Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview

The BYOD Security Policy (BYOD-SP) constitutes formal documentation protecting sensitive data and information during BYOD implementation in an organization. The BYOD environment in an organization might face threats if information assets security is not prioritized before initializing BYOD. Releasin...

Full description

Bibliographic Details
Published in:Journal of Advanced Research in Applied Sciences and Engineering Technology
Main Author: Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J.
Format: Article
Language:English
Published: Semarak Ilmu Publishing 2024
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85177836886&doi=10.37934%2faraset.33.2.114&partnerID=40&md5=b3d212af01818311ffbf49f6efe86f5a
id 2-s2.0-85177836886
spelling 2-s2.0-85177836886
Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J.
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
2024
Journal of Advanced Research in Applied Sciences and Engineering Technology
33
2
10.37934/araset.33.2.114
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85177836886&doi=10.37934%2faraset.33.2.114&partnerID=40&md5=b3d212af01818311ffbf49f6efe86f5a
The BYOD Security Policy (BYOD-SP) constitutes formal documentation protecting sensitive data and information during BYOD implementation in an organization. The BYOD environment in an organization might face threats if information assets security is not prioritized before initializing BYOD. Releasing BYOD-SP is one of the key strategies to safeguard safety in BYOD implementation and to ensure users adhere to the BYOD-SP. It can also increase the understanding of ways to protect the BYOD environment from any risk. Hence, this study explores the current situation of BYOD, specifically in Malaysian tertiary education institutions, and the compulsory components that should be highlighted in the BYOD-SP. The implementation of (BYOD-SP) in Malaysian Institutions of Higher Learning (IHL) has led to a sense of discouragement, with only a few institutions being able to clearly outline their implementation strategy, in contrast to what has been done by foreign universities. This has resulted in a lack of information and understanding about the components of BYOD-SP in the Malaysian environment, making it difficult to make deeper comparisons. Understanding the current practice of BYOD can provide a more comprehensive study of a suitable model, cybersecurity framework, or other features to prepare a comprehensive BYOD-SP documentation on campus. As the BYOD implementation is underway, this study could increase awareness of all aspects of BYOD to aid organizations in formulating the BYOD-SP document. This could encourage BYOD players to achieve maximum information security protection. © 2024, Semarak Ilmu Publishing. All rights reserved.
Semarak Ilmu Publishing
24621943
English
Article
All Open Access; Hybrid Gold Open Access
author Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J.
spellingShingle Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J.
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
author_facet Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J.
author_sort Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J.
title Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
title_short Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
title_full Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
title_fullStr Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
title_full_unstemmed Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
title_sort Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
publishDate 2024
container_title Journal of Advanced Research in Applied Sciences and Engineering Technology
container_volume 33
container_issue 2
doi_str_mv 10.37934/araset.33.2.114
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85177836886&doi=10.37934%2faraset.33.2.114&partnerID=40&md5=b3d212af01818311ffbf49f6efe86f5a
description The BYOD Security Policy (BYOD-SP) constitutes formal documentation protecting sensitive data and information during BYOD implementation in an organization. The BYOD environment in an organization might face threats if information assets security is not prioritized before initializing BYOD. Releasing BYOD-SP is one of the key strategies to safeguard safety in BYOD implementation and to ensure users adhere to the BYOD-SP. It can also increase the understanding of ways to protect the BYOD environment from any risk. Hence, this study explores the current situation of BYOD, specifically in Malaysian tertiary education institutions, and the compulsory components that should be highlighted in the BYOD-SP. The implementation of (BYOD-SP) in Malaysian Institutions of Higher Learning (IHL) has led to a sense of discouragement, with only a few institutions being able to clearly outline their implementation strategy, in contrast to what has been done by foreign universities. This has resulted in a lack of information and understanding about the components of BYOD-SP in the Malaysian environment, making it difficult to make deeper comparisons. Understanding the current practice of BYOD can provide a more comprehensive study of a suitable model, cybersecurity framework, or other features to prepare a comprehensive BYOD-SP documentation on campus. As the BYOD implementation is underway, this study could increase awareness of all aspects of BYOD to aid organizations in formulating the BYOD-SP document. This could encourage BYOD players to achieve maximum information security protection. © 2024, Semarak Ilmu Publishing. All rights reserved.
publisher Semarak Ilmu Publishing
issn 24621943
language English
format Article
accesstype All Open Access; Hybrid Gold Open Access
record_format scopus
collection Scopus
_version_ 1798286504534999040