Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 2
Abstract
The growing trend of BYOD in the higher education institutions creates a new form of student learning pedagogy in which students are able to use the mobile devices for their academic purposes in anywhere and anytime. Security threat in the paradigm of BYOD creates a great opportunity for hackers or attackers to find new attacks or vulnerabilities that could possibly exploit the students’ mobile devices and gains valuable data from them. A survey was conducted in learning the current awareness of security and privacy importance in BYOD for higher education in Malaysia. Based on the analysis of this survey, it demonstrates that the trend of BYOD in Malaysia has begun. Thoroughly, the survey results have been proven that the current basic fundamental security and privacy awareness and knowledge on mobile devices or applications is important in order to protect their mobile devices or data.
Authors and Affiliations
Manmeet Mahinderjit Singh, Chen Wai Chan, Zakiah Zulkefli
OJADEAC: An Ontology Based Access Control Model for JADE Platform
Java Agent Development Framework (JADE) is a software framework to make easy the development of Multi-Agent applications in compliance with the Foundation for Intelligent Physical Agents (FIPA) specifications. JADE propo...
New design of Robotics Remote lab
The Robotic Remote Laboratory (RRL) controls the Robot labs via the Internet and applies the Robot experiment in easy and advanced way. If we want to enhance the RRL system, we must study requirements of the Robot...
A Collaborative Process of Decision Making in the Business Context based on Online Questionnaires
This article is a component of a series of articles and scientific researches conducted by the research team which deals with the web 2.0 and its interactions with the different technology areas. During recent years, the...
Comprehensive Survey on Dynamic Graph Models
Most of the critical real-world networks are con-tinuously changing and evolving with time. Motivated by the growing importance and widespread impact of this type of networks, the dynamic nature of these networks have ga...
Combination of Neural Networks and Fuzzy Clustering Algorithm to Evalution Training Simulation-Based Training
With the advancement of computer technology, computer simulation in the field of education are more realistic and more effective. The definition of simulation is to create a virtual environment that accurately and real e...