• Title/Summary/Keyword: Bring Your Own Device (BYOD)

Search Result 28, Processing Time 0.027 seconds

Effects of Bring Your Own Device (BYOD) Attributes on Work-to-life Conflict

  • Cong Qi
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.831-862
    • /
    • 2023
  • The rapid adoption of smartphones and tablets among employees has recently forced organizations to proactively embrace bring your own device (BYOD). The situation of COVID-19 makes the concept of BYOD even paramount. Allowing employees to bring their own mobile devices to the workplace has helped companies realize productivity gains and cost benefits. However, BYOD has also blurred the boundaries between work and personal life, thereby creating a stressful environment for employees (Doargajudbur and Hosanoo, 2023). This study explores the relationships between several BYOD attributes and investigates the effects of these attributes on work-to-life conflict. It contributes by introducing workplace connectivity after hours as a new dimension of BYOD attribute to influence work-to-life conflict. Based on boundary theory, a theoretical model is developed and tested with an online survey. The results reveal that flexibility and workplace connectivity after hours positively influence productivity, and flexibility helps to relieve instead of increase work overload. Meanwhile, a higher level of flexibility and productivity can help reduce work-to-life conflict, and a higher level of work overload induces a higher level of work-to-life conflict.

Adoption of the Bring Your Own Device (BYOD) Approach in the Health Sector in Saudi Arabia

  • Almarhabi, Khalid A.;Alghamdi, Ahmed M.;Bahaddad, Adel A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.371-382
    • /
    • 2022
  • The trend of Bring Your Own Device (BYOD) is gaining popularity all over the world with its innumerable benefits such as financial gain, greater employee satisfaction, better job efficiency, boosted morale, and improved flexibility. However, this unstoppable and inevitable trend also brings its own challenges and risks while managing and controlling corporate data and networks. BYOD is vulnerable to attacks by viruses, malware, or spyware that can reach sensitive data and disclose information, modify access policies, disrupt services, create financial issues, minimise productivity, and entail some legal implications. The key focus of this research is how Saudi Arabia has approached BYOD with the help of their 5-step solution model and quantitative research methodology. The result of this study is a statement about what users know about this trend, their opinions about it, and suggestion to increase the employee awareness.

Research on BYOD (Bring Your Own Device) policy guidelines with the extension of the "SMART Education" in Korea based on the analyses of the U.S. cases (스마트교육 확산에 따른 국내 BYOD 정책방안 연구 - 미국사례 분석을 중심으로 -)

  • Lim, Keol;Jang, Yoonho;Lee, Eunhwan
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.21-36
    • /
    • 2014
  • The purposes of the study was to investigate BYOD (Bring Your Own Device) policy since it would be limited to distribute all of the digital devices required for the schools within the budget of the government. First, the concept and characteristics of BYOD were introduced. Then, the pros and cons of BYOD were analyzed according to the case studies of BYOD policies of the U.S. Based on the previous experiences, guidelines of domestic BYOD policies were established. Regarding the institutional aspect, technical issues, usage, damages, digital divide, information security, and resources were discussed. Additionally, conditions of technology, networks, filtering, software were also considered as essential infrastructure. In sum, as an alternative of distributing digital devices in schools, the importance of BYOD should be regarded as top priorities with systematic preparations in launching digital education. It would be expected that this study play a fundamental role in launching domestic BYOD policy by supporting specific strategies.

Access Control Model using RBAC in BYOD(Bring Your Own Device) (RBAC(Role Based Access Control)을 이용한 BYOD(Bring Your Own Device) 접근제어 관한 연구)

  • Bae, Yo-Han;Lee, Hee-Jo
    • Annual Conference of KIPS
    • /
    • 2014.04a
    • /
    • pp.379-382
    • /
    • 2014
  • BYOD 는 다양한 기기에서 상호 운용되고, 상황에 따라 다른 접근권한을 가질 수 있다. BYOD 는 기업의 입장에서는 생산성 향상과 기기에 대한 비용 감소 등의 장점을 가지고 있다. 하지만 보안의 중대한 취약점을 가지고 있고 기업은 개인이 사용하는 각기 다른 기기들에 대해서 통제하기 힘들다는 점과 관리비용은 오히려 상승할 수도 있다는 점 등의 단점들이 부각이 되고 있다. BYOD 에 접근 가능한 권한들을 효율적으로 관리하여 접근권한 관련 설정 오류를 최소화하고, 권한이 없는 사용자의 접근을 차단하기 위한 'BYOD 환경에 적합한 접근 제어 기술'이 요구된다. 따라서 본 논문에서는 BYOD 시장의 급속한 발달과, 스마트 폰 하드웨어,소프트웨어의 발전에 맞춰 RBAC(Role Based Access Control)을 이용한 접근제어 방법을 제안한다. 이는 사용자 특성, 역할 특성, 시스템 특성에 따라 권한 활성화 제약이 가능하며, 권한 위임과 권한 상속 시에 시간, 위치정보, 위기 상황 발생여부에 따라 제약을 할 수 있다.

A Study of Improved Session Management for Mobile Web under BYOD environment (BYOD 환경을 고려한 모바일 웹을 위한 세션 관리 개선 방안 연구)

  • Kim, Young-hun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1117-1124
    • /
    • 2015
  • This paper explains a web session management system for mobile web environment with BYOD(Bring Your Own Device). This system operates by enhanced secure session token. This system consists of an unique identifier, time stamp, and encryption algorithm. The Unique identifier in this system classifies each mobile device for web security based on mobile environment with BYOD. And the Time stamp in this system that determine session effectiveness for web security. Also the Cipher algorithm in this system that protects session token information for web security. This paper analysis a security of session management system running on mobile web environment using the simulation techniques. The proposed method is more suitable than the other methods under enviroment mobile web environment with BYOD.

The Status of the Bring Your Own Device (BYOD) in Saudi Arabia: Dataset

  • Khalid A. Almarhabi;Adel A. Bahaddad;Ahmed M. Alghamdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.203-209
    • /
    • 2023
  • The paper brings across data that is utilized in the Bring Your Own Device (BYOD) status collected between February and April of 2021 across Saudi Arabia. The data set was collected using questionnaires established through online mechanisms for the respondents. In the questionnaire, personal details included five questions while seven questions addressed the working model of personal mobile devices. Six questions addressed the awareness of employees bring your own device awareness for employees comprised seven questions and two questions addressed the benefits of business achievements. In the identification of suitable respondents for the research, two approaches were applied. The research demanded that the respondents be Saudi Arabian nationals and have attained 18 years. Snowball and purposive techniques were applied in the collection of information from a wide area of Saudi Arabia while employing social media approaches that include the use of WhatsApp and emails in the collection of data. The approach ensured the collection of data from 857 respondents used in the identification of the status as well as issues across the BYOD environment and accompanying solutions. The data was also used in the provision of awareness in the community through short-term courses, cyber security training and awareness programs. The results of the research are therefore applicable to the context of the Saudi Arabian country that is currently facing issues in dealing with the application of personal devices in the work environment.

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.

A Study on Quality Evaluation Model of Mobile Device Management for BYOD (BYOD 환경의 MDM 보안솔루션의 품질평가모델에 관한 연구)

  • Rha, HyeonDae;Kang, SuKyoung;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • A mobile office environment using mobile devices, such as tablet PC, mobile phone is gradually increased in enterprises, banking and public institutions etc which is no limitation on places. It occurs advanced and persist security threats that are required effective security management policy and technical solution to be secure. For BYOD (Bring Your Own Device) environment, technical security management solutions of network control based, MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Contents Management) were released, evolved and mixed used. In perspective of integrated security management solution, mobile security product should be selected to consider user experience and environment and correct quality evaluation model of product is needed which is provided standards and guidance on the selection criteria when it was introduced. In this paper, the most widely used MDM solution is selected to take a look at its features and it was reviewed the product attributes with related international standard ISO/IEC25010 software quality attributes. And then it was derived evaluation elements and calculated the related metrics based on the quality analysis model. For the verification of quality evaluation model, security checks list and testing procedures were established; it applied metrics and analyzed the testing result through scenario based case study.

  • PDF

Design of a Wi-Fi Remote Ordering System Using the BYOD Environment (BYOD 환경을 활용한 WiFi 원격주문 시스템 설계)

  • Suk, Myung-gun;Jang, Seok-woo;Kim, Chang-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.759-762
    • /
    • 2015
  • As a result of the popularization of smart devices, smart phones or the tablets have become necessities in modern society. In this current of the times, the bring-your-own-device environment, in which personally owned smart devices are utilized in life, is attracting attention. In this context, this paper designed a Wi-Fi remote ordering system focused on the BYOD environment. If the Wi-Fi remote ordering system based on the BYOD environment is popularized, positive effects can be expected such as the enhancement of efficiency and the increase of customer benefits. As a typical example, real-time customer requests via smart devices enable the provision of fast services. This paper designed a mobile app for customers' remote ordering and web pages on which member stores can inquire details of orders, manage a menu, and register statistical data on sales. If the Wi-Fi remote ordering system designed by this paper is widely distributed internationally, it is expected that the system will be used usefully by many people.

  • PDF

A Secure Telemedicaine System in Smart Health Environment using BYOD (BYOD를 활용한 스마트헬스 환경에서 안전한 원격의료 시스템)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho;Park, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2473-2480
    • /
    • 2015
  • In telemedicaine, people can make their health checked at anywhere from temporal and spatial constraints and It's environment can provide continuous health information regardless of the location of customers through PCs and smart phones. In addition, personal health information collected utilizing the BYOD(bring your own device) is the most important factor data security and guaranteed personal privacy because it's directly connected to the individual's health and life. In this paper, we provide a signature of the private key encryption system and method for providing the security of personal health information data collected utilizing the BYOD. Against replay attacks and man-in-the-middle attacks on security issues that are emerging as a smart environmental health was used as the timestamp and signature methods. Proposed method provides encryption overhead, while a communication was lower compared to the pre-encrypted with a mean 1.499mJ 1.212mJ shown by simulation to respond quickly in an emergency situation to be about 59%.