Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
The BYOD Security Policy (BYOD-SP) constitutes formal documentation protecting sensitive data and information during BYOD implementation in an organization. The BYOD environment in an organization might face threats if information assets security is not prioritized before initializing BYOD. Releasin...
Published in: | Journal of Advanced Research in Applied Sciences and Engineering Technology |
---|---|
Main Author: | Halim I.I.A.; Buja A.G.; Idris M.S.S.; Mahat N.J. |
Format: | Article |
Language: | English |
Published: |
Semarak Ilmu Publishing
2024
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85177836886&doi=10.37934%2faraset.33.2.114&partnerID=40&md5=b3d212af01818311ffbf49f6efe86f5a |
Similar Items
-
Unravelling Challenges of Higher Education Institutions in Implementing Effective Micro-Credentials: A Multi-Stakeholder Qualitative Study
by: Halim F.S.A.; Luaran J.E.; Jill L.S.S.
Published: (2024) -
A security analysis of Iot encryption: Sidechannel cube attack on Simeck32/64
by: Buja A.G.; Abdul-Latip S.F.; Ahmad R.
Published: (2018) -
Child food security policy: The problems and challenges in the globalization era during covid-19 outbreak
by: Rodiyah R.; Arifin R.; Damayanti R.; Waspiah W.; Utari I.S.; Idris S.H.
Published: (2022) -
Into the Look: Security Issues, Crypto-Hygiene, and Future Direction of Blockchain and Cryptocurrency for Beginners in Malaysia
by: Buja A.G.; Katan M.; Nasrijal N.M.H.; Alwi S.F.S.; Siang T.G.
Published: (2022) -
Analysis of Higher Education Students’ Awareness in Indonesia on Personal Data Security in Social Media
by: Kurniawan Y.; Santoso S.I.; Wibowo R.R.; Anwar N.; Bhutkar G.; Halim E.
Published: (2023)