DOI QR코드

DOI QR Code

Differences in Users' Insights and Increase in The Acceptance Level for Using The BYOD Approach in Government, Non-Profit Organizations, and Private Sectors in Saudi Arabia

  • Alghamdi, Ahmed M. (Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah) ;
  • Bahaddad, Adel A. (Department of Information System, Faculty of Computing and Information Technology, King Abdulaziz University) ;
  • Almarhabi, Khalid A. (Department of Computer Science, College of Computing in Al-Qunfudah, Umm Al-Qura University)
  • Received : 2022.07.05
  • Published : 2022.07.30

Abstract

Digital transformation represents one of the main obstacles facing several government, private, and non-profit sectors that help stabilize digital transformation in the Arabic region. One of the helpful ways to improve the level of freedom, productivity, and flexibility among employees to accept the BYOD approach is using their own devices to perform their work both in and outside the workplace. This study focuses to present the differences between the main three economic sectors, which represent the most important pillars of the economy in Saudi Arabia within the Kingdom's Vision 2030. BYOD also has great importance to the stakeholders for raising their awareness by expressing the implications, if the concept of BYOD is widely and correctly adopted. The study uses the diffusion of innovation (DOI) framework and quantitative analysis data to determine the main dimensions and important factors that help increase the awareness of the target audience. The number of participants in this study was 830, and the participants are mixing between the government, private, and non-profit sectors. The main findings showed a significant impact of several factors such as the importance of knowledge, ease of use, employee satisfaction, risk awareness, and attention to increase the level of acceptance in three main sectors study for using the BYOD approach widespread and professional use.

Keywords

Acknowledgement

This work was funded by the University of Jeddah, Jeddah, Saudi Arabia, under grant No. (UJ-21-DR-56). The authors, therefore, acknowledge with thanks the University of Jeddah technical and financial support.

References

  1. D. Goerzig and T. Bauernhansl, "Enterprise architectures for the digital transformation in small and medium-sized enterprises," Procedia Cirp, vol. 67, pp. 540-545, 2018 https://doi.org/10.1016/j.procir.2017.12.257
  2. C. Matt, T. Hess, and A. Benlian, "Digital transformation strategies," Business & Information Systems Engineering, vol. 57, no. 5, pp. 339-343, 2015. https://doi.org/10.1007/s12599-015-0401-5
  3. Brana, F. J. (2019). A fourth industrial revolution? Digital transformation, labor and work organization: A view from Spain. Journal of Industrial and Business Economics, 46(3), 415-430. https://doi.org/10.1007/s40812-019-00122-0
  4. S. C. o. Economic and D. Affairs, "Saudi vision 2030," 2016.
  5. R. Palanisamy, A. A. Norman, and M. L. Mat Kiah, "BYOD policy compliance: Risks and strategies in organizations," Journal of Computer Information Systems, pp. 1-12, 2020.
  6. SDAIA. (2021), SDAIA Achievements. Retrieved on April 16, 2021 from https://sdaia.gov.sa/files/2020Achievements.pdf
  7. S. Bartsch, E. Weber, M. Buttgen, and A. Huber, "Leadership matters in crisis-induced digital transformation: how to lead service employees effectively during the COVID-19 pandemic," Journal of Service Management, 2020.
  8. Cook, I. (2012). BYOD - Research findings released. Retrieved on April 16, 2021 from https://cxounplugged.com/2012/11/ovum_byod_research-findings-released/
  9. K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "Survey on access control and management issues in cloud and BYOD environment," International Journal of Computer Science and Mobile Computing, vol. 6, no. 12, pp. 44-54, 2017.
  10. Njoroge, P., & Pazarbasioglu, C. (November 5, 2020)., Bridging the Digital Divide to Scale Up the COVID-19 Recovery
  11. A. Ghosh, P. K. Gajar, and S. Rai, "Bring your own device (BYOD): Security risks and mitigating strategies," Journal of Global Research in Computer Science, vol. 4, no. 4, pp. 62-70, 2013.
  12. C. Z. Tu, J. Adkins, and G. Y. Zhao, "Complying with BYOD security policies: A moderation model based on protection motivation theory," Journal of the Midwest Association for Information Systems (JMWAIS), vol. 1, pp. 11-28, 2019.
  13. Fiorenza, P. (2013). Mobile technology forces study of bring your own device. Public Manager, 42(1), 12.
  14. El Gbouri, A., & Mensch, S. (2020). Factors affecting information security and the widest implementations of Bring Your Own Device (BYOD) programs. ACET Journal of Computer Education & Research, 14(1).
  15. K. Downer and M. Bhattacharya, "BYOD security: A new business challenge," in 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), 2015, pp. 1128-1133: IEEE.
  16. Jamal, F., Taufik, M., Abdullah, A. A., & Hanapi, Z. M. (2020, April). A systematic review of Bring Your Own Device (BYOD) authentication technique. Journal of Physics: Conference Series, 1529(4), 042071. IOP Publishing.
  17. Lenovo Tech Today (2021). Is the public sector letting BYOD down? Retrieved on April 16, 2021 from https://techtoday.lenovo.com/sa/en/solutions/smb/publicsector-letting-byod-down
  18. BYOD. (25 August 2020). Mobile device guidance Retrieved on April 16, 2021 from https://www.ncsc.gov.uk/collection/mobile-deviceguidance/bring-your-own-device
  19. Kang, Q., Xue, L., Morrison, A., Tang, Y., Chen, A., & Luo, X. (2020). Programmable in-network security for context-aware {BYOD} policies. In 29th {USENIX} Security Symposium ({USENIX} Security 20) (pp. 595-612).
  20. Microsoft 365 (03/27/2021). Protect unmanaged Windows 10 PCs and Macs Retrieved on April 17, 2021 from https://docs.microsoft.com/en-us/microsoft365/campaigns/m365-campaigns-protect-pcsmacs?view=o365-worldwide&tabs=Windows10
  21. Al-Harthy, I. M., Rahim, F. A., Ali, N. A., & Singun Jr., A. P. (2020). Dimension of Protection Behaviors: A Systematic Literature Review. Journal of Theoretical and Applied Information Technology, 98(17).
  22. Blagden, R. J. (2020). An implementation strategy for Bring Your Own Device in the NHS: An innovation study (Doctoral dissertation, Imperial College).
  23. The relation between the public and private sector. Retrieved on April 17, 2021 from http://dr-ama.com/
  24. Alghamdi, J., & Holland, C. (2020). A comparative analysis of policies, strategies and programmes for information and communication technology integration in education in the Kingdom of Saudi Arabia and the republic of Ireland. Education and Information Technologies, 25(6), 4721-4745. https://doi.org/10.1007/s10639-020-10169-5
  25. Irvin, R. (2017) Non-profit organization. Retrieved on April 17, 2021 from https://www.britannica.com/topic/nonprofit-organization/additional-info%23contributors
  26. Dincer, I., Hussain, M. M., & Al-Zaharnah, I. (2004). Energy and exergy use in public and private sector of Saudi Arabia. Energy Policy, 32(14), 1615-1624. https://doi.org/10.1016/S0301-4215(03)00132-0
  27. Alirezabeigi, S., Masschelein, J., & Decuypere, M. (2020). Investigating digital doings through breakdowns: A sociomaterial ethnography of a Bring Your Own Device school. Learning, Media and Technology, 45(2), 193-207. https://doi.org/10.1080/17439884.2020.1727501
  28. Alghamdi, A. (2018) The degree of importance of the partnership between the University of Jeddah and the private sector in light of the vision of the Kingdom of Saudi Arabia 2030.
  29. Essa, Mohammed Abdel A'al Dr (2018) "Partnership between the Public and Private Sectors: Concept, Reasons, Motivation and Perspectives," Arab Journal of Administration: Vol. 38 : No. 3 , Article 2.
  30. 2030 vision. (2021). National Transformation Program. https://www.vision2030.gov.sa/v2030/vrps/ntp/
  31. 2030 vision. (2021). National Transformation Program - Acting Plan. http://www.arabia-saudita.it/files/pages/2014/05/ntp_en.pdf
  32. Austin, G. (Ed.). (2020). Cyber security education: Principles and policies. Routledge.
  33. Namaa Portal (2021). Non-Profit Services Portal. Retrieved on April 17, 2021 from https://namaa.sa/
  34. K. W. Miller, J. Voas, and G. F. Hurlburt, "BYOD: Security and privacy considerations," It Professional, vol. 14, no. 5, pp. 53-55, 2012. https://doi.org/10.1109/MITP.2012.93
  35. B. Alotaibi and H. Almagwashi, "A Review of BYOD security challenges, solutions and policy best practices," in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018, pp. 1-6: IEEE.
  36. M. M. Singh, C. W. Chan, and Z. Zulkefli, "Security and privacy risks awareness for bring your own device (BYOD) paradigm," International Journal of Advanced Computer Science and Applications, vol. 8, no. 2, pp. 53-62, 2017.
  37. B. Morrow, "BYOD security challenges: control and protect your most sensitive data," Network Security, vol. 2012, no. 12, pp. 5-8, 2012. https://doi.org/10.1016/S1353-4858(12)70111-3
  38. M. Dhingra, "Legal issues in secure implementation of bring your own device (BYOD)," Procedia Computer Science, vol. 78, pp. 179-184, 2016. https://doi.org/10.1016/j.procs.2016.02.030
  39. O. Ehikioya, A. P. Binitie, and A. Joe-Obasi, "SECURITY RISKS ASSOCIATED WITH BRING YOUR OWN DEVICE BYOD AND POSSIBLE MITIGATION TECHNIQUES," SOUTH EASTERN JOURNAL OF RESEARCH AND SUSTAINABLE DEVELOPMENT (SEJRSD), vol. 2, no. 1, pp. 148-165, 2019.
  40. K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "A Proposed Framework for Access Control in the Cloud and BYOD Environment," IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 18, no. 2, pp. 144-152, 2018.
  41. K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "An Evaluation of the Proposed Framework for Access Control in the Cloud and BYOD Environment," INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, vol. 9, no. 10, pp. 213-221, 2018.
  42. De Kock, R., & Futcher, L. A. (2016). Mobile device usage in higher education institutions in South Africa. 2016 Information Security for South Africa (ISSA) (27-34). IEEE.,
  43. Yeop, Y. H., Othman, Z. A., Abdullah, S. N. H. S., Asma'Mokhtar, U., Fauzi, W. F. P., & Ahmad, N. (2018). Key factors to implement BYOD in schools. 2018 Cyber Resilience Conference (CRC) (1-3). IEEE.
  44. Yeop, Y. H., Othman, Z. A., Abdullah, S. N. H. S., Mokhtar, U. A., & Fauzi, W. F. (2018). BYOD implementation factors in schools: A case study in Malaysia. Int. J. Adv. Comput. Sci. Appl., 9(12), 311-317, 2018,
  45. Othman, Z., Sepli, M., Mokhtar , U., & Yeop, Y., (2020). BYOD implementation model in Malaysian schools: The perception and readiness of parents, schools, and teachers. Int. J. Adv. Appl. Sci., 7(6), 57-68. https://doi.org/10.21833/ijaas.2020.06.008
  46. Musarurwa, S., Gamundani, A. M., & Shava, F. B. (2019, May). An assessment of BYOD control in higher learning institutions: A Namibian perspective. In 2019 IST-Africa Week Conference (IST-Africa) (1-9). IEEE.
  47. Cheng, G., Guan, Y., & Chau, J. (2016). An empirical study towards understanding user acceptance of bring your own device (BYOD) in higher education. Australasian Journal of Educational Technology, 32(4).
  48. Musarurwa, A., Flowerday, S., & Cilliers, L. (2019). The bring-your-own-device unintended administrator: A perspective from Zimbabwe. The Electronic Journal of Information Systems in Developing Countries, 85(4),
  49. H. Chen, Y. Li, L. Chen, and J. Yin, "Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue," Journal of Enterprise Information Management, 2020.
  50. T. Alhussain, R. AlGhamdi, S. Alkhalaf, and O. Alfarraj, "Users" Perceptions of Mobile Phone Security: A Survey Study in the Kingdom of Saudi Arabia," international journal of computer theory and engineering, vol. 5, no. 5, p. 793, 2013.
  51. Alsayed, Nemah & Alakel, Haifaa & Mohammed, Ferdous. (2016). Privacy and Social Networking: WhatsApp Users' Perception in Saudi Arabia.
  52. Alfina, S. M. (2020, June). From Physical to digital: Consumer adoption process to e-Wallet. In 23rd Asian Forum of Business Education (AFBE 2019) (15-21). Atlantis Press.
  53. Doan, N., 2014. Consumer adoption in mobile wallet: A study of consumers in Finland. [online] Available at: https://www.theseus.fi/bitstream/handle/10024/86343/Ngoc_Doan.pdf?sequence=l
  54. Dribbisch, K., 2017. Translating innovation: The adoption of design thinking in a Singaporean Ministry.
  55. Rogers, E. M. 1995. Diffusion of Innovations. 5th ed. New York: Simon and Schuster.
  56. Omokehinde, S.O., 2019. Factors to consider when developing an organisation-wide bring your own device (BYOD) strategy for adoption.
  57. Smith-Ditizio, A. A., & Smith, A. D. (2018). BYOD (Bring Your Own Device), mobile technology providers, and its impacts on business/education and workplace/learning applications. In Encyclopedia of Information Science and Technology, Fourth Edition (5981-5991). IGI Global.