Capturing Policies for BYOD

نویسندگان

  • Joseph Hallett
  • David Aspinall
چکیده

BYOD policies are informally specified using natural language. We show how the SP4BYOD language can help reduce ambiguity in 5 BYOD policies and link the specification of a BYOD policy to its implementation. Using a formalisation of the 5 policies written in SP4BYOD, we make comparisons between them, and explore the delegation relationships within them. We identify that whilst policy acknowledgement is a key part of all 5 policies, this is not managed by existing MDM tools.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BYOD in Practice: A Comparison of Four BYOD Programs

The proliferation of internet-enabled mobile devices combined with vast availability of cloud computing services have created a growing trend known as ‘Bring-Your-Own-Device’ (BYOD), which refers to policies that allow employees to connect their personal mobile devices to corporate networks. Research finds that BYOD can increase productivity, job satisfaction, and mobility of employees. However...

متن کامل

Are You Ready to Lose Control? A Theory on the Role of Trust and Risk Perception on Bring-Your-Own-Device Policy and Information System Service Quality

IT consumerization or bring-your-own-device (BYOD) behavior, i.e., the use of private devices within organizational boundaries, is steadily increasing. Despite potential benefits, organizations are struggling to keep up with this development since a variety of risks, uncertainties, and potential costs are related to the use of private devices within the enterprise. Potential negative consequenc...

متن کامل

The "Bring your own device" conundrum for organizations and investigators: An examination of the policy and legal concerns in light of investigatory challenges

With the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to eliminate the need for two separate mobile devices fo...

متن کامل

Charting Your Organization's Bring-Your-Own-Device Voyage

Organizations are increasingly adopting bring-your-own-device (BYOD) policies. CIOs, however, remain concerned about the potential threats from personal devices and applications to the control and security of organizational IT assets. Based on in-depth case studies at Cisco, Wal-Mart and the Arkansas Department of Information Systems, the full article describes a four-wave model that describes ...

متن کامل

Towards a User-Friendly Security-Enhancing BYOD Solution

Bring Your Own Device (BYOD) is attracting considerable attention nowadays. In BYOD scenarios, enterprises wish to integrate their employees’ mobile devices in enterprise operations (e.g., reading emails, editing documents). This clearly raises serious security concerns since the mobile device in question is not under the control of the enterprise and is vulnerable to a wide range of security t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017