نتایج جستجو برای: byod
تعداد نتایج: 233 فیلتر نتایج به سال:
in the wake of rapid growth in information technology, modern organizations seeking to increase the access and exchange data with minimal costs. byod is an emergent policy under which employees are allowed to use their personal devices such as smart phones, tablets and laptops to perform tasks. in this study, a model to prioritize the factors influencing the organizational adoption of byod is p...
Functionally interlinking datasets is essential for knowledge discovery. The ‘Bring Your Own Data’ workshop (BYOD) has proven an excellent tool for the adoption of techniques to achieve this. It provides a mechanism for data owners who would like to add value to their data by preparing them for data integration and computational analysis, but are unfamiliar with basic techniques to make data Fi...
Knowledge sharing drives innovation and the opportunity to develop a sustainable competitive advantage. However, in the extant knowledge management and information security literature, leakage from sharing activities is neglected. The risk of knowledge leakage is exacerbated with the pervasive use of mobile devices and the adoption of BYOD (Bring Your Own Device). Thus, this research-in-progres...
The adoption of Bring Your Own Device (BYOD) – also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC) – is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009,...
Bring Your Own Device (BYOD) policies permit employees to use personal devices to access organizational information. Users gain convenience from the ability to work in geographically diverse locations, while organizations gain the benefit of increased productivity and reduced information technology expense. However, these symbiotic benefits come at a cost. Organizations’ security boundaries are...
The number of devices connected within organisational networks through ”Bring Your Own Device” (BYOD) initiatives has steadily increased. BYOD security risks have resulted in significant privacy and issues impacting security. Many researchers reviewed policies. However, not all them fully investigated requirements. In addition to describing a system’s capabilities functions, these requirements ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید