2022
DOI: 10.3390/app122412707
|View full text |Cite
|
Sign up to set email alerts
|

Factors Affecting Information Security and the Implementation of Bring Your Own Device (BYOD) Programmes in the Kingdom of Saudi Arabia (KSA)

Abstract: In recent years, desktop computer use has decreased while smartphone use has increased. This trend is also prevalent in the Middle East, particularly in the Kingdom of Saudi Arabia (KSA). Therefore, the Saudi government has prioritised overcoming the challenges that smartphone users face as smartphones are considered critical infrastructure. The high number of information security (InfoSec) breaches and concerns has prompted most government stakeholders to develop comprehensive policies and regulations that in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 52 publications
0
5
0
Order By: Relevance
“…Moreover, the assessment by Bahaddad, Almarhabi, and Alghamdi (2022) on the acceptance of Bring Your Own Device (BYOD) programs sheds light on the intricate balance between user convenience and information security. Utilizing the unified theory of acceptance and use of technology (UTAUT) model, the research highlights the nuanced challenges of ensuring secure technology adoption in healthcare, reinforcing the necessity for robust security measures in EMR systems [31].…”
Section: Privacy and Security Concernsmentioning
confidence: 99%
“…Moreover, the assessment by Bahaddad, Almarhabi, and Alghamdi (2022) on the acceptance of Bring Your Own Device (BYOD) programs sheds light on the intricate balance between user convenience and information security. Utilizing the unified theory of acceptance and use of technology (UTAUT) model, the research highlights the nuanced challenges of ensuring secure technology adoption in healthcare, reinforcing the necessity for robust security measures in EMR systems [31].…”
Section: Privacy and Security Concernsmentioning
confidence: 99%
“…It is also imperative that organizations implement security measures that will ensure data integrity, confidentiality, and availability. Also, the work of [7] examined the factors affecting information security and program implementation. Bring Your Own Device (BYOD) in the Kingdom of Saudi Arabia (KSA), where it used quantitative metrics to assess user acceptance of the Bring Your Own Device (BYOD) program and identified key factors affecting their adoption using the Technology Acceptance and Use Theory (UTAUT) model.…”
Section: Literature Reviewmentioning
confidence: 99%
“…About 75% of respondents indicated a vacuum in organizational requirements and mandates requiring the need to conduct security protocols and measures [3]. Although the BYOD model has multiple benefits, it remains sensitive to data privacy and confidentiality caused by cyber-attacks [8]. Consequently, commercial institutions must protect their digital systems from threat actors and related consequences.…”
Section: Related Workmentioning
confidence: 99%
“…One of the leading security risks is that BYOD does not consider the security of the downloaded data in employees' devices [7], making the policy vulnerable to attacks and data breaches. Given that the storage space of these devices has a mixture of personal information and sensitive data and documents stored during the employees' work on the system, such stored data might be vulnerable to many threats that endanger the safety of user data storage, such as physical and malware attacks [8]. Therefore, the need to secure the stored data on employees' devices becomes a critical issue, which is the focus of this paper.…”
Section: Introductionmentioning
confidence: 99%