Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
The BYOD Security Policy (BYOD-SP) constitutes formal documentation protecting sensitive data and information during BYOD implementation in an organization. The BYOD environment in an organization might face threats if information assets security is not prioritized before initializing BYOD. Releasin...
Published in: | Journal of Advanced Research in Applied Sciences and Engineering Technology |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Published: |
Semarak Ilmu Publishing
2024
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85177836886&doi=10.37934%2faraset.33.2.114&partnerID=40&md5=b3d212af01818311ffbf49f6efe86f5a |
id |
2-s2.0-85177836886 |
---|---|
spelling |
2-s2.0-85177836886 Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J. Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview 2024 Journal of Advanced Research in Applied Sciences and Engineering Technology 33 2 10.37934/araset.33.2.114 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85177836886&doi=10.37934%2faraset.33.2.114&partnerID=40&md5=b3d212af01818311ffbf49f6efe86f5a The BYOD Security Policy (BYOD-SP) constitutes formal documentation protecting sensitive data and information during BYOD implementation in an organization. The BYOD environment in an organization might face threats if information assets security is not prioritized before initializing BYOD. Releasing BYOD-SP is one of the key strategies to safeguard safety in BYOD implementation and to ensure users adhere to the BYOD-SP. It can also increase the understanding of ways to protect the BYOD environment from any risk. Hence, this study explores the current situation of BYOD, specifically in Malaysian tertiary education institutions, and the compulsory components that should be highlighted in the BYOD-SP. The implementation of (BYOD-SP) in Malaysian Institutions of Higher Learning (IHL) has led to a sense of discouragement, with only a few institutions being able to clearly outline their implementation strategy, in contrast to what has been done by foreign universities. This has resulted in a lack of information and understanding about the components of BYOD-SP in the Malaysian environment, making it difficult to make deeper comparisons. Understanding the current practice of BYOD can provide a more comprehensive study of a suitable model, cybersecurity framework, or other features to prepare a comprehensive BYOD-SP documentation on campus. As the BYOD implementation is underway, this study could increase awareness of all aspects of BYOD to aid organizations in formulating the BYOD-SP document. This could encourage BYOD players to achieve maximum information security protection. © 2024, Semarak Ilmu Publishing. All rights reserved. Semarak Ilmu Publishing 24621943 English Article All Open Access; Hybrid Gold Open Access |
author |
Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J. |
spellingShingle |
Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J. Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview |
author_facet |
Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J. |
author_sort |
Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J. |
title |
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview |
title_short |
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview |
title_full |
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview |
title_fullStr |
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview |
title_full_unstemmed |
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview |
title_sort |
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview |
publishDate |
2024 |
container_title |
Journal of Advanced Research in Applied Sciences and Engineering Technology |
container_volume |
33 |
container_issue |
2 |
doi_str_mv |
10.37934/araset.33.2.114 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85177836886&doi=10.37934%2faraset.33.2.114&partnerID=40&md5=b3d212af01818311ffbf49f6efe86f5a |
description |
The BYOD Security Policy (BYOD-SP) constitutes formal documentation protecting sensitive data and information during BYOD implementation in an organization. The BYOD environment in an organization might face threats if information assets security is not prioritized before initializing BYOD. Releasing BYOD-SP is one of the key strategies to safeguard safety in BYOD implementation and to ensure users adhere to the BYOD-SP. It can also increase the understanding of ways to protect the BYOD environment from any risk. Hence, this study explores the current situation of BYOD, specifically in Malaysian tertiary education institutions, and the compulsory components that should be highlighted in the BYOD-SP. The implementation of (BYOD-SP) in Malaysian Institutions of Higher Learning (IHL) has led to a sense of discouragement, with only a few institutions being able to clearly outline their implementation strategy, in contrast to what has been done by foreign universities. This has resulted in a lack of information and understanding about the components of BYOD-SP in the Malaysian environment, making it difficult to make deeper comparisons. Understanding the current practice of BYOD can provide a more comprehensive study of a suitable model, cybersecurity framework, or other features to prepare a comprehensive BYOD-SP documentation on campus. As the BYOD implementation is underway, this study could increase awareness of all aspects of BYOD to aid organizations in formulating the BYOD-SP document. This could encourage BYOD players to achieve maximum information security protection. © 2024, Semarak Ilmu Publishing. All rights reserved. |
publisher |
Semarak Ilmu Publishing |
issn |
24621943 |
language |
English |
format |
Article |
accesstype |
All Open Access; Hybrid Gold Open Access |
record_format |
scopus |
collection |
Scopus |
_version_ |
1809677887092031488 |