[图书][B] Device Management in the Security of “Bring Your Own Device”(BYOD) for the Post-pandemic, Remote Workplace

A Rah - 2023 - search.proquest.com
This study explored device management in the security of Bring Your Own Device (BYOD) in
the post-pandemic, remote workplace. It assessed the security of BYOD for employees …

[PDF][PDF] Cyber security risks of bring your own device (BYOD) practice in workplace and strategies to address the risks

B Ferdousi - International Journal of Science Academic Research, 2022 - scienceijsar.com
This paper provides an overview of the threats to cyber security of Bring Your Own Device
(BYOD) practice in the workplace and the strategies can be taken to mitigate those threats …

Bring-Your-Own-Device (BYOD): an evaluation of associated risks to corporate information security

EO Yeboah-Boateng, FE Boaten - arXiv preprint arXiv:1609.01821, 2016 - arxiv.org
This study evaluates the cyber-risks to Business Information Assets posed by the adoption of
Bring-Your-Own-Device (BYOD) to the workplace. BYOD is an emerging trend where …

BYOD security issues and controls framework: an outcome of a systematic literature review

TO Mayayise - International Journal of Information and …, 2023 - inderscienceonline.com
Various organisations and individuals consider the bring your own device (BYOD) practice
as a flexible method for remote working. However, as cybercrime continues to surge under …

BYOD security: A study of human dimensions

K Downer, M Bhattacharya - Informatics, 2022 - mdpi.com
The prevalence and maturity of Bring Your Own Device (BYOD) security along with
subsequent frameworks and security mechanisms in Australian organisations is a growing …

Compliance with Bring Your Own Device security policies in organizations: A systematic literature review

R Palanisamy, AA Norman, MLM Kiah - Computers & Security, 2020 - Elsevier
Abstract The omnipresence of Bring Your Own Device (BYOD) in organizations and
employees' lives makes it a challenge to ensure adherence to security policy. In such …

Mobile Device Management for the Use of Bring Your Own Device (BYOD) as Company Data Security during the Covid-19 Pandemic

YM Puspita, M Hasanudin - IJISTECH (International Journal of …, 2022 - ijistech.org
Since the end of 2019 a large outbreak has hit almost the entire world, namely the Covid-19
pandemic. COVID-19 has encouraged millions of employees to change their jobs from …

[PDF][PDF] An evaluation of BYOD integration cybersecurity concerns: A case study

D Njuguna, W Kanyi - Int. J. Recent Res. Math. Comput. Sci …, 2023 - paperpublications.org
Personal smartphones, tablets, and laptops have become increasingly popular in the
workplace, posing new security challenges in firms where they have been connected with …

BYOD security issues: A systematic literature review

M Ratchford, O El-Gayar, C Noteboom… - … Security Journal: A …, 2022 - Taylor & Francis
Organizations are exposed to new security risks when they allow employees' personal
mobile devices to access the network and the corporate data (a phenomenon called 'Bring …

THE NEED FOR BYOD SECURITY STRATEGY.

E Kadena, T Kovács - Military Engineer/Hadmérnök, 2017 - search.ebscohost.com
With the recent advancements in technology and the rapid adoption of smartphones, tablets
and laptops, it has become increasingly common for employees to use their own personal …