Journal article Open Access

Risk Analysis of BYOD in Afghanistan's Organization

Islahuddin Jalal; Hashmatullah Rasekh; Qudrattullah Omerkhel; Qamaruddin Shamsi


DCAT Export

<?xml version='1.0' encoding='utf-8'?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#">
  <rdf:Description rdf:about="https://zenodo.org/record/5851893">
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5851893</dct:identifier>
    <foaf:page rdf:resource="https://zenodo.org/record/5851893"/>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Islahuddin Jalal</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Lecturer, Department of Information Technology, Shaheed Rabbani Education University, Kabul, Afghanistan.</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Hashmatullah Rasekh</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Student, Department of Information Technology, Bakhtar University, Kabul, Afghanistan.</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Qudrattullah Omerkhel</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Lecturer, Department of Information System, Shaheed Rabbani Education University, Kabul, Afghanistan..</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Qamaruddin Shamsi</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Lecturer, Department of Information Technology, Shaheed Rabbani Education University, Kabul, Afghanistan.</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:title>Risk Analysis of BYOD in Afghanistan's Organization</dct:title>
    <dct:publisher>
      <foaf:Agent>
        <foaf:name>Zenodo</foaf:name>
      </foaf:Agent>
    </dct:publisher>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2020</dct:issued>
    <dcat:keyword>Risk Analysis, Bring Your Own Device (BYOD), Cyber Security, Information Security.</dcat:keyword>
    <dct:subject>
      <skos:Concept>
        <skos:prefLabel>2277-3878</skos:prefLabel>
        <skos:inScheme>
          <skos:ConceptScheme>
            <dct:title>issn</dct:title>
          </skos:ConceptScheme>
        </skos:inScheme>
      </skos:Concept>
    </dct:subject>
    <dct:subject>
      <skos:Concept>
        <skos:prefLabel>100.1/ijrte.C4684099320</skos:prefLabel>
        <skos:inScheme>
          <skos:ConceptScheme>
            <dct:title>handle</dct:title>
          </skos:ConceptScheme>
        </skos:inScheme>
      </skos:Concept>
    </dct:subject>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2020-09-30</dct:issued>
    <dct:language rdf:resource="http://publications.europa.eu/resource/authority/language/ENG"/>
    <owl:sameAs rdf:resource="https://zenodo.org/record/5851893"/>
    <adms:identifier>
      <adms:Identifier>
        <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5851893</skos:notation>
        <adms:schemeAgency>url</adms:schemeAgency>
      </adms:Identifier>
    </adms:identifier>
    <dct:relation rdf:resource="http://issn.org/resource/ISSN/2277-3878"/>
    <owl:sameAs rdf:resource="https://doi.org/10.35940/ijrte.C4684.099320"/>
    <dct:description>&lt;p&gt;Improving ICT management strategies is an ongoing need for almost all organizations. At the same time, the challenges that BYOD brings to the organization need to be carefully considered. BYOD terminology can refer to related concepts, technologies, and strategies that enable employees to use organizational resources. The use of different databases, applications, and personal devices such as smartphones, laptops, tablets, and any other mobile device such as memory chips and external hard drives can provide examples of these resources. The implementation of BYOD has brought a clear advantage to the organization. However, the use of BYOD in organizations can pose some risks and threats. The main purpose of this study was to analyze BYOD risks in Afghan organizations through cross-sectional quantitative research methods. An online survey of 24 questions was conducted on various aspects of BYOD risk from various organizations in Afghanistan. Through the use of raw data, survey results related to BYOD implementation in Afghanistan have been collected. Thus, the researchers found out that IT staffs have a low level of awareness of the risks and challenges of BYOD security and the latest technologies used by Afghan organizations. Finally, recommendations have been made.&lt;/p&gt;</dct:description>
    <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/>
    <dct:accessRights>
      <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess">
        <rdfs:label>Open Access</rdfs:label>
      </dct:RightsStatement>
    </dct:accessRights>
    <dct:license rdf:resource="https://creativecommons.org/licenses/by/4.0/legalcode"/>
    <dcat:distribution>
      <dcat:Distribution>
        <dcat:accessURL rdf:resource="https://doi.org/10.35940/ijrte.C4684.099320"/>
        <dcat:byteSize>426555</dcat:byteSize>
        <dcat:downloadURL rdf:resource="https://zenodo.org/record/5851893/files/C4684099320.pdf"/>
        <dcat:mediaType>application/pdf</dcat:mediaType>
      </dcat:Distribution>
    </dcat:distribution>
  </rdf:Description>
</rdf:RDF>
18
11
views
downloads
Views 18
Downloads 11
Data volume 4.7 MB
Unique views 12
Unique downloads 11

Share

Cite as