Bring-your-own device (BYOD) guidance: information security considerations and recommendations for Malaysian army in Peninsular Malaysia /
Bring Your Own Device (BYOD) is a new phenomenon in which employees connect their personal mobile devices to an enterprise network to gain access to corporate information and conduct daily business functions. The issues of BYOD and its security has received significant attention; thus, the research...
Saved in:
Main Author: | |
---|---|
Format: | Thesis Book |
Language: | English |
Published: |
Kuala Lumpur :
Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,
2022
|
Subjects: | |
Online Access: | http://studentrepo.iium.edu.my/handle/123456789/11361 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 04316nam a2200361 4500 | ||
---|---|---|---|
008 | 230621s2022 my a f m 000 0 eng d | ||
040 | |a UIAM |b eng |e rda | ||
041 | |a eng | ||
043 | |a a-my--- | ||
100 | |a Fikri Hanis Md Badarudin |9 37065 |e author | ||
245 | |a Bring-your-own device (BYOD) guidance: information security considerations and recommendations for Malaysian army in Peninsular Malaysia / |c by Fikri Hanis bin Md Badarudin | ||
264 | 1 | |a Kuala Lumpur : |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, |c 2022 | |
300 | |a xv, 112 leaves : |b color illustrations ; |c 30 cm. | ||
336 | |a text |2 rdacontent | ||
337 | |a unmediated |2 rdamedia | ||
337 | |a computer |2 rdamedia | ||
338 | |a volume |2 rdacarrier | ||
338 | |a online resource |2 rdacarrier | ||
347 | |a text file |b PDF |2 rdaft | ||
500 | |a Abstracts in English and Arabic. | ||
500 | |a "A dissertation submitted in fulfilment of the requirement for the degree of Master of Protective Security Management." --On title page. | ||
502 | |a Thesis (MPSM)--International Islamic University Malaysia, 2022. | ||
504 | |a Includes bibliographical references (leaves 72-75). | ||
520 | |a Bring Your Own Device (BYOD) is a new phenomenon in which employees connect their personal mobile devices to an enterprise network to gain access to corporate information and conduct daily business functions. The issues of BYOD and its security has received significant attention; thus, the research is being conducted in order to investigate the use of application of the new and trendy devices which can contributes to as many information, knowledges and connections as the All-in-One concept with the whole countries in the world. Then, BYOD guidance: information security consideration is the title that has been chosen for the research upon all the need and relevancies of the security information and knowledges for the benefits of the country, Malaysia in the midst of sciences and technology era. And, the key words applied in the research such as devices, facilities, security, military forces, etc. The objective of this study is to identify the level of information security consideration on the practice of BYOD in the organization, then, to recognize factors that should be considered in ensuring organization’s information is secured while enabling the use of BYOD and to emphasize the security risks which can be related to the use of BYOD in organizations. The respondent will be 200 respondents among the military forces who work in Malaysian Army among personnel of the Markas Pemerintahan Medan Barat Tentera Darat (MK PMBTD). This study uses a quantitative and qualitative research method using SPSS 25.0 to get the data from the respondent. The findings of this study show that Information Security Consideration is moderately and significant with Successful BYOD Practice (r=0.606, p=0.000) and Security Measure Implemented (r=0.711, p=0.000) strongly and significant with Successful BYOD Practice. Then, the Security Risk showed strongly and significant (r=0.720, p=0.000) with Successful BYOD Practice. Then, the Beta coefficient is 0.569, which is the greatest satisfaction with Security Risk and this corresponds with the highest t-statistic of 8.036. The research provides good analytical guidance on the conceptual security maintenance framework for BYOD implementation by enhancing IT security management. The research demonstrated that it is possible to create appropriate IT security model in order to enhance BYOD security management. Hence, through this beneficial approach, it will become an effective way to determine the factors which influence efficiency and effectiveness of BYOD practice. | ||
655 | 0 | |9 64 |a Theses, IIUM local | |
690 | |9 19519 |a Dissertations, Academic |x Centre for IT Advancement (CITA) |z IIUM | ||
700 | 0 | |a Lili Marziana Abdullah |e degree supervisor |9 33564 | |
710 | 2 | |9 169 |a International Islamic University Malaysia |b Centre for IT Advancement (CITA) | |
856 | 1 | 4 | |u http://studentrepo.iium.edu.my/handle/123456789/11361 |
900 | |a sz to asbh | ||
942 | |2 lcc |n 0 |c THESIS | ||
999 | |c 514435 |d 545852 | ||
952 | |0 0 |1 0 |2 lcc |4 0 |7 5 |8 IIUMTHESIS |9 1013141 |a IIUM |b IIUM |c THESIS |d 2023-03-27 |e MGIFT |p 11100456666 |r 2023-03-27 |w 2023-03-27 |y THESIS |