BYOD and Governance of the Personal Cloud

نویسندگان

  • Stuart Dillon
  • Florian Stahl
  • Gottfried Vossen
چکیده

Cloud services are increasingly being used for a variety of purposes, including e-mail, social networking, music streaming, calendar management, file storage etc. In recent times the evolution of cloud services from private applications to corporate usage has been observed. This has led to the question of how private and business cloud services can be dual-accessed through a single device, in particular a mobile device that is used as part of a BYOD (Bring Your Own Device) policy. This paper considers the issues that arise from a consolidation of private and professional applications when accessed from a single device and introduces the term “personal cloud” to characterise such situations. It also presents an approach to cloud governance from a business perspective focusing in particular on security tokens, hardware keys and smart containers. BYOD and Governance of the Personal Cloud

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BYOD in Practice: A Comparison of Four BYOD Programs

The proliferation of internet-enabled mobile devices combined with vast availability of cloud computing services have created a growing trend known as ‘Bring-Your-Own-Device’ (BYOD), which refers to policies that allow employees to connect their personal mobile devices to corporate networks. Research finds that BYOD can increase productivity, job satisfaction, and mobility of employees. However...

متن کامل

Identification and Prioritization of Factors Contributing in Cloud Service Selection Using Fuzzy Best-worst Method (FBWM)

The introduction of cloud computing techniques revolutionized the current of information processing and storing. Cloud computing as a competitive edge provides easy and automated access to the vast ocean of resources through standard network mechanisms to businesses and organizations. Due to the vast diversity of service providers and their respective variety of available services with differen...

متن کامل

A framework towards governing "Bring Your Own Device in SMMEs"

Information is a critically important asset that has been used for decades within organizations. Like any asset, there are threats to the information that impact processes such as; email retrieval and access to organizational system services. As a consequence of the threats, attention to the security of the information is important. Technology is utilized to secure information and the cost affi...

متن کامل

Bring-Your-Own-Device (BYOD): An Evaluation of Associated Risks to Corporate Information Security

This study evaluates the cyber-risks to Business Information Assets posed by the adoption of Bring-YourOwn-Device (BYOD) to the workplace. BYOD is an emerging trend where employees bring and use personal computing devices on the company’s network to access applications and sensitive data like emails, calendar and scheduling applications, documents, etc. Employees are captivated by BYOD because ...

متن کامل

Feasibility of the "Bring Your Own Device" Model in Clinical Research: Results from a Randomized Controlled Pilot Study of a Mobile Patient Engagement Tool.

BACKGROUND Rising rates of smartphone ownership highlight opportunities for improved mobile application usage in clinical trials. While current methods call for device provisioning, the "bring your own device" (BYOD) model permits participants to use personal phones allowing for improved patient engagement and lowered operational costs. However, more evidence is needed to demonstrate the BYOD m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCAC

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2015