PEMILIHAN SOLUSI PENERAPAN BRING YOUR OWN DEVICE (BYOD) BERDASARKAN KONTROL KEAMANANNYA
نویسندگان
چکیده
منابع مشابه
BYOD: Bring Your Own Device
In this work, we examine the different types of user interactions and deployment issues surrounding large public displays. We then select and develop a usage paradigm in which people use personal devices to interact with large public displays. Lastly, we present a physical interface for interacting with large public displays based on camera-enabled mobile phones. Our interface uses both Visual ...
متن کاملBring Your Own Device (byod) Adoption
Bring Your Own Device (BYOD) policies permit employees to use personal devices to access organizational information. Users gain convenience from the ability to work in geographically diverse locations, while organizations gain the benefit of increased productivity and reduced information technology expense. However, these symbiotic benefits come at a cost. Organizations’ security boundaries are...
متن کاملTowards SDN-Defined Programmable BYOD (Bring Your Own Device) Security
An emerging trend in corporate network administration is BYOD (Bring Your Own Device). Although with many advantages, the paradigm shift presents new challenges in security to enterprise networks. While existing solutions such as Mobile Device Management (MDM) focus mainly on controlling and protecting device data, they fall short in providing a holistic network protection system. New innovatio...
متن کاملBring Your Own Device (BYOD): Current Status, Issues, and Future Directions
This panel discussion covers the current status, issues, and future direction of the use and adoption of Bring Your Own Device (BYOD). BYOD is widely used around the world. The invited panelists are five faculty members from the United States and Korea specializing in Information Systems. The covered topics include current use, real world cases, and adoption, pros and cons of BYOD adoption, iss...
متن کاملBring-Your-Own-Device (BYOD): An Evaluation of Associated Risks to Corporate Information Security
This study evaluates the cyber-risks to Business Information Assets posed by the adoption of Bring-YourOwn-Device (BYOD) to the workplace. BYOD is an emerging trend where employees bring and use personal computing devices on the company’s network to access applications and sensitive data like emails, calendar and scheduling applications, documents, etc. Employees are captivated by BYOD because ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jurnal Ilmiah Matrik
سال: 2019
ISSN: 2621-8089,1411-1624
DOI: 10.33557/jurnalmatrik.v21i3.724