Veiga, and M. F. Santos, "Benefits of bring your own device in healthcare," in Next-Generation Mobile and Pervasive Healthcare Solutions: IGI Global, 2018, pp. 32-45.
- C. Z. Tu, J. Adkins, and G. Y. Zhao, "Complying with BYOD security policies: A moderation model based on protection motivation theory," Journal of the Midwest Association for Information Systems (JMWAIS), vol. 1, pp. 11-28, 2019.
- M. Shabazi, M. Amini Rarani, S. Tahmasebian, and M. Jahanbakhsh, "BYOD and its Application in the Healthcare Environment," Applied Health Information Technology, vol. 1, no. 1, pp. 60-64, 2020.
- M. H. U. Sharif, R. Datta, S. N. Sankarasetty, H. Garikapati, M. Valavala, and S. Maraboyina, "BRING YOUR OWN DEVICE (BYOD) PROGRAM," International Journal of Engineering Applied Sciences and Technology, vol. 4, no. 4, pp. 2455-2143, 2019.
- B. Alotaibi and H. Almagwashi, "A Review of BYOD security challenges, solutions and policy best practices," in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018, pp. 1-6: IEEE.
- R. Palanisamy, A. A. Norman, and M. L. Mat Kiah, "BYOD policy compliance: Risks and strategies in organizations," Journal of Computer Information Systems, pp. 1-12, 2020.
- M. M. Singh, C. W. Chan, and Z. Zulkefli, "Security and privacy risks awareness for bring your own device (BYOD) paradigm," International Journal of Advanced Computer Science and Applications, vol. 8, no. 2, pp. 53-62, 2017.
- B. Morrow, "BYOD security challenges: control and protect your most sensitive data," Network Security, vol. 2012, no. 12, pp. 5-8, 2012. https://doi.org/10.1016/S1353-4858(12)70111-3
- M. Dhingra, "Legal issues in secure implementation of bring your own device (BYOD)," Procedia Computer Science, vol. 78, pp. 179-184, 2016. https://doi.org/10.1016/j.procs.2016.02.030
- O. Ehikioya, A. P. Binitie, and A. Joe-Obasi, "SECURITY RISKS ASSOCIATED WITH BRING YOUR OWN DEVICE BYOD AND POSSIBLE MITIGATION TECHNIQUES," SOUTH EASTERN JOURNAL OF RESEARCH AND SUSTAINABLE DEVELOPMENT (SEJRSD), vol. 2, no. 1, pp. 148-165, 2019.
- K. Downer and M. Bhattacharya, "BYOD security: A new business challenge," in 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), 2015, pp. 1128-1133: IEEE.
- B. Lebek, K. Degirmenci, and M. Breitner, "Investigating the influence of security, privacy, and legal concerns on employees' intention to use BYOD mobile devices," in Proceedings of the nineteenth Americas conference on information systems, 2013, pp. 1-8: Association for Information Systems (AIS).
- A. Gustav and S. Kabanda, "BYOD adoption concerns in the South African financial institution sector," in CONF-IRM, 2016, p. 59.
- J. E. Moyer, "Managing mobile devices in hospitals: A literature review of BYOD policies and usage," Journal of Hospital Librarianship, vol. 13, no. 3, pp. 197-208, 2013. https://doi.org/10.1080/15323269.2013.798768
- K. AlHarthy and W. Shawkat, "Implement network security control solutions in BYOD environment," in 2013 IEEE International Conference on Control System, Computing and Engineering, 2013, pp. 7-11: IEEE.
- A. Scarfo, "New security perspectives around BYOD," in 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, 2012, pp. 446-451: IEEE.
- T. Alhussain, R. AlGhamdi, S. Alkhalaf, and O. Alfarraj, "Users" Perceptions of Mobile Phone Security: A Survey Study in the Kingdom of Saudi Arabia," international journal of computer theory and engineering, vol. 5, no. 5, p. 793, 2013.
- M. F. Mohammed, "Privacy and Social Networking: WhatsApp Users' Perception in Saudi Arabia Researchers: Ms. Nemah Alsayed Ms. Haifaa Alakel," 2016.
- P. Saa, O. Moscoso-Zea, and S. Lujan-Mora, "Bring your own device (BYOD): Students perception-Privacy issues: A new trend in education?," in 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), 2017, pp. 1-5: IEEE.
- F. Mohammed, F. Olayah, A. Ali, and N. A. Gazem, "The effect of cloud computing adoption on the sustainability of e-government services: A review," International Journal of Advanced Science and Technology, vol. 29, no. 5, pp. 2636-2642, 2020.
- https://www.imf.org/ar/News/Articles/2020/11/06/blog-bridging-digital-divide-to-scale-up-covid19-recovery
- https://www.itu.int/en/ITU-D/Regional-Presence/ArabStates/Documents/events/2020/RDF/Presentations/Session1/KSA.pdf
- Michelberger, Pal, and Pal Feher-Polgar. "BYOD SECURITY STRATEGY (ASPECTS OF A MANAGERIAL DECISION)." Journal of Security & Sustainability Issues 9.4 (2020).