• Title/Summary/Keyword: BYOD

Search Result 47, Processing Time 0.024 seconds

Examining High School Students' BYOD Use under Office of Education-led Policy: Insights from the Technology Acceptance Model

  • Songhee KIM ;Jaejin LEE
    • Educational Technology International
    • /
    • v.24 no.2
    • /
    • pp.263-293
    • /
    • 2023
  • Offices of Education in Korea is planning and implementing the BYOD (bring your own device) policy. In particular, the Seoul Metropolitan Education Office promoted the 'Dibud' (digital buddy) policy. Due to the relative newness of the policy, coupled with opposition from the council, it hasn't been fully implemented. This study focuses on a rare example of a high school that experienced BYOD under the Office of Education-led policy in all three grades. This study adapted key variables from the Technology Acceptance Model (TAM). The regression results showed that both perceived usefulness (PU) and perceived ease of use (PEOU) significantly influenced intention to use Chromebooks and students' perceived learning outcomes. Analysis of the open-ended questionnaires revealed that students perceived positive benefits from using Chromebooks, such as easier data retrieval, improved academic performance, and increased learning productivity. Although the majority of respondents said there were no negative aspects to Chromebooks, negative factors included non-academic use, wireless network inconvenience, and device performance issues. The results of this study can provide data and understanding for future BYOD policies, specifically Chromebooks.

Personal information security measures against mobile office security threats in BYOD environment (BYOD 환경의 모바일 오피스 보안 위협에 대한 개인정보 보안 방안)

  • Park, Byoung-Woo;Jang, Seok-eun;Lee, Eun-kyung;Lee, Sang-Joon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.167-170
    • /
    • 2018
  • 모바일 오피스 확산과 함께 개인 소유의 스마트 폰, 태블릿PC 등을 업무 환경에 사용하는 BYOD 시대에 도래했다. BYOD 등장으로 기업 내부 인프라가 폐쇄적 환경에서 개방적 환경으로 전환했고 언제 어디서나 개인 스마트 기기가 기업 인프라 접근 허용이 가능해 졌다. 모바일 오피스는 휴대성이라는 편리함 이면에 일반 PC환경보다 더 많은 다양한 보안 위협과 취약점이 존재하고 스마트폰 분실 및 정보 유출, 악성코드 등의 위협이 존재하므로 더 높은 수준의 근본적인 보안대책 강구가 필요하다. 본 논문에서는 모바일 개인정보와 BYOD 환경의 모바일 오피스에 대한 보안 위협을 연구하고 모바일 오피스 개인정보 보안 방안을 제시함으로써 모바일 오피스 서비스를 제공하는 기업에게 개인정보 보안 전략을 수립하는 가이드라인을 제공하고자 한다.

  • PDF

Design of a Wi-Fi Remote Ordering System Using the BYOD Environment (BYOD 환경을 활용한 WiFi 원격주문 시스템 설계)

  • Suk, Myung-gun;Jang, Seok-woo;Kim, Chang-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.759-762
    • /
    • 2015
  • As a result of the popularization of smart devices, smart phones or the tablets have become necessities in modern society. In this current of the times, the bring-your-own-device environment, in which personally owned smart devices are utilized in life, is attracting attention. In this context, this paper designed a Wi-Fi remote ordering system focused on the BYOD environment. If the Wi-Fi remote ordering system based on the BYOD environment is popularized, positive effects can be expected such as the enhancement of efficiency and the increase of customer benefits. As a typical example, real-time customer requests via smart devices enable the provision of fast services. This paper designed a mobile app for customers' remote ordering and web pages on which member stores can inquire details of orders, manage a menu, and register statistical data on sales. If the Wi-Fi remote ordering system designed by this paper is widely distributed internationally, it is expected that the system will be used usefully by many people.

  • PDF

Study of BYOD Based on Virtualization·Cloud for Prevention of Enterprise Information Leakage (기업 정보유출 방지를 위한 가상화·클라우드 기반 BYOD 연구)

  • Bae, Hyo-Bin;Min, Jae-Won;Choi, Young-Hyun;Chung, Tae-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.628-631
    • /
    • 2013
  • 최근 개인소유의 모바일 디바이스를 이용해 기업의 정보에 접근할 수 있도록 하는 Bring Your Own Device(BYOD)가 기업의 생산성과 효율성을 높이는 IT혁신 전략으로 각광받고 있다. 하지만, 개인의 모바일 단말을 기업 업무에 이용하게 되면서 엄격한 통제가 불가능해졌다. 이로 인해 기업의 정보가 더욱 쉽게 유출될 수 있는 보안상의 문제점이 있다. 본 논문에서는 BYOD 상에서 보안문제를 해결하기 위해 단말 가상화와 클라우드 서비스를 혼합한 방식을 기반으로 한 접근제어, 인증, DRM 등에 대한 설명을 하고 활용방안을 제안한다.

A Secure Telemedicaine System in Smart Health Environment using BYOD (BYOD를 활용한 스마트헬스 환경에서 안전한 원격의료 시스템)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho;Park, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2473-2480
    • /
    • 2015
  • In telemedicaine, people can make their health checked at anywhere from temporal and spatial constraints and It's environment can provide continuous health information regardless of the location of customers through PCs and smart phones. In addition, personal health information collected utilizing the BYOD(bring your own device) is the most important factor data security and guaranteed personal privacy because it's directly connected to the individual's health and life. In this paper, we provide a signature of the private key encryption system and method for providing the security of personal health information data collected utilizing the BYOD. Against replay attacks and man-in-the-middle attacks on security issues that are emerging as a smart environmental health was used as the timestamp and signature methods. Proposed method provides encryption overhead, while a communication was lower compared to the pre-encrypted with a mean 1.499mJ 1.212mJ shown by simulation to respond quickly in an emergency situation to be about 59%.

Differences in Users' Insights and Increase in The Acceptance Level for Using The BYOD Approach in Government, Non-Profit Organizations, and Private Sectors in Saudi Arabia

  • Alghamdi, Ahmed M.;Bahaddad, Adel A.;Almarhabi, Khalid A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.332-346
    • /
    • 2022
  • Digital transformation represents one of the main obstacles facing several government, private, and non-profit sectors that help stabilize digital transformation in the Arabic region. One of the helpful ways to improve the level of freedom, productivity, and flexibility among employees to accept the BYOD approach is using their own devices to perform their work both in and outside the workplace. This study focuses to present the differences between the main three economic sectors, which represent the most important pillars of the economy in Saudi Arabia within the Kingdom's Vision 2030. BYOD also has great importance to the stakeholders for raising their awareness by expressing the implications, if the concept of BYOD is widely and correctly adopted. The study uses the diffusion of innovation (DOI) framework and quantitative analysis data to determine the main dimensions and important factors that help increase the awareness of the target audience. The number of participants in this study was 830, and the participants are mixing between the government, private, and non-profit sectors. The main findings showed a significant impact of several factors such as the importance of knowledge, ease of use, employee satisfaction, risk awareness, and attention to increase the level of acceptance in three main sectors study for using the BYOD approach widespread and professional use.

A Study on the Influence of Mobile Information Security on Mobile Office Service Satisfaction and Continuous Use in the Enterprise BYOD Environment (기업의 BYOD 환경에서 정보보안이 모바일 오피스 서비스 만족과 지속적 사용에 미치는 영향에 관한 연구)

  • Park, Byoung-Woo;Jang, Seok-Eun;Lee, Eun-Kyoung;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.929-939
    • /
    • 2018
  • The mobile office, which was expected to be a key strategy for business operation through business innovation, was slow to spread from the BYOD environment to information security issues. This study analyzes mobile office information security and analyzes countermeasures against mobile information security threats to analyze the influence of information security factors on corporate satisfaction and continuous use of mobile office service. The results of the study were identified through the research model and hypothesis, quantitative empirical analysis based on the questionnaire and qualitative empirical analysis based on the expert interview. Through this study, practical implications and future directions for mobile office service satisfaction and continuous use are suggested.

A Proposed Framework for the Automated Authorization Testing of Mobile Applications

  • Alghamdi, Ahmed Mohammed;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.217-221
    • /
    • 2021
  • Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

A Study on Quality Evaluation Model of Mobile Device Management for BYOD (BYOD 환경의 MDM 보안솔루션의 품질평가모델에 관한 연구)

  • Rha, HyeonDae;Kang, SuKyoung;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • A mobile office environment using mobile devices, such as tablet PC, mobile phone is gradually increased in enterprises, banking and public institutions etc which is no limitation on places. It occurs advanced and persist security threats that are required effective security management policy and technical solution to be secure. For BYOD (Bring Your Own Device) environment, technical security management solutions of network control based, MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Contents Management) were released, evolved and mixed used. In perspective of integrated security management solution, mobile security product should be selected to consider user experience and environment and correct quality evaluation model of product is needed which is provided standards and guidance on the selection criteria when it was introduced. In this paper, the most widely used MDM solution is selected to take a look at its features and it was reviewed the product attributes with related international standard ISO/IEC25010 software quality attributes. And then it was derived evaluation elements and calculated the related metrics based on the quality analysis model. For the verification of quality evaluation model, security checks list and testing procedures were established; it applied metrics and analyzed the testing result through scenario based case study.

  • PDF

The Status of the Bring Your Own Device (BYOD) in Saudi Arabia: Dataset

  • Khalid A. Almarhabi;Adel A. Bahaddad;Ahmed M. Alghamdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.203-209
    • /
    • 2023
  • The paper brings across data that is utilized in the Bring Your Own Device (BYOD) status collected between February and April of 2021 across Saudi Arabia. The data set was collected using questionnaires established through online mechanisms for the respondents. In the questionnaire, personal details included five questions while seven questions addressed the working model of personal mobile devices. Six questions addressed the awareness of employees bring your own device awareness for employees comprised seven questions and two questions addressed the benefits of business achievements. In the identification of suitable respondents for the research, two approaches were applied. The research demanded that the respondents be Saudi Arabian nationals and have attained 18 years. Snowball and purposive techniques were applied in the collection of information from a wide area of Saudi Arabia while employing social media approaches that include the use of WhatsApp and emails in the collection of data. The approach ensured the collection of data from 857 respondents used in the identification of the status as well as issues across the BYOD environment and accompanying solutions. The data was also used in the provision of awareness in the community through short-term courses, cyber security training and awareness programs. The results of the research are therefore applicable to the context of the Saudi Arabian country that is currently facing issues in dealing with the application of personal devices in the work environment.