• Title/Summary/Keyword: Bring Your Own Device (BYOD)

Search Result 28, Processing Time 0.025 seconds

Differences in Users' Insights and Increase in The Acceptance Level for Using The BYOD Approach in Government, Non-Profit Organizations, and Private Sectors in Saudi Arabia

  • Alghamdi, Ahmed M.;Bahaddad, Adel A.;Almarhabi, Khalid A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.332-346
    • /
    • 2022
  • Digital transformation represents one of the main obstacles facing several government, private, and non-profit sectors that help stabilize digital transformation in the Arabic region. One of the helpful ways to improve the level of freedom, productivity, and flexibility among employees to accept the BYOD approach is using their own devices to perform their work both in and outside the workplace. This study focuses to present the differences between the main three economic sectors, which represent the most important pillars of the economy in Saudi Arabia within the Kingdom's Vision 2030. BYOD also has great importance to the stakeholders for raising their awareness by expressing the implications, if the concept of BYOD is widely and correctly adopted. The study uses the diffusion of innovation (DOI) framework and quantitative analysis data to determine the main dimensions and important factors that help increase the awareness of the target audience. The number of participants in this study was 830, and the participants are mixing between the government, private, and non-profit sectors. The main findings showed a significant impact of several factors such as the importance of knowledge, ease of use, employee satisfaction, risk awareness, and attention to increase the level of acceptance in three main sectors study for using the BYOD approach widespread and professional use.

A Novel Design of Cloud-based Management Solution for Android Containers

  • Xuan, Nam Pham Nguyen;Chun, Hojin;Jung, Souhwan
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.67-75
    • /
    • 2019
  • The Android container is used for various purposes such as Bring Your Own Device (BYOD) solution and Android malware analysis. The strong point of android container than other technologies is it can simulate an android device like a real android phone on a hardware layer. Therefore, automatic management solutions for android container are necessary. This paper introduces a new design of cloud-based management solution for android containers. Through the proposal, android containers are managed automatically from a cloud platform - OpenStack with various tasks like: container configuration, deployment, destroy, android version, hardware device. In addition, the system monitoring and system statistics for android containers and hardware devices are also provided.

An Established Cloud Platform for Data Loss Prevention on Mobile Device (모바일 단말에서의 정보 유출 방지를 위한 클라우드 플랫폼 구축)

  • Song, Wangeun;Jung, Seungwook;Jung, Souhwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.358-361
    • /
    • 2015
  • BYOD(Bring your own device) 환경에서는 개인의 스마트 기기를 이용하여 회사 시스템을 이용하는 것으로, 개인의 단말을 업무에 이용하는 만큼 사원의 개인정보, 고객의 개인정보, 신규 사업 아이템, 상품의 거래내역, 계좌번호 등 유출시 막대한 손해를 발생시키는 사내 정보 유출에 대한 문제가 발생 가능하다. 회사 시스템을 관리하기 위해 개개인이 사용하는 다양한 종류의 단말에 맞는 설정이 필요함으로 즉각적인 대응이 어렵다. 때문에 위 같은 문제를 해결하고자 삼성이 개발한 듀얼 OS 구조의 KNOX가 제안되었으나, 특정 단말과 OS에 의존적이어서 다양한 종류의 단말에 적용하기 위해서는 지속적 개발이 필요한 단점이 있다. 다른 방법으로 MDM(Mobile Device Management) 시스템을 제안하였지만 새로운 모바일 단말에 대한 즉각적인 대응이 힘들며, 유지보수에 많은 시간과 투자가 필요한 단점이 있다. 따라서 본 논문에서는 단말에 의존적이지 않으면서, 기업의 정보를 보호하기 위하여 클라우드 기반 정보 유출 방지 플랫폼을 설계하고 제안한다.

A Proposal of Agent based on Tagging and Process Behavior Inspection on the SmartPhone Environments (스마트폰 환경에서 Tagging 기반 프로세스 행위 감시 에이전트 제안)

  • Hong, Ji-Hoon;Kim, Nam-Uk;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.434-437
    • /
    • 2015
  • 스마트폰 사용자가 급격하게 증가함에 따라 BYOD(Bring Your Own Device)정책을 펼치는 회사들이 많아졌지만 스마트폰 악성코드로 인해 회사 네트워크 전체가 위험한 상황에 직면해있다. 현재 다양한 스마트폰 악성코드 탐지 기법들이 연구되고 있지만 대부분 단일 어플리케이션을 대상으로 탐지를 수행하고 네트워크 환경과는 독립적으로 탐지한다는 단점이 존재한다. 따라서 본 논문에서는 네트워크 환경을 고려한 Tagging 기반의 프로세스 행위 감시 에이전트를 제안한다.

A Study on the application of All-flash storage system when building a Virtual Desktop Infrastructure services (가상 데스크톱 서비스 인프라 구축 시 올 플래시 스토리지 활용 및 연구)

  • Yoo, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.12-14
    • /
    • 2015
  • 클라우드 컴퓨팅 기술의 발전과 스마트워크 활성화, BYOD(Bring Your Own Device)의 일반화로 가상 데스크톱 서비스 사용이 활발해지고 있으며, 사용자는 기존 보다 고성능의 서비스 환경을 제공 받고자 한다. 최근 IT시장에서 화두가 되고 있는 올 플래시 스토리지는 기존 하드디스크 스토리지를 대체하여 고성능의 가상 데스크톱 서비스 인프라를 제공할 것으로 관련 업계에서 전망하고 있다. 본 논문은 위와 같은 환경에서 가상 데스크톱 서비스 인프라 구축 시 올 플래시 스토리지와 기존 하드디스크 스토리지의 성능 비교를 통해 관련 업계의 전망을 검증하고 더불어 올 플래시 스토리지 활용을 통해 클라우드 컴퓨팅 환경에서 효율적인 데이터센터 구성을 제시한다.

A Study on the New Management System Considering Shadow IT (Shadow IT를 고려한 새로운 관리체계 도입에 관한 연구)

  • Yoo, Jiyeon;Jeong, Nayoung
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.33-50
    • /
    • 2016
  • In a dynamic IT environment, employees often utilize external IT resources to work more efficiently and flexibly. However, the use of external IT resources beyond its control may cause difficulties in the company. This is known as "Shadow IT." In spite of efficiency gains or cost savings, Shadow IT presents problems for companies such as the outflow of enterprise data. To address these problems, appropriate measures are required to maintain a balance between flexibility and control. Therefore, in this study, we developed a new information security management system called AIIMS (Advanced IT service & Information security Management System) and the Shadow IT Evaluation Model. The proposed model reflects a Shadow IT's attributes such as innovativeness, effectiveness, and ripple effect. AIIMS consists of five fields: current analysis; Shadow IT management plans; management process; education and training; and internal audit. There are additional management items and sub-items within these five fields. Using AIIMS, we expect to not only mitigate the potential risks of Shadow IT but also create successful business outcomes. Now is the time to draw to the Light in the Shadow IT.

A Comparative Study on Acceptance Attitudes and Expected Effects : Organizations between Korea and Canada (한국과 캐나다 조직간 원격근무 수용태도와 기대효과에 대한 비교 연구)

  • Park, Kiho
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.4
    • /
    • pp.25-39
    • /
    • 2017
  • This research conducted empirical and comparative study following interview concerning the relationship of acceptance attitudes and expected effects of the teleworking between Korean and Canada organizations. Independent variable was acceptance attitude, and the expected effect as dependent variable. Totally, 201 responded questionnaires (Korea : 118, Canada : 83) were analyzed for multiple regression and mean difference between groups. On January 1, 2015, Canada had agreed FTA (free trade agreement) with Korea. Therefore, many organizations can have opportunities for sharing hands in social infrastructures and business area. As a result, the research found out that teleworking can positively improve employee's quality of life, efficiency of works. Moreover, respondents informed us that it may give us national and social cost saving. The BYOD (bring your own device) will be helpful to make employees do more active communication. This comparative research expects that two countries have some insights to cooperate in smart work or teleworking. In addition, several Korean companies can have chances to export IT technologies to Canada market.

A Case Study on Implementation of Mobile Information Security (모바일 정보보안을 위한 실시간 모바일 기기 제어 및 관리 시스템 설계.구현 사례연구)

  • Kang, Yong-Sik;Kwon, Sun-Dong;Lee, Kang-Hyun
    • Information Systems Review
    • /
    • v.15 no.2
    • /
    • pp.1-19
    • /
    • 2013
  • Smart working sparked by iPhone3 opens a revolution in smart ways of working at any time, regardless of location and environment. Also, It provide real-time information processing and analysis, rapid decision-making and the productivity of businesses, including through the timely response and the opportunity to increase the efficiency. As a result, every company are developing mobile information systems. But company data is accessed from the outside, it has problems to solve like security, hacking and information leakage. Also, Mobile devices such as smart phones belonging to the privately-owned asset can't be always controlled to archive company security policy. In the meantime, public smart phones owned by company was always applied security policy. But it can't not apply to privately-owned smart phones. Thus, this paper is focused to archive company security policy, but also enable the individual's free to use of smart phones when we use mobile information systems. So, when we use smart phone as individual purpose, the normal operation of all smart phone functions. But, when we use smart phone as company purpose like mobile information systems, the smart phone functions are blocked like screen capture, Wi-Fi, camera to protect company data. In this study, we suggest the design and implementation of real time control and management of mobile device using MDM(Mobile Device Management) solution. As a result, we can archive company security policy and individual using of smart phone and it is the optimal solution in the BYOD(Bring Your Own Device) era.

  • PDF