Javascript must be enabled to continue!
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
View through CrossRef
The BYOD Security Policy (BYOD-SP) constitutes formal documentation protecting sensitive data and information during BYOD implementation in an organization. The BYOD environment in an organization might face threats if information assets security is not prioritized before initializing BYOD. Releasing BYOD-SP is one of the key strategies to safeguard safety in BYOD implementation and to ensure users adhere to the BYOD-SP. It can also increase the understanding of ways to protect the BYOD environment from any risk. Hence, this study explores the current situation of BYOD, specifically in Malaysian tertiary education institutions, and the compulsory components that should be highlighted in the BYOD-SP. The implementation of (BYOD-SP) in Malaysian Institutions of Higher Learning (IHL) has led to a sense of discouragement, with only a few institutions being able to clearly outline their implementation strategy, in contrast to what has been done by foreign universities. This has resulted in a lack of information and understanding about the components of BYOD-SP in the Malaysian environment, making it difficult to make deeper comparisons. Understanding the current practice of BYOD can provide a more comprehensive study of a suitable model, cybersecurity framework, or other features to prepare a comprehensive BYOD-SP documentation on campus. As the BYOD implementation is underway, this study could increase awareness of all aspects of BYOD to aid organizations in formulating the BYOD-SP document. This could encourage BYOD players to achieve maximum information security protection.
Title: Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
Description:
The BYOD Security Policy (BYOD-SP) constitutes formal documentation protecting sensitive data and information during BYOD implementation in an organization.
The BYOD environment in an organization might face threats if information assets security is not prioritized before initializing BYOD.
Releasing BYOD-SP is one of the key strategies to safeguard safety in BYOD implementation and to ensure users adhere to the BYOD-SP.
It can also increase the understanding of ways to protect the BYOD environment from any risk.
Hence, this study explores the current situation of BYOD, specifically in Malaysian tertiary education institutions, and the compulsory components that should be highlighted in the BYOD-SP.
The implementation of (BYOD-SP) in Malaysian Institutions of Higher Learning (IHL) has led to a sense of discouragement, with only a few institutions being able to clearly outline their implementation strategy, in contrast to what has been done by foreign universities.
This has resulted in a lack of information and understanding about the components of BYOD-SP in the Malaysian environment, making it difficult to make deeper comparisons.
Understanding the current practice of BYOD can provide a more comprehensive study of a suitable model, cybersecurity framework, or other features to prepare a comprehensive BYOD-SP documentation on campus.
As the BYOD implementation is underway, this study could increase awareness of all aspects of BYOD to aid organizations in formulating the BYOD-SP document.
This could encourage BYOD players to achieve maximum information security protection.
Related Results
Factors influencing the adoption of the BYOD policy in teaching hospitals: A cross-sectional study from Southeastern Iran
Factors influencing the adoption of the BYOD policy in teaching hospitals: A cross-sectional study from Southeastern Iran
Introduction
Clinicians are increasingly using their devices for work at hospitals, a practice known as Bring-your-own-device (BYOD), to enhance productivity and mobility. This stu...
BYOD Systematic Literature review: A layered approach
BYOD Systematic Literature review: A layered approach
Introduction: Bring your own device (BYOD) is a paradigm where employees use personal devices for organizational related activities. Various benefits accrued by both employees and ...
Piece by piece: Collaborative mosaic-making for inclusive policy development
Piece by piece: Collaborative mosaic-making for inclusive policy development
This report sets out the findings from one of four projects commissioned by Wellcome Policy Lab to pilot creative approaches to policy development. In this project, Scientia Script...
Academic Achievement in BYOD Classrooms
Academic Achievement in BYOD Classrooms
Abstract
A product of the new STEM democracy is the development of indigenous high-technology capabilities.We maintain when effective mobile learning is incorpora...
Responsibilised Resilience? Reworking Neoliberal Social Policy Texts
Responsibilised Resilience? Reworking Neoliberal Social Policy Texts
Introduction This essay begins with the premise that resilience, broadly defined as positive adaptation despite adversity (Garmezy and Rutter), and resilience building are importa...
Enhancing Bring Your Own Device Security in Education
Enhancing Bring Your Own Device Security in Education
The acceptance and use of personal devices at educational institutions is on the rise, resulting in the education sector’s adoption of Bring Your Own Device (BYOD). The institution...
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
The pandemic Covid-19 currently demands teachers to be able to use technology in teaching and learning process. But in reality there are still many teachers who have not been able ...
Enhanced Bring your Own Device (BYOD) Environment Security based on Blockchain Technology
Enhanced Bring your Own Device (BYOD) Environment Security based on Blockchain Technology
BYOD is a practice by many organizations where employees can use their personal devices for work purpose. BYOD may bring a lot of advantages, but it also leads to security issues s...

