Empowering Employees through BYOD: Benefits and Challenges in Malaysian Public Sector

  • Authors

    • Norhazilah binti Mahat
    • Nor’ashikin binti Ali
    2018-11-30
    https://doi.org/10.14419/ijet.v7i4.35.23077
  • BYOD, Public Sector, Benefit, Challenge
  • In today's world, the development of new technologies has transformed the way employees perform their tasks without the limit of time and place. Bring Your Own Device (BYOD) is a concept to enable employees to perform their tasks with the limitless infrastructure, which allows mobility and access to anyone, anywhere using their own devices. The growing trends of BYOD have many benefits including increased employees’ productivity, increased employee satisfaction, and reduced costs.  Despite the benefits, companies are also facing challenges such as security, loss and stolen of device and data, as well as malware attacks. One of the reasons for these challenges is that the BYOD policy is still not established and enforced in the public sector. Failure to create BYOD policy will have a negative impact on the organisation. However, issues and benefits are only anecdotes and they are not empirically studied in the public sector.  Therefore, this study aims to identify benefits and challenges in Malaysian Public Sectors (MPS). Through literature review, benefits and challenges were extracted to list out the construct by measuring the frequency of constructs appearing in the literature. For that purpose, the quantitative survey will be conducted.

  • References

    1. [1] CIO Council, “Bring Your Own Device - A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs,†2012.

      [2] K. W. Miller, J. Voas, and G. F. Hurlburt, “BYOD: Security and privacy considerations,†IT Professional, vol. 14, no. 5, pp. 53–55, 2012.

      [3] M. Olalere, M. T. Abdullah, R. Mahmod, and A. Abdullah, “A Review of Bring Your Own Device on Security Issues,†SAGE Open, pp. 1–11, 2015.

      [4] Z. Mitrovic, I. Veljkovic, G. Whyte, and K. Thompson, “Introducing BYOD in an organisation: the risk and customer services view points,†in The 1st Namibia Customer Service Awards & Conference, 2014, pp. 1–26.

      [5] A. Pillay, E. Nham, G. Tan, H. Diaki, S. Senanayake, and S. Deshpande, “Does BYOD increase risks or drive benefits?,†Dtl.Unimelb.Edu.Au, pp. 1–8, 2013.

      [6] U. M. Yabubu, “Cloud Computing and BYOD : Benefits and challenges in Modern Healthcare,†no. November 2013, p. 24, 2014.

      [7] I. Cook, “BYOD - Research Finding Released,†OVUM, 2012. [Online]. Available: http://cxounplugged.com/2012/11/ovum_byod_research-findings-released/. [Accessed: 23-Aug-2018].

      [8] Ovum, “BYOD: an emerging market trend in more ways than one,†Logicalis white paper, 2012. [Online]. Available: http://www.us.logicalis.com/globalassets/united-states/whitepapers/logicalisbyodwhitepaperovum.pdf. [Accessed: 22-Aug-2018].

      [9] R. Afreen, “Bring Your Own Device (BYOD) in Higher Education: Opportunities and Challenges,†Int. J. Emerg. Trends Technol. Comput. Sci., vol. 3, no. 1, pp. 233–236, 2014.

      [10] G. Cheng, Y. Guan, and J. Chau, “An Empirical Study towards Understanding User Acceptance of BYOD in Higher Education,†Australas. J. Educ. Technol., vol. 32, no. 4, pp. 1–17, 2016.

      [11] P. Chountalas and A. Karagiorgos, “Bring your own device philosophy from the user’s perspective: an empirical investigation,†in Proceedings of the 2nd HOBA International Conference, 2015, vol. 1, pp. 1–12.

      [12] N. Fani, R. von Solms, and M. Gerber, “A framework towards governing ‘Bring Your Own Device in SMMEs,’†in 2016 Information Security for South Africa (ISSA), 2016, pp. 1–8.

      [13] K. C. Janssen and S. Phillipson, “Are we ready for BYOD?: An analysis of the implementation and communication of BYOD programs in Victorian schools,†Aust. Educ. Comput., vol. 30, no. 2, 2015.

      [14] F. Onyechere Ugochukwu and M. Z. Ismail, “The Future of BYOD in Organizations and Higher Institution of Learning,†Int. Journals Accounting, Bus. Manag., vol. 1, no. 1, pp. 1–5, 2015.

      [15] V. Jayaseelan, N. Ganthan, M. Nurazean, M. Norziha, S. Bharanidharan, and M. Pritheega, “Adopting Factors of Bring Your Own Device ( BYOD ) at the Selected Private Higher Learning Institution in Malaysia,†J. Adv. Res. Soc. Behav. Sci. ISSN, vol. 2, no. 1, pp. 24–32, 2016.

      [16] M. A. Majid and Z. Mansor, “Pelaksanaan BYOD di Organisasi: Pemerhatian ke atas Penguatkuasaan Polisi BYOD,†in 3th International Conference on Information Technology & Society, 2017.

      [17] A. Hamza and M. F. Noordin, “BYOD usage by postgraduate students of International Islamic University Malaysia: An analysis,†Int. J. Eng. Sci. Invent., vol. 2, no. 4, pp. 14–20, 2013.

      [18] statcounter, “Desktop vs Mobile vs Tablet Market Share Worldwide,†statcounter, 2018. [Online]. Available: http://gs.statcounter.com/platform-market-share/desktop-mobile-tablet/malaysia/#monthly-201705-201804. [Accessed: 23-Aug-2018].

      [19] MAMPU, “Pelan Strategik Sektor Awam 2016-2020,†2016.

      [20] L. Zhang, M. Mouritsen, and J. Miller, “Role Of Perceived Value In Acceptance Of Bring Your Own Device (BYOD) Policy,†J. Organ. End User Comput., 2017.

      [21] P. Fiorenza, “Exploring Bring Your Own Device In The Public Sector,†2013. [Online]. Available: https://www.td.org/insights/exploring-bring-your-own-device-in-the-public-sector. [Accessed: 30-Mar-2018].

      [22] J. Harris, B. Ives, and I. Junglas, “IT Consumerization: When Gadgets Turn into Entreprise IT Tools,†MIS Q. Exec., vol. 11, no. 3, pp. 99–112, 2012.

      [23] S. Kabanda and I. Brown, “Bring-Your-Own-Device ( BYOD ) practices in SMEs in Developing Countries – The Case of Tanzania,†in 25th Australasian Conference on Information Systems (ACIS 2014), 2014, pp. 1–9.

      [24] V. Omwenga and H. Mwenemeru, “Towards the adoption of bring your own device concept in an organization,†Int. J. Soc. Sci. Entrep., vol. 1, no. 11, 2014.

      [25] T. Shumate and M. Ketel, “Bring Your Own Device: Benefits, risks and control techniques,†in IEEE SOUTHEASTCON 2014, 2014, pp. 1–6.

      [26] M. Gali, V. Barayuga, and W. Yu, “BYOD: Connectivity Option for Alaminos City Hall,†in International Conference on challenges in IT, Engineering and Technology (ICCIET’2014), 2014.

      [27] K. Madzima, M. Moyo, and H. Abdullah, “Is bring your own device an institutional information security risk for small-scale business organisations?,†in 2014 Information Security for South Africa - Proceedings of the ISSA 2014 Conference, 2014, pp. 1–8.

      [28] A. Gustav, “BYOD adoption concerns in the South African financial institution sector,†in International Conference on Information Resources Management(CONF_IRM) 2016, 2016, pp. 59.

      [29] Bell Techlogix, “The real benefits of BYOD,†2012.

      [30] D. Bakotić, “Relationship between job satisfaction and organisational performance,†Econ. Res. Istraživanja, vol. 29, no. 1, pp. 118–130, Jan. 2016.

      [31] F. Herzberg, B. Mausner, and B. B. Synderman, The motivation to work. New York, USA: John Wiley & Sons, Inc, 1959.

      [32] J. R. Hackman and G. R. Oldham, “Motivation through the design of work: test of a theory,†Organ. Behav. Hum. Perform., vol. 16, no. 2, pp. 250–279, Aug. 1976.

      [33] A. M. French, M. Schmidt, C. Guo, and J. P. Shim, “An Exploratory Study on BYOD in Class: Opportunities and Concerns,†in Twenty-first Americas Conference on Information Systems, Puerto Rico, 2015.

      [34] X. CCMI, “Research Shows Enterprises Continue to Control Employees’ Mobile Device Choice,†Business Wire, 2012. [Online]. Available: https://www.businesswire.com/news/home/20120717005172/en/Research-Shows-Enterprises-Continue-Control-Employees’-Mobile. [Accessed: 25-Jun-2018].

      [35] P. K. Gajar, A. Ghosh, and S. Rai, “Bring Your Own Device (Byod): Security Risks and Mitigating Strategies,†J. Glob. Res. Comput. Sci., vol. 4, no. 4, pp. 62–70, 2013.

      [36] E. O. Yeboah-Boateng and F. E. Boaten, “Bring-Your-Own-Device (BYOD): An Evaluation of Associated Risks to Corporate Information Security,†Int. J. IT Eng., vol. 04, no. 08, pp. 12–30, 2016.

      [37] G. Hinks, “Join the mobile revolution,†Financ. Manag., vol. 14, no. 7, pp. 30–32, 2012.

      [38] G. Abowd, C. Atkeson, J. Hong, S. Long, R. Kooper, and M. Pinkerton, “Cyberguide: A mobile context aware tour guide,†Wirel. Networks, vol. 3, no. 5, pp. 421–433, 1997.

      [39] H. van Der Heijden and P. Valiente, “The value of mobility for Business process performance: Evidence from Sweden and The Netherlands,†in ECIS, 2002, no. 2002, pp. 1144–1153.

      [40] F. Putri and A. Hovav, “Employees’ Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory,†ECIS, pp. 1–17, 2014.

      [41] K. H. Guo, Y. Yuan, N. P. Archer, and C. E. Connelly, “Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model,†J. Manag. Inf. Syst., vol. 28, no. 2, pp. 203–236, Oct. 2011.

      [42] Cognizant, “Making BYOD Work for Your Organization,†Futur. Work, pp. 1–16, 2012.

      [43] B. Giorgio, “What Is BYOD? Challenges and Opportunities,†2014. [Online]. Available: https://www.parallels.com/blogs/ras/what-is-byod/. [Accessed: 09-Jul-2018].

      [44] Quentin Fottrell, “Lost Phones Cost Americans $30 Billion a Year,†Market Watch, 2012. [Online]. Available: http://blogs.marketwatch.com/paydirt/2012/03/23/lost-phones-cost-americans-30-billion-a-year/. [Accessed: 22-Jul-2018].

      [45] H. Romer, “Best practices for BYOD security,†Comput. Fraud Secur., vol. 2014, no. 1, pp. 13–15, Jan. 2014.

      [46] Osterman Research, “Putting IT back in control of BYOD,†White Pap., no. June, pp. 1–10, 2012.

      [47] A. Weeger, X. Wang, and H. Gewald, “IT Consumerization: BYOD-Program Acceptance and its Impact on Employer Attractiveness,†J. Comput. Inf. Syst., vol. 56, no. 1, pp. 1–10, 2015.

  • Downloads

  • How to Cite

    Mahat, N. binti, & binti Ali, N. (2018). Empowering Employees through BYOD: Benefits and Challenges in Malaysian Public Sector. International Journal of Engineering & Technology, 7(4.35), 643-649. https://doi.org/10.14419/ijet.v7i4.35.23077