Please use this identifier to cite or link to this item: http://dspace.uniten.edu.my/jspui/handle/123456789/15311
DC FieldValueLanguage
dc.contributor.authorIbrahim Mohammed Al-Harthyen_US
dc.contributor.authorFiza Abdul Rahimen_US
dc.contributor.authorNor'Ashikin Alien_US
dc.contributor.authorAmando P.en_US
dc.contributor.authorSingun Jr.en_US
dc.date.accessioned2020-09-07T09:11:51Z-
dc.date.available2020-09-07T09:11:51Z-
dc.date.issued2020-03-
dc.identifier.urihttp://dspace.uniten.edu.my/jspui/handle/123456789/15311-
dc.description.abstractBring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorized access to policy changes and information, leaking sensitive information to people, breach of organization data and privacy, access control, misuse, and even stolen devices. Privacy violations are of widely security breaches in business organizations when users are using their own personal devices. In this paper, it presents the appropriate theories and models to derive a set of validated determinants of protection intentions towards the protection behaviors of BYOD. The introduction of BYOD calls for a thorough investigation of whether or not such a practice poses vulnerabilities and threats to organizations.en_US
dc.language.isoenen_US
dc.subjectBYODen_US
dc.subjectProtection Behaviorsen_US
dc.titleTheoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviorsen_US
dc.typeConference Proceedingen_US
dc.relation.conference2019 First International Conference of Intelligent Computing and Engineering (ICOICE)en_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:UNITEN Scholarly Publication
Files in This Item:
File Description SizeFormat 
Theoretical Bases_Manuscript.pdf422.05 kBAdobe PDFView/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.