Journal article Open Access

Risk Analysis of BYOD in Afghanistan's Organization

Islahuddin Jalal; Hashmatullah Rasekh; Qudrattullah Omerkhel; Qamaruddin Shamsi

DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="" xmlns="" xsi:schemaLocation="">
  <identifier identifierType="URL"></identifier>
      <creatorName>Islahuddin Jalal</creatorName>
      <affiliation>Lecturer, Department of Information Technology,  Shaheed Rabbani Education University, Kabul, Afghanistan.</affiliation>
      <creatorName>Hashmatullah Rasekh</creatorName>
      <affiliation>Student, Department of Information  Technology, Bakhtar University, Kabul, Afghanistan.</affiliation>
      <creatorName>Qudrattullah Omerkhel</creatorName>
      <affiliation>Lecturer, Department of Information System,  Shaheed Rabbani Education University, Kabul, Afghanistan..</affiliation>
      <creatorName>Qamaruddin Shamsi</creatorName>
      <affiliation>Lecturer, Department of Information Technology,  Shaheed Rabbani Education University, Kabul, Afghanistan.</affiliation>
    <title>Risk Analysis of BYOD in Afghanistan's  Organization</title>
    <subject>Risk Analysis, Bring Your Own Device (BYOD), Cyber Security, Information Security.</subject>
    <subject subjectScheme="issn">2277-3878</subject>
    <subject subjectScheme="handle">100.1/ijrte.C4684099320</subject>
    <date dateType="Issued">2020-09-30</date>
  <resourceType resourceTypeGeneral="JournalArticle"/>
    <alternateIdentifier alternateIdentifierType="url"></alternateIdentifier>
    <relatedIdentifier relatedIdentifierType="ISSN" relationType="IsCitedBy" resourceTypeGeneral="JournalArticle">2277-3878</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.35940/ijrte.C4684.099320</relatedIdentifier>
    <rights rightsURI="">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
    <description descriptionType="Abstract">&lt;p&gt;Improving ICT management strategies is an ongoing need for almost all organizations. At the same time, the challenges that BYOD brings to the organization need to be carefully considered. BYOD terminology can refer to related concepts, technologies, and strategies that enable employees to use organizational resources. The use of different databases, applications, and personal devices such as smartphones, laptops, tablets, and any other mobile device such as memory chips and external hard drives can provide examples of these resources. The implementation of BYOD has brought a clear advantage to the organization. However, the use of BYOD in organizations can pose some risks and threats. The main purpose of this study was to analyze BYOD risks in Afghan organizations through cross-sectional quantitative research methods. An online survey of 24 questions was conducted on various aspects of BYOD risk from various organizations in Afghanistan. Through the use of raw data, survey results related to BYOD implementation in Afghanistan have been collected. Thus, the researchers found out that IT staffs have a low level of awareness of the risks and challenges of BYOD security and the latest technologies used by Afghan organizations. Finally, recommendations have been made.&lt;/p&gt;</description>
Views 18
Downloads 11
Data volume 4.7 MB
Unique views 12
Unique downloads 11


Cite as