BYOD – Risks, Solutions and Guidelines

ثبت نشده
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Barrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure

The adoption of Bring Your Own Device (BYOD) – also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC) – is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009,...

متن کامل

Bring-Your-Own-Device (BYOD): An Evaluation of Associated Risks to Corporate Information Security

This study evaluates the cyber-risks to Business Information Assets posed by the adoption of Bring-YourOwn-Device (BYOD) to the workplace. BYOD is an emerging trend where employees bring and use personal computing devices on the company’s network to access applications and sensitive data like emails, calendar and scheduling applications, documents, etc. Employees are captivated by BYOD because ...

متن کامل

Are You Ready to Lose Control? A Theory on the Role of Trust and Risk Perception on Bring-Your-Own-Device Policy and Information System Service Quality

IT consumerization or bring-your-own-device (BYOD) behavior, i.e., the use of private devices within organizational boundaries, is steadily increasing. Despite potential benefits, organizations are struggling to keep up with this development since a variety of risks, uncertainties, and potential costs are related to the use of private devices within the enterprise. Potential negative consequenc...

متن کامل

The Mobile Execution Environment: a Secure and Non- Intrusive Approach to Implement a Bring Your Own Device Policy for Laptops

Bring Your Own Device (BYOD) has become an established business practice, however the practice can increase an organisation’s information security risks. The implementation of a BYOD policy for laptops must consider how the information security risks can be mitigated or managed. The selection of an appropriate secure laptop software configuration is an important part of the information security...

متن کامل

Factors Influencing Future Employees' Decision-Making to Participate in a BYOD Program: Does Risk Matter?

As people use mobile devices (smartphones, tablets, etc.) more and more in daily life, their desire grows to use the same devices at work. In response to this demand, many firms are considering to offer BYOD programs allowing their employees to bring their own devices to work and use them for business purposes. This study analyses how employees’ perceive the benefits and risk associated with BY...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016