BYOD – Risks, Solutions and Guidelines
ثبت نشده
چکیده
منابع مشابه
Barrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure
The adoption of Bring Your Own Device (BYOD) – also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC) – is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009,...
متن کاملBring-Your-Own-Device (BYOD): An Evaluation of Associated Risks to Corporate Information Security
This study evaluates the cyber-risks to Business Information Assets posed by the adoption of Bring-YourOwn-Device (BYOD) to the workplace. BYOD is an emerging trend where employees bring and use personal computing devices on the company’s network to access applications and sensitive data like emails, calendar and scheduling applications, documents, etc. Employees are captivated by BYOD because ...
متن کاملAre You Ready to Lose Control? A Theory on the Role of Trust and Risk Perception on Bring-Your-Own-Device Policy and Information System Service Quality
IT consumerization or bring-your-own-device (BYOD) behavior, i.e., the use of private devices within organizational boundaries, is steadily increasing. Despite potential benefits, organizations are struggling to keep up with this development since a variety of risks, uncertainties, and potential costs are related to the use of private devices within the enterprise. Potential negative consequenc...
متن کاملThe Mobile Execution Environment: a Secure and Non- Intrusive Approach to Implement a Bring Your Own Device Policy for Laptops
Bring Your Own Device (BYOD) has become an established business practice, however the practice can increase an organisation’s information security risks. The implementation of a BYOD policy for laptops must consider how the information security risks can be mitigated or managed. The selection of an appropriate secure laptop software configuration is an important part of the information security...
متن کاملFactors Influencing Future Employees' Decision-Making to Participate in a BYOD Program: Does Risk Matter?
As people use mobile devices (smartphones, tablets, etc.) more and more in daily life, their desire grows to use the same devices at work. In response to this demand, many firms are considering to offer BYOD programs allowing their employees to bring their own devices to work and use them for business purposes. This study analyses how employees’ perceive the benefits and risk associated with BY...
متن کامل