Journal article Open Access

Risk Analysis of BYOD in Afghanistan's Organization

Islahuddin Jalal; Hashmatullah Rasekh; Qudrattullah Omerkhel; Qamaruddin Shamsi


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Risk Analysis, Bring Your Own Device (BYOD), Cyber Security, Information Security.</subfield>
  </datafield>
  <controlfield tag="005">20220115134850.0</controlfield>
  <controlfield tag="001">5851893</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Student, Department of Information  Technology, Bakhtar University, Kabul, Afghanistan.</subfield>
    <subfield code="a">Hashmatullah Rasekh</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Lecturer, Department of Information System,  Shaheed Rabbani Education University, Kabul, Afghanistan..</subfield>
    <subfield code="a">Qudrattullah Omerkhel</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Lecturer, Department of Information Technology,  Shaheed Rabbani Education University, Kabul, Afghanistan.</subfield>
    <subfield code="a">Qamaruddin Shamsi</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">426555</subfield>
    <subfield code="z">md5:d3ec53db141051a5fda1c323120004c2</subfield>
    <subfield code="u">https://zenodo.org/record/5851893/files/C4684099320.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2020-09-30</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:5851893</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="c">691-698</subfield>
    <subfield code="n">3</subfield>
    <subfield code="p">International Journal of Recent Technology and Engineering (IJRTE)</subfield>
    <subfield code="v">9</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Lecturer, Department of Information Technology,  Shaheed Rabbani Education University, Kabul, Afghanistan.</subfield>
    <subfield code="a">Islahuddin Jalal</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Risk Analysis of BYOD in Afghanistan's  Organization</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">ISSN</subfield>
    <subfield code="0">(issn)2277-3878</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">Retrieval Number</subfield>
    <subfield code="0">(handle)100.1/ijrte.C4684099320</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;Improving ICT management strategies is an ongoing need for almost all organizations. At the same time, the challenges that BYOD brings to the organization need to be carefully considered. BYOD terminology can refer to related concepts, technologies, and strategies that enable employees to use organizational resources. The use of different databases, applications, and personal devices such as smartphones, laptops, tablets, and any other mobile device such as memory chips and external hard drives can provide examples of these resources. The implementation of BYOD has brought a clear advantage to the organization. However, the use of BYOD in organizations can pose some risks and threats. The main purpose of this study was to analyze BYOD risks in Afghan organizations through cross-sectional quantitative research methods. An online survey of 24 questions was conducted on various aspects of BYOD risk from various organizations in Afghanistan. Through the use of raw data, survey results related to BYOD implementation in Afghanistan have been collected. Thus, the researchers found out that IT staffs have a low level of awareness of the risks and challenges of BYOD security and the latest technologies used by Afghan organizations. Finally, recommendations have been made.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">issn</subfield>
    <subfield code="i">isCitedBy</subfield>
    <subfield code="a">2277-3878</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.35940/ijrte.C4684.099320</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
</record>
18
11
views
downloads
Views 18
Downloads 11
Data volume 4.7 MB
Unique views 12
Unique downloads 11

Share

Cite as