Optimizing Security Compliance in Bring Your Own Device (BYOD) Through a Hybrid Approach
- DOI
- 10.2991/978-94-6463-589-8_46How to use a DOI?
- Keywords
- Bring Your Own Device; Security Compliance; PMT Model; PPT Model
- Abstract
Bring Your Own Device (BYOD) is a work environment that allows employees to use their devices to access the organization's resources to complete their tasks. However, BYOD has raised some security concerns because it presents organizations with more significant challenges in protecting their data assets. As a result, a well-managed BYOD policy and guidelines should be established and enforced in Malaysia, particularly in the public sector. Hence, the purpose of this study is to identify the risk of information security in BYOD faced in the Malaysian Public Sector (MPS) due to non-compliance behaviour of security policy. After that, this study proposed countermeasure strategies for handling the identified risks. In this research study examined the elements that impact employees’ willingness to comply with the BYOD security policy based on Protection Motivation Theory (PMT). The process of reviewing current and past research on information security is carried out. A mixed-method research approach has been applied in this study, with the main data collection method including interviews, document analysis, and surveys. A specific group, which consists of 21 respondents from the Malaysian public sector, has participated in the survey. It is expected that organizations in MPS are more prepared to establish the BYOD security policy by studying employees’ behaviour in complying with BYOD security policy requirements.
- Copyright
- © 2024 The Author(s)
- Open Access
- Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
Cite this article
TY - CONF AU - Norkhushaini Awang AU - Noor Sabariah Salleh AU - Nurul Huda Nik Zulkipli AU - Omar Zakaria PY - 2024 DA - 2024/12/01 TI - Optimizing Security Compliance in Bring Your Own Device (BYOD) Through a Hybrid Approach BT - Proceedings of the International Conference on Innovation & Entrepreneurship in Computing, Engineering & Science Education (InvENT 2024) PB - Atlantis Press SP - 498 EP - 508 SN - 2352-538X UR - https://doi.org/10.2991/978-94-6463-589-8_46 DO - 10.2991/978-94-6463-589-8_46 ID - Awang2024 ER -