BYOD Security Policy Model: A Systematic Literature Review

Authors

  • Izzah Inani Abdul Halim Department of Computer Science, Faculty of Computer, Media and Technology Management, University College TATI, Teluk Kalong, 24000 Chukai, Terengganu, Malaysia
  • Alya Geogiana Buja Computing Science Studies, College of Computing Studies, Informatics and Mathematic, Universiti Teknologi MARA (UiTM) Melaka Branch, Jasin Campus, Kampung Seri Mendapat, 77300 Merlimau, Melaka, Malaysia
  • Jasni Mohamad Zain Institute of Big Data for Analytics and Artificial Intelligence, Universiti Teknologi MARA Shah Alam, 40450 Shah Alam, Selangor, Malaysia
  • Abdul Hafaz Ngah Faculty of Business, Economics and Social Development, Universiti Malaysia Terengganu, 21300 Kuala Terengganu, Terengganu, Malaysia
  • Rohit Bansal Department of Management Studies, Vaish College of Engineering, Rohtak Station Diary Mohalla, Rohtak, Haryana 124001, India

DOI:

https://doi.org/10.37934/araset.62.1.170186

Keywords:

Bring Your Own Device, BYOD, Security policy, Higher learning, Malaysia

Abstract

In education sector, Bring Your Own Device (BYOD) Security Policy (BYOD-SP) was established as earlier in 2015 in foreign universities with the purpose to safeguard campus’s network, system and confidential data and information. BYOD-SP is one of the strategic planning launched, aims to achieve maximum security for personally owned device through BYOD phenomenon. BYOD-SP acts as an official documentation that describes the detailed explanation of each component for the BYOD users to abide to all the components’ requirement in BYOD-SP. In BYOD practice in education field, BYOD-SP must meet the education agenda where BYOD-SP need to be tailored following education strategic plans and eliminate potential attacks that might cause the universities in loss if BYOD-SP is launched without having a robust model to refer of its components. Hence, it is crucial as this will welcome unauthorized parties to get access, gain and steal campus corporate data in BYOD environment. This study aims to identify what the necessary components that could assist top management and policy makers to formulate the comprehensive BYOD-SP in future and BYOD can be one of mobile computing that being accepted to be practiced in secured environment. Existing studies were executed in many research designs, where the review fulfilled the Preferred Reporting Items for Systematic reviews and MetaAnalyses (PRISMA) publishing standard. Two common online databases, World of Science (WOS) and Scopus were utilized to observe articles for this study purposes where a total of 16 articles published from 2013-2022 were reviewed to answer the formulated research questions on BYOD-SP. This review includes a topic based on the thematic analysis which is the components in drafting BYOD-SP documentation. The findings from this study proved four main components to be emphasized in tailoring BYOD-SP which are Device, Process, People and Jurisdiction/Law. The research’s findings here may drive the organization to have a reference model of BYOD-SP components and come out with the sturdy BYOD-SP to be adhered by all individuals in education premises. The top management in the organization need to involve in the procedures in each component of BYOD-SP to alleviate the case of security breach in BYOD activities.

Downloads

Download data is not yet available.

Author Biographies

Izzah Inani Abdul Halim, Department of Computer Science, Faculty of Computer, Media and Technology Management, University College TATI, Teluk Kalong, 24000 Chukai, Terengganu, Malaysia

izzahinani.ah@gmail.com

Alya Geogiana Buja, Computing Science Studies, College of Computing Studies, Informatics and Mathematic, Universiti Teknologi MARA (UiTM) Melaka Branch, Jasin Campus, Kampung Seri Mendapat, 77300 Merlimau, Melaka, Malaysia

geogiana@uitm.edu.my

Jasni Mohamad Zain, Institute of Big Data for Analytics and Artificial Intelligence, Universiti Teknologi MARA Shah Alam, 40450 Shah Alam, Selangor, Malaysia

jasni@fskm.uitm.edu.my

Abdul Hafaz Ngah, Faculty of Business, Economics and Social Development, Universiti Malaysia Terengganu, 21300 Kuala Terengganu, Terengganu, Malaysia

hafaz.ngah@umt.edu.my

Rohit Bansal, Department of Management Studies, Vaish College of Engineering, Rohtak Station Diary Mohalla, Rohtak, Haryana 124001, India

rohitbansal.mba@gmail.com

Downloads

Published

2024-10-14

How to Cite

Abdul Halim, I. I., Buja, A. G., Mohamad Zain, J., Ngah, A. H., & Bansal, R. (2024). BYOD Security Policy Model: A Systematic Literature Review. Journal of Advanced Research in Applied Sciences and Engineering Technology, 170–186. https://doi.org/10.37934/araset.62.1.170186

Issue

Section

Articles

Most read articles by the same author(s)