نتایج جستجو برای: byod

تعداد نتایج: 233  

Journal: :مدیریت فناوری اطلاعات 0
خداکرم سلیمی فرد استادیار گروه مدیریت صنعتی، دانشکدۀ علوم انسانی، دانشگاه خلیج فارس، بوشهر، ایران عباس عباسی زاد دانشجوی کارشناسی ارشد مدیریت صنعتی، دانشکدۀ علوم انسانی، دانشگاه خلیج فارس، بوشهر، ایران رضا سیاوشی مربی گروه مدیریت صنعتی، دانشکدۀ علوم انسانی، دانشگاه خلیج فارس، بوشهر، ایران

in the wake of rapid growth in information technology, modern organizations seeking to increase the access and exchange data with minimal costs. byod is an emergent policy under which employees are allowed to use their personal devices such as smart phones, tablets and laptops to perform tasks. in this study, a model to prioritize the factors influencing the organizational adoption of byod is p...

2016
Mascha Jansen Claudio Carta Marco Roos Luiz Olavo Bonino da Silva Santos

Functionally interlinking datasets is essential for knowledge discovery. The ‘Bring Your Own Data’ workshop (BYOD) has proven an excellent tool for the adoption of techniques to achieve this. It provides a mechanism for data owners who would like to add value to their data by preparing them for data integration and computational analysis, but are unfamiliar with basic techniques to make data Fi...

Journal: :CoRR 2016
Carlos Andres Agudelo Rachelle Bosua Atif Ahmad Sean B. Maynard

Knowledge sharing drives innovation and the opportunity to develop a sustainable competitive advantage. However, in the extant knowledge management and information security literature, leakage from sharing activities is neglected. The risk of knowledge leakage is exacerbated with the pervasive use of mobile devices and the adoption of BYOD (Bring Your Own Device). Thus, this research-in-progres...

Journal: :CoRR 2017
Eric Tutu Tchao Richard Y. Ansah Seth D. Djane

The adoption of Bring Your Own Device (BYOD) – also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC) – is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009,...

2013
James Lee Robert E. Crossler

Bring Your Own Device (BYOD) policies permit employees to use personal devices to access organizational information. Users gain convenience from the ability to work in geographically diverse locations, while organizations gain the benefit of increased productivity and reduced information technology expense. However, these symbiotic benefits come at a cost. Organizations’ security boundaries are...

Journal: :Journal of Information Security and Cryptography (Enigma) 2019

Journal: :Applied sciences 2023

The number of devices connected within organisational networks through ”Bring Your Own Device” (BYOD) initiatives has steadily increased. BYOD security risks have resulted in significant privacy and issues impacting security. Many researchers reviewed policies. However, not all them fully investigated requirements. In addition to describing a system’s capabilities functions, these requirements ...

Journal: :Procedia Computer Science 2018

Journal: :Dydaktyka Informatyki 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید