Capturing Policies for BYOD
نویسندگان
چکیده
BYOD policies are informally specified using natural language. We show how the SP4BYOD language can help reduce ambiguity in 5 BYOD policies and link the specification of a BYOD policy to its implementation. Using a formalisation of the 5 policies written in SP4BYOD, we make comparisons between them, and explore the delegation relationships within them. We identify that whilst policy acknowledgement is a key part of all 5 policies, this is not managed by existing MDM tools.
منابع مشابه
BYOD in Practice: A Comparison of Four BYOD Programs
The proliferation of internet-enabled mobile devices combined with vast availability of cloud computing services have created a growing trend known as ‘Bring-Your-Own-Device’ (BYOD), which refers to policies that allow employees to connect their personal mobile devices to corporate networks. Research finds that BYOD can increase productivity, job satisfaction, and mobility of employees. However...
متن کاملAre You Ready to Lose Control? A Theory on the Role of Trust and Risk Perception on Bring-Your-Own-Device Policy and Information System Service Quality
IT consumerization or bring-your-own-device (BYOD) behavior, i.e., the use of private devices within organizational boundaries, is steadily increasing. Despite potential benefits, organizations are struggling to keep up with this development since a variety of risks, uncertainties, and potential costs are related to the use of private devices within the enterprise. Potential negative consequenc...
متن کاملThe "Bring your own device" conundrum for organizations and investigators: An examination of the policy and legal concerns in light of investigatory challenges
With the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to eliminate the need for two separate mobile devices fo...
متن کاملCharting Your Organization's Bring-Your-Own-Device Voyage
Organizations are increasingly adopting bring-your-own-device (BYOD) policies. CIOs, however, remain concerned about the potential threats from personal devices and applications to the control and security of organizational IT assets. Based on in-depth case studies at Cisco, Wal-Mart and the Arkansas Department of Information Systems, the full article describes a four-wave model that describes ...
متن کاملTowards a User-Friendly Security-Enhancing BYOD Solution
Bring Your Own Device (BYOD) is attracting considerable attention nowadays. In BYOD scenarios, enterprises wish to integrate their employees’ mobile devices in enterprise operations (e.g., reading emails, editing documents). This clearly raises serious security concerns since the mobile device in question is not under the control of the enterprise and is vulnerable to a wide range of security t...
متن کامل