Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 2
Abstract
The growing trend of BYOD in the higher education institutions creates a new form of student learning pedagogy in which students are able to use the mobile devices for their academic purposes in anywhere and anytime. Security threat in the paradigm of BYOD creates a great opportunity for hackers or attackers to find new attacks or vulnerabilities that could possibly exploit the students’ mobile devices and gains valuable data from them. A survey was conducted in learning the current awareness of security and privacy importance in BYOD for higher education in Malaysia. Based on the analysis of this survey, it demonstrates that the trend of BYOD in Malaysia has begun. Thoroughly, the survey results have been proven that the current basic fundamental security and privacy awareness and knowledge on mobile devices or applications is important in order to protect their mobile devices or data.
Authors and Affiliations
Manmeet Mahinderjit Singh, Chen Wai Chan, Zakiah Zulkefli
TCP- Costco Reno: New Variant by Improving Bandwidth Estimation to adapt over MANETs
The Transmission Control Protocol (TCP) is traditional, dominant and has been de facto standard protocol, used as transport agent at transport layer of TCP/IP protocol suite. Basically it is designed to provide reliabili...
Developing Communication Strategy for Multi-Agent Systems with Incremental Fuzzy Model
Communication can guarantee the coordinated behavior in the multi-agent systems. However, in many real-world problems, communication may not be available at every time because of limited bandwidth, noisy environment or c...
Design of an Efficient Steganography Model using Lifting based DWT and Modified-LSB Method on FPGA
The data transmission with information hiding is a challenging task in today world. To protect the secret data or image from attackers, the steganography techniques are essential. The steganography is a process of hiding...
Conditions Facilitating the Aversion of Unpopular Norms: An Agent-Based Simulation Study
People mostly facilitate and manage their social lives adhering to the prevalent norms. There are some norms which are unpopular, yet people adhere to them. Ironically, people at individual level do not agree to these no...
Fast–ICA for Mechanical Fault Detection and Identification in Electromechanical Systems for Wind Turbine Applications
Recently, the approaches based on source separation are increasingly adopted for the fault diagnosis in several industrial applications. In particular, Independent Component Analysis (ICA) method is attractive, thanks to...