Journal article Open Access
Islahuddin Jalal; Hashmatullah Rasekh; Qudrattullah Omerkhel; Qamaruddin Shamsi
<?xml version='1.0' encoding='utf-8'?> <resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd"> <identifier identifierType="URL">https://zenodo.org/record/5851893</identifier> <creators> <creator> <creatorName>Islahuddin Jalal</creatorName> <affiliation>Lecturer, Department of Information Technology, Shaheed Rabbani Education University, Kabul, Afghanistan.</affiliation> </creator> <creator> <creatorName>Hashmatullah Rasekh</creatorName> <affiliation>Student, Department of Information Technology, Bakhtar University, Kabul, Afghanistan.</affiliation> </creator> <creator> <creatorName>Qudrattullah Omerkhel</creatorName> <affiliation>Lecturer, Department of Information System, Shaheed Rabbani Education University, Kabul, Afghanistan..</affiliation> </creator> <creator> <creatorName>Qamaruddin Shamsi</creatorName> <affiliation>Lecturer, Department of Information Technology, Shaheed Rabbani Education University, Kabul, Afghanistan.</affiliation> </creator> </creators> <titles> <title>Risk Analysis of BYOD in Afghanistan's Organization</title> </titles> <publisher>Zenodo</publisher> <publicationYear>2020</publicationYear> <subjects> <subject>Risk Analysis, Bring Your Own Device (BYOD), Cyber Security, Information Security.</subject> <subject subjectScheme="issn">2277-3878</subject> <subject subjectScheme="handle">100.1/ijrte.C4684099320</subject> </subjects> <dates> <date dateType="Issued">2020-09-30</date> </dates> <language>en</language> <resourceType resourceTypeGeneral="JournalArticle"/> <alternateIdentifiers> <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/5851893</alternateIdentifier> </alternateIdentifiers> <relatedIdentifiers> <relatedIdentifier relatedIdentifierType="ISSN" relationType="IsCitedBy" resourceTypeGeneral="JournalArticle">2277-3878</relatedIdentifier> <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.35940/ijrte.C4684.099320</relatedIdentifier> </relatedIdentifiers> <rightsList> <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights> <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights> </rightsList> <descriptions> <description descriptionType="Abstract"><p>Improving ICT management strategies is an ongoing need for almost all organizations. At the same time, the challenges that BYOD brings to the organization need to be carefully considered. BYOD terminology can refer to related concepts, technologies, and strategies that enable employees to use organizational resources. The use of different databases, applications, and personal devices such as smartphones, laptops, tablets, and any other mobile device such as memory chips and external hard drives can provide examples of these resources. The implementation of BYOD has brought a clear advantage to the organization. However, the use of BYOD in organizations can pose some risks and threats. The main purpose of this study was to analyze BYOD risks in Afghan organizations through cross-sectional quantitative research methods. An online survey of 24 questions was conducted on various aspects of BYOD risk from various organizations in Afghanistan. Through the use of raw data, survey results related to BYOD implementation in Afghanistan have been collected. Thus, the researchers found out that IT staffs have a low level of awareness of the risks and challenges of BYOD security and the latest technologies used by Afghan organizations. Finally, recommendations have been made.</p></description> </descriptions> </resource>
Views | 18 |
Downloads | 11 |
Data volume | 4.7 MB |
Unique views | 12 |
Unique downloads | 11 |