A proposal of system for device capability assessment in bring your own device (BYOD) environment of computer assisted personal interviewing

Main Article Content

Aditya Abdulmunaf Rosnah
Yunarso Anang


Statistics Indonesia, known in Indonesia as Badan Pusat Statistik (BPS), has conducted a series of trials to utilize Computer-Assisted Personal Interview (CAPI) in a census or survey. However, CAPI costs a lot of money to procure and maintain the device. Bring Your Own Device (BYOD) principle offers cost opportunity to device management. In the practice of BYOD in BPS, a device that has good performance is required, because some devices aren’t capable of running CAPI properly. Yet, in BPS there is no standard value to qualify mobile devices to be used in census or survey. Therefore, it is necessary to review what kind of device is suitable for using CAPI. This study utilized CAPI used in a student’s field study as a case study reference. Initially, researchers develop benchmark applications as a tool for feasibility. Furthermore, developed application is tested on a certain base device to calculate the scores to be used as the standard values.


Download data is not yet available.

Article Details

How to Cite
Rosnah, A. A., & Anang, Y. (2018). A proposal of system for device capability assessment in bring your own device (BYOD) environment of computer assisted personal interviewing. Communications in Science and Technology, 3(2), 71-76. https://doi.org/10.21924/cst.3.2.2018.91


P. J. Lavrakas, Encyclopedia of Survey Research Method. Thousand Oaks, Calif: SAGE Publications Inc., 2008.

A. Ghosh, P. K. Gajar and S. Rai, Bring Your Own Device (BYOD): Security Risks and Mitigating Strategies. J. Global Res. Comp. Sci. 4 (2013) 62-70.

S. Ravindran, R. Sadana and D. Baranwal, BYOD in the enterprise - A holistic approach, ISACA J. 1 (2013) 1-8.
R. Ogie, Bring your own device: an overview of risk assessment, IEEE Consumer Electron. Magaz. 5 (2016) 114-119.

P. J. Fleming and J. J. Wallace, How Not to Lie with Statistics: The Correct Way to Summarize Benchmark Results. Commun. ACM. 29 (1986) 218-221.

O. Kosheleva, Babylonian method of computing the square root: Justifications based on fuzzy techniques and on computational complexity, The 28th North American Fuzzy Information Processing Society Annual Conference, 2009.

D. H. Bailey, P. B. Borwein and S. Plouffe, On the rapid computation of various polylogarithmic constants, Math. Comput. 66 (1997) 903–913.

D. Miller, “A Java implementation of OpenBSD's Blowfish password hashing code.” Internet: https://github.com/jeremyh/jBCrypt, 2018.

M. Olalere, M. T. Abdullah, R. Mahmod, and A. Abdullah, A review of bring your own device on security issues. SAGE Open 8 (2015) 1-11.