Bring-your-own device (BYOD) guidance: information security considerations and recommendations for Malaysian army in Peninsular Malaysia /

Bring Your Own Device (BYOD) is a new phenomenon in which employees connect their personal mobile devices to an enterprise network to gain access to corporate information and conduct daily business functions. The issues of BYOD and its security has received significant attention; thus, the research...

Full description

Saved in:
Bibliographic Details
Main Author: Fikri Hanis Md Badarudin (Author)
Format: Thesis Book
Language:English
Published: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2022
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/11361
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 04316nam a2200361 4500
008 230621s2022 my a f m 000 0 eng d
040 |a UIAM   |b eng   |e rda  
041 |a eng  
043 |a a-my--- 
100 |a Fikri Hanis Md Badarudin  |9 37065  |e author 
245 |a Bring-your-own device (BYOD) guidance: information security considerations and recommendations for Malaysian army in Peninsular Malaysia /  |c by Fikri Hanis bin Md Badarudin 
264 1 |a Kuala Lumpur :  |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,  |c 2022 
300 |a xv, 112 leaves :  |b color illustrations ;  |c 30 cm. 
336 |a text   |2 rdacontent 
337 |a unmediated   |2 rdamedia 
337 |a computer   |2 rdamedia 
338 |a volume   |2 rdacarrier 
338 |a online resource   |2 rdacarrier 
347 |a text file   |b PDF   |2 rdaft 
500 |a Abstracts in English and Arabic.  
500 |a "A dissertation submitted in fulfilment of the requirement for the degree of Master of Protective Security Management." --On title page.  
502 |a Thesis (MPSM)--International Islamic University Malaysia, 2022.  
504 |a Includes bibliographical references (leaves 72-75).  
520 |a Bring Your Own Device (BYOD) is a new phenomenon in which employees connect their personal mobile devices to an enterprise network to gain access to corporate information and conduct daily business functions. The issues of BYOD and its security has received significant attention; thus, the research is being conducted in order to investigate the use of application of the new and trendy devices which can contributes to as many information, knowledges and connections as the All-in-One concept with the whole countries in the world. Then, BYOD guidance: information security consideration is the title that has been chosen for the research upon all the need and relevancies of the security information and knowledges for the benefits of the country, Malaysia in the midst of sciences and technology era. And, the key words applied in the research such as devices, facilities, security, military forces, etc. The objective of this study is to identify the level of information security consideration on the practice of BYOD in the organization, then, to recognize factors that should be considered in ensuring organization’s information is secured while enabling the use of BYOD and to emphasize the security risks which can be related to the use of BYOD in organizations. The respondent will be 200 respondents among the military forces who work in Malaysian Army among personnel of the Markas Pemerintahan Medan Barat Tentera Darat (MK PMBTD). This study uses a quantitative and qualitative research method using SPSS 25.0 to get the data from the respondent. The findings of this study show that Information Security Consideration is moderately and significant with Successful BYOD Practice (r=0.606, p=0.000) and Security Measure Implemented (r=0.711, p=0.000) strongly and significant with Successful BYOD Practice. Then, the Security Risk showed strongly and significant (r=0.720, p=0.000) with Successful BYOD Practice. Then, the Beta coefficient is 0.569, which is the greatest satisfaction with Security Risk and this corresponds with the highest t-statistic of 8.036. The research provides good analytical guidance on the conceptual security maintenance framework for BYOD implementation by enhancing IT security management. The research demonstrated that it is possible to create appropriate IT security model in order to enhance BYOD security management. Hence, through this beneficial approach, it will become an effective way to determine the factors which influence efficiency and effectiveness of BYOD practice. 
655 0 |9 64  |a Theses, IIUM local 
690 |9 19519  |a Dissertations, Academic  |x Centre for IT Advancement (CITA)  |z IIUM 
700 0 |a Lili Marziana Abdullah   |e degree supervisor  |9 33564 
710 2 |9 169  |a International Islamic University Malaysia  |b Centre for IT Advancement (CITA) 
856 1 4 |u http://studentrepo.iium.edu.my/handle/123456789/11361 
900 |a sz to asbh 
942 |2 lcc  |n 0  |c THESIS 
999 |c 514435  |d 545852 
952 |0 0  |1 0  |2 lcc  |4 0  |7 5  |8 IIUMTHESIS  |9 1013141  |a IIUM  |b IIUM  |c THESIS  |d 2023-03-27  |e MGIFT  |p 11100456666  |r 2023-03-27  |w 2023-03-27  |y THESIS