• Moh. Idris universitas Islam Indonesia
Keywords: BYOD, security control, access control, network access control, virtualization, cloud computing


Abstract :  The term BYOD (Bring Your Own Device) refers to the use of employees' personal devices (for example smartphones, tablets, laptops, netbooks) to do their work and manage corporate data from anywhere at any time. BYOD has been widely applied in the business world, hospitals, and education. With the ease that can be achieved by using BYOD, the security aspect is very important to consider. It starts with the security of the device to the security of company data that can be accessed by employees. Five dimensions of security control that must be considered in implementing BYOD: 1) data control; 2) access control; 3) network access control; 4) device management; 5) create a supporting framework. With the five BYOD implementation solutions presented in this study, there is only one solution that accommodates the five dimensions of BYOD security control, the use of Mobile Device Management (MDM) technology.


[1] G. Disterer and C. Kleiner, “BYOD bring your own device,” Procedia Technology, vol. 9, pp. 43-53, 2013.
[2] A. Györy, A. Cleven, F. Uebernickel, and W. Brenner, “Exploring the shadows: IT governance approaches to user-driven innovation,” ECIS 2012 Proceedings, pp. 222, 2012.
[3] M. Harris, K. Patten, E. Regan and J. Fjermesat, “Mobile and Connected Device Security Considerations: A Dilemma for Small and Medium Enterprise Business Mobility?,” Proc. of the 18th Americas Conference on Information Systems (AMCIS), pp. 1-7, 2012.
[4] G. Kulkarni, R. Shelke, R. Palwe, V. Solanke, S. Belsare, and S. Mohite, “Mobile cloud computing-bring your own device,” in 2014 Fourth International Conference on Communication Systems and Network Technologies, pp. 565-568, 2014.
[5] Osterman-Research, "Living With BYOD in Your Organization," 2014.
[6] A. Scarfo, “New security perspectives around BYOD,” in 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 446-451, 2012.
[7] B. Lebek, , K. Degirmenci and M. H. Breitner, “ Investigating the influence of security, privacy, and legal concerns on employees' intention to use BYOD mobile devices,” 2013.
[8] U. Vignesh and S. Asha, Modifying security policies towards BYOD,” Procedia Computer Science, vol. 50, pp. 511-516, 2015.
[9] Y. Song, and S. C. Kong, “Affordances and constraints of BYOD (Bring Your Own Device) for learning and teaching in higher education: Teachers’ perspectives,” The Internet and Higher Education, vol. 32 no. 1, pp. 39-46, 2017.
[10] P. N. Chou, C. C. Chang and C. H. Lin, “BYOD or not: A comparison of two assessment strategies for student learning,” Computers in Human Behavior, vol. 74, pp. 63-71, 2017.
[11] J. E. Moyer, “Managing mobile devices in hospitals: A literature review of BYOD policies and usage,” Journal of Hospital Librarianship, vol. 13 no. 3, pp. 197-208, 2013.
[12] N. Singh, “BYOD genie is out of the bottle–“Devil or angel”,” Journal of Business Management & Social Sciences Research, vol. 1 no. 3, pp. 1-12, 2012.
[13] T. Shumate, and M. Ketel, “Bring your own device: benefits, risks and control techniques,” in IEEE Southeastcon 2014, pp. 1-6, 2014.
[14] Y. Wang, J. Wei and K. Vangury, “Bring your own device security issues and challenges,” in 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 80-85, 2014.
[15] D. Peraković, S. Husnjak, V. Mišićand T. Kuljanić, “Employee’s awareness on security aspects of use bring your own device paradigm in Republic of Croatia,” in The 4th International Virtual Research Conference In Technical Disciplines (RCITD2016), 2016.
[16] R. Afreen, “Bring your own device (BYOD) in higher education: opportunities and challenges,” International Journal of Emerging Trends & Technology in Computer Science, vol. 3 no. 1, pp. 233-236, 2014.
[17] K. Madzima, M. Moyo and H. Abdullah, “Is bring your own device an institutional information security risk for small-scale business organisations?,” in 2014 Information Security for South Africa, pp. 1-8, 2014.
[18] S. Tanimoto, S. Yamada, M. Iwashita, T. Kobayashi, H. Sato A. Kanai, “Risk assessment of BYOD: Bring your own device,” in 2016 IEEE 5th Global Conference on Consumer Electronics, pp. 1-4, 2016.
[19] D. Nelson, “BYOD: An opportunity schools cannot afford to miss,” Internet@ schools, vol. 19 no. 5, pp. 12-15, 2012.
[20] G. J. Hwang and C. C. Tsai, “Research trends in mobile and ubiquitous learning: A review of publications in selected journals from 2001 to 2010,” British Journal of Educational Technology, vol. 42 no. 4, pp. E65-E70, 2011.
[21] M. Eslahi, M. V. Naseri, H. Hashim, N. N. Tahir, and E. H. M. Saad, “BYOD: Current state and security challenges,” in 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), pp. 189-192, 2014.
[22] A. B. Garba, J. Armarego, D. Murray and W. Kenworthy, “Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments,” Journal of Information privacy and security, vol. 11 no. 1, pp. 38-54, 2015
[23] D. Rivera, G. George, P. Peter, S. Muralidharan and S. Khanum, “Analysis of security controls for BYOD (bring your own device),” 2013.
[24] K. AlHarthy and W. Shawkat, “Implement network security control solutions in BYOD environment,” in 2013 IEEE International Conference on Control System, Computing and Engineering, pp. 7-11, 2013.
[25] B. Tokuyoshi, “The security implications of BYOD,” Network Security, vol. 4, pp. 12-13, 2013.
[26] T. A. Yang, R. Vlas, A. Yang and C. Vlas, “Risk management in the era of byod: the quintet of technology adoption, controls, liabilities, user perception, and user behavior,” in 2013 International Conference on Social Computing, pp. 411-416, 2015.
[27] E. B. Koh, J. Oh, and C. Im, "A study on security threats and dynamic access control technology for BYOD, smart-work environment," in Proceedings of the International MultiConference of Engineers and Computer Scientists, vol. 2, pp. 1-6, 2014.
[28] E. G. Amoroso, "From the enterprise perimeter to a mobility-enabled secure cloud," IEEE Security & Privacy, vol. 11 no. 1, pp. 23-31, 2013
How to Cite
Abstract viewed = 76 times
PDF : 76 times