Loading

Risk Analysis of BYOD in Afghanistan’s Organization
Islahuddin Jalal1, Hashmatullah Rasekh2, Qudrattullah Omerkhel3, Qamaruddin Shamsi4

1Islahuddin Jalal*, Lecturer, Department of Information Technology, Shaheed Rabbani Education University, Kabul, Afghanistan.
2Hashmatullah Rasekh, Student, Department of Information Technology, Bakhtar University, Kabul, Afghanistan.
3Qudratullah Omerkehl, Lecturer, Department of Information System, Shaheed Rabbani Education University, Kabul, Afghanistan.
4Qamaruddin Shamsi, Lecturer, Department of Information Technology, Shaheed Rabbani Education University, Kabul, Afghanistan. 

Manuscript received on August 01, 2020. | Revised Manuscript received on August 05, 2020. | Manuscript published on September 30, 2020. | PP: 691-698 | Volume-9 Issue-3, September 2020. | Retrieval Number: 100.1/ijrte.C4684099320 | DOI: 10.35940/ijrte.C4684.099320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Improving ICT management strategies is an ongoing need for almost all organizations. At the same time, the challenges that BYOD brings to the organization need to be carefully considered. BYOD terminology can refer to related concepts, technologies, and strategies that enable employees to use organizational resources. The use of different databases, applications, and personal devices such as smartphones, laptops, tablets, and any other mobile device such as memory chips and external hard drives can provide examples of these resources. The implementation of BYOD has brought a clear advantage to the organization. However, the use of BYOD in organizations can pose some risks and threats. The main purpose of this study was to analyze BYOD risks in Afghan organizations through cross-sectional quantitative research methods. An online survey of 24 questions was conducted on various aspects of BYOD risk from various organizations in Afghanistan. Through the use of raw data, survey results related to BYOD implementation in Afghanistan have been collected. Thus, the researchers found out that IT staffs have a low level of awareness of the risks and challenges of BYOD security and the latest technologies used by Afghan organizations. Finally, recommendations have been made.
Keywords: Risk Analysis, Bring Your Own Device (BYOD), Cyber Security, Information Security.