A proposal of system for device capability assessment in bring your own device (BYOD) environment of computer assisted personal interviewing
Main Article Content
Abstract
Statistics Indonesia, known in Indonesia as Badan Pusat Statistik (BPS), has conducted a series of trials to utilize Computer-Assisted Personal Interview (CAPI) in a census or survey. However, CAPI costs a lot of money to procure and maintain the device. Bring Your Own Device (BYOD) principle offers cost opportunity to device management. In the practice of BYOD in BPS, a device that has good performance is required, because some devices aren’t capable of running CAPI properly. Yet, in BPS there is no standard value to qualify mobile devices to be used in census or survey. Therefore, it is necessary to review what kind of device is suitable for using CAPI. This study utilized CAPI used in a student’s field study as a case study reference. Initially, researchers develop benchmark applications as a tool for feasibility. Furthermore, developed application is tested on a certain base device to calculate the scores to be used as the standard values.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright
Open Access authors retain the copyrights of their papers, and all open access articles are distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided that the original work is properly cited.
The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.
While the advice and information in this journal are believed to be true and accurate on the date of its going to press, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
A. Ghosh, P. K. Gajar and S. Rai, Bring Your Own Device (BYOD): Security Risks and Mitigating Strategies. J. Global Res. Comp. Sci. 4 (2013) 62-70.
S. Ravindran, R. Sadana and D. Baranwal, BYOD in the enterprise - A holistic approach, ISACA J. 1 (2013) 1-8.
R. Ogie, Bring your own device: an overview of risk assessment, IEEE Consumer Electron. Magaz. 5 (2016) 114-119.
P. J. Fleming and J. J. Wallace, How Not to Lie with Statistics: The Correct Way to Summarize Benchmark Results. Commun. ACM. 29 (1986) 218-221.
O. Kosheleva, Babylonian method of computing the square root: Justifications based on fuzzy techniques and on computational complexity, The 28th North American Fuzzy Information Processing Society Annual Conference, 2009.
D. H. Bailey, P. B. Borwein and S. Plouffe, On the rapid computation of various polylogarithmic constants, Math. Comput. 66 (1997) 903–913.
D. Miller, “A Java implementation of OpenBSD's Blowfish password hashing code.” Internet: https://github.com/jeremyh/jBCrypt, 2018.
M. Olalere, M. T. Abdullah, R. Mahmod, and A. Abdullah, A review of bring your own device on security issues. SAGE Open 8 (2015) 1-11.