Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.7.46

Adoption of the Bring Your Own Device (BYOD) Approach in the Health Sector in Saudi Arabia  

Almarhabi, Khalid A. (Department of Computer Science, College of Computing in Al-Qunfudah, Umm Al-Qura University)
Alghamdi, Ahmed M. (Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah)
Bahaddad, Adel A. (Department of Information System, Faculty of Computing and Information Technology, King Abdulaziz University)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.7, 2022 , pp. 371-382 More about this Journal
Abstract
The trend of Bring Your Own Device (BYOD) is gaining popularity all over the world with its innumerable benefits such as financial gain, greater employee satisfaction, better job efficiency, boosted morale, and improved flexibility. However, this unstoppable and inevitable trend also brings its own challenges and risks while managing and controlling corporate data and networks. BYOD is vulnerable to attacks by viruses, malware, or spyware that can reach sensitive data and disclose information, modify access policies, disrupt services, create financial issues, minimise productivity, and entail some legal implications. The key focus of this research is how Saudi Arabia has approached BYOD with the help of their 5-step solution model and quantitative research methodology. The result of this study is a statement about what users know about this trend, their opinions about it, and suggestion to increase the employee awareness.
Keywords
Bring Your Own Device (BYOD); information management; Saudi Arabia;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 https://www.imf.org/ar/News/Articles/2020/11/06/blog-bridging-digital-divide-to-scale-up-covid19-recovery
2 C. Matt, T. Hess, and A. Benlian, "Digital transformation strategies," Business & Information Systems Engineering, vol. 57, no. 5, pp. 339-343, 2015.   DOI
3 F. Portela, A. M. da Veiga, and M. F. Santos, "Benefits of bring your own device in healthcare," in Next-Generation Mobile and Pervasive Healthcare Solutions: IGI Global, 2018, pp. 32-45.
4 A. Ghosh, P. K. Gajar, and S. Rai, "Bring your own device (BYOD): Security risks and mitigating strategies," Journal of Global Research in Computer Science, vol. 4, no. 4, pp. 62-70, 2013.
5 O. Ehikioya, A. P. Binitie, and A. Joe-Obasi, "SECURITY RISKS ASSOCIATED WITH BRING YOUR OWN DEVICE BYOD AND POSSIBLE MITIGATION TECHNIQUES," SOUTH EASTERN JOURNAL OF RESEARCH AND SUSTAINABLE DEVELOPMENT (SEJRSD), vol. 2, no. 1, pp. 148-165, 2019.
6 B. Lebek, K. Degirmenci, and M. Breitner, "Investigating the influence of security, privacy, and legal concerns on employees' intention to use BYOD mobile devices," in Proceedings of the nineteenth Americas conference on information systems, 2013, pp. 1-8: Association for Information Systems (AIS).
7 A. Gustav and S. Kabanda, "BYOD adoption concerns in the South African financial institution sector," in CONF-IRM, 2016, p. 59.
8 J. E. Moyer, "Managing mobile devices in hospitals: A literature review of BYOD policies and usage," Journal of Hospital Librarianship, vol. 13, no. 3, pp. 197-208, 2013.   DOI
9 D. Goerzig and T. Bauernhansl, "Enterprise architectures for the digital transformation in small and medium-sized enterprises," Procedia Cirp, vol. 67, pp. 540-545, 2018.   DOI
10 Y. N. Azizaha et al., "Transformational or Transactional Leadership Style: Which Affects Work Satisfaction and Performance of Islamic University Lecturers During COVID-19 Pandemic," Systematic Reviews in Pharmacy, vol. 11, no. 7, pp. 577-588, 2020.
11 M. P. Morolong, F. B. Shava, and A. M. Gamundani, "Bring Your Own Device (BYOD) Information Security Risks: Case of Lesotho," in International Conference on Cyber Warfare and Security, 2020, pp. 346-XVI: Academic Conferences International Limited.
12 K. W. Miller, J. Voas, and G. F. Hurlburt, "BYOD: Security and privacy considerations," It Professional, vol. 14, no. 5, pp. 53-55, 2012.   DOI
13 K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "An Evaluation of the Proposed Framework for Access Control in the Cloud and BYOD Environment," INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, vol. 9, no. 10, pp. 213-221, 2018.
14 A. S. Alharbi, G. Halikias, A. M. Basahel, and M. Yamin, "Digital Governments of Developed Nations and Saudi Arabia: A Comparative Study," in 2020 7th International Conference on Computing for Sustainable Global Development (INDIACom), 2020, pp. 255-260: IEEE.
15 K. E. Welsh, A. L. Mauchline, D. France, V. Powell, W. B. Whalley, and J. Park, "Would Bring Your Own Device (BYOD) be welcomed by undergraduate students to support their learning during fieldwork?," Journal of Geography in Higher Education, vol. 42, no. 3, pp. 356-371, 2018.   DOI
16 A. V. Herrera, M. Ron, and C. Rabadao, "National cyber-security policies oriented to BYOD (bring your own device): Systematic review," in 2017 12th Iberian Conference on Information Systems and Technologies (CISTI), 2017, pp. 1-4: IEEE.
17 H. Chen, Y. Li, L. Chen, and J. Yin, "Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue," Journal of Enterprise Information Management, 2020.
18 I. Mergel, N. Edelmann, and N. Haug, "Defining digital transformation: Results from expert interviews," Government Information Quarterly, vol. 36, no. 4, p. 101385, 2019.   DOI
19 S. Bartsch, E. Weber, M. Buttgen, and A. Huber, "Leadership matters in crisis-induced digital transformation: how to lead service employees effectively during the COVID-19 pandemic," Journal of Service Management, 2020.
20 S. C. o. Economic and D. Affairs, "Saudi vision 2030," 2016.
21 M. M. Singh, C. W. Chan, and Z. Zulkefli, "Security and privacy risks awareness for bring your own device (BYOD) paradigm," International Journal of Advanced Computer Science and Applications, vol. 8, no. 2, pp. 53-62, 2017.
22 C. Z. Tu, J. Adkins, and G. Y. Zhao, "Complying with BYOD security policies: A moderation model based on protection motivation theory," Journal of the Midwest Association for Information Systems (JMWAIS), vol. 1, pp. 11-28, 2019.
23 M. Shabazi, M. Amini Rarani, S. Tahmasebian, and M. Jahanbakhsh, "BYOD and its Application in the Healthcare Environment," Applied Health Information Technology, vol. 1, no. 1, pp. 60-64, 2020.
24 M. H. U. Sharif, R. Datta, S. N. Sankarasetty, H. Garikapati, M. Valavala, and S. Maraboyina, "BRING YOUR OWN DEVICE (BYOD) PROGRAM," International Journal of Engineering Applied Sciences and Technology, vol. 4, no. 4, pp. 2455-2143, 2019.
25 B. Alotaibi and H. Almagwashi, "A Review of BYOD security challenges, solutions and policy best practices," in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018, pp. 1-6: IEEE.
26 R. Palanisamy, A. A. Norman, and M. L. Mat Kiah, "BYOD policy compliance: Risks and strategies in organizations," Journal of Computer Information Systems, pp. 1-12, 2020.
27 M. Dhingra, "Legal issues in secure implementation of bring your own device (BYOD)," Procedia Computer Science, vol. 78, pp. 179-184, 2016.   DOI
28 K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "Survey on access control and management issues in cloud and BYOD environment," International Journal of Computer Science and Mobile Computing, vol. 6, no. 12, pp. 44-54, 2017.
29 B. Morrow, "BYOD security challenges: control and protect your most sensitive data," Network Security, vol. 2012, no. 12, pp. 5-8, 2012.   DOI
30 https://www.itu.int/en/ITU-D/Regional-Presence/ArabStates/Documents/events/2020/RDF/Presentations/Session1/KSA.pdf
31 A. B. Garba, J. Armarego, D. Murray, and W. Kenworthy, "Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments," Journal of Information privacy and security, vol. 11, no. 1, pp. 38-54, 2015.   DOI
32 T. Alhussain, R. AlGhamdi, S. Alkhalaf, and O. Alfarraj, "Users" Perceptions of Mobile Phone Security: A Survey Study in the Kingdom of Saudi Arabia," international journal of computer theory and engineering, vol. 5, no. 5, p. 793, 2013.
33 K. Downer and M. Bhattacharya, "BYOD security: A new business challenge," in 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), 2015, pp. 1128-1133: IEEE.
34 B. Carin, "G20 safeguards digital economy vulnerabilities with a financial sector focus," Economics: The Open-Access, Open-Assessment E-Journal, vol. 11, no. 2017-19, pp. 1-11, 2017.   DOI
35 K. Almarhabi, K. Jambi, F. Eassa, and O. Batarfi, "A Proposed Framework for Access Control in the Cloud and BYOD Environment," IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 18, no. 2, pp. 144-152, 2018.
36 M. Finneran, "Mobile security gaps abound," Information Week, no. 1333, 2012.
37 N. Zahadat, P. Blessner, T. Blackburn, and B. A. Olson, "BYOD security engineering: A framework and its analysis," Computers & Security, vol. 55, pp. 81-99, 2015.   DOI
38 K. AlHarthy and W. Shawkat, "Implement network security control solutions in BYOD environment," in 2013 IEEE International Conference on Control System, Computing and Engineering, 2013, pp. 7-11: IEEE.
39 A. Scarfo, "New security perspectives around BYOD," in 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, 2012, pp. 446-451: IEEE.
40 M. F. Mohammed, "Privacy and Social Networking: WhatsApp Users' Perception in Saudi Arabia Researchers: Ms. Nemah Alsayed Ms. Haifaa Alakel," 2016.
41 P. Saa, O. Moscoso-Zea, and S. Lujan-Mora, "Bring your own device (BYOD): Students perception-Privacy issues: A new trend in education?," in 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), 2017, pp. 1-5: IEEE.
42 F. Mohammed, F. Olayah, A. Ali, and N. A. Gazem, "The effect of cloud computing adoption on the sustainability of e-government services: A review," International Journal of Advanced Science and Technology, vol. 29, no. 5, pp. 2636-2642, 2020.
43 Michelberger, Pal, and Pal Feher-Polgar. "BYOD SECURITY STRATEGY (ASPECTS OF A MANAGERIAL DECISION)." Journal of Security & Sustainability Issues 9.4 (2020).