منابع مشابه
Towards a User-Friendly Security-Enhancing BYOD Solution
Bring Your Own Device (BYOD) is attracting considerable attention nowadays. In BYOD scenarios, enterprises wish to integrate their employees’ mobile devices in enterprise operations (e.g., reading emails, editing documents). This clearly raises serious security concerns since the mobile device in question is not under the control of the enterprise and is vulnerable to a wide range of security t...
متن کاملAndroid Security , Pitfalls , Lessons Learned and BYOD Technical report
Over the last two years Android became the most popular mobile operating system. But Android is also targeted by an over-proportional share of malware. In this paper we systematize the knowledge about the Android security mechanisms and formulate how the pitfalls can be avoided when building a mobile operating system. As smartphones enter the corporate domain, a new scheme called bring your own...
متن کاملTowards SDN-Defined Programmable BYOD (Bring Your Own Device) Security
An emerging trend in corporate network administration is BYOD (Bring Your Own Device). Although with many advantages, the paradigm shift presents new challenges in security to enterprise networks. While existing solutions such as Mobile Device Management (MDM) focus mainly on controlling and protecting device data, they fall short in providing a holistic network protection system. New innovatio...
متن کاملThe Need for BYOD Mobile Device Security Awareness and Training
In 2013, people will purchase 1.2 billion mobile devices, surpassing PC’s as the most common method for accessing the Internet. The leading two mobile device platforms, Android and iOS, both have security concerns surrounding their operating systems and application markets. The popularity of Bring Your Own Device (BYOD), where employees use their own devices for both personal and work situation...
متن کاملEmployees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory
The trend of bring your own device (BYOD) has been rapidly adopted by organizations. Despite the pros and cons of BYOD adoption, this trend is expected to inevitably keep increasing. Yet, BYOD has raised significant concerns about information system security as employees use their personal devices to access organizational resources. This study aims to examine employees' intention to comply with...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Security and Cryptography (Enigma)
سال: 2019
ISSN: 2595-5217
DOI: 10.17648/jisc.v5i1.70