A survey on design and application approaches in women-safety systems

K Ashok, AB Gurulakshmi, MB Prakash… - 2022 8th …, 2022 - ieeexplore.ieee.org
In the Modern World, women are no longer considered as the minor group. They share the
same power, privileges, rights, and opportunities as men. They have been excelled in many …

Enhancing mobile enterprise security: a blockchain and agent paradigm-based approach for continuous protection and rapid adaptation

R Khellaf, S Boudouda - IEEE Access, 2024 - ieeexplore.ieee.org
With the increasing use of mobiles in the workplace, companies need a strict yet flexible
security framework to balance risk and trust. This need has led to the expansion and rapid …

Information system audit for mobile device security assessment

NAA Othman, AA Norman… - 2021 3rd International …, 2021 - ieeexplore.ieee.org
The competency to use mobile devices for work-related tasks gives advantages to the
company productiveness and expedites business processes. Thus Bring Your Own Device …

Bring Your Own Device (BYOD) Information Security Risks: Case of Lesotho

MP Morolong, FB Shava… - … Conference on Cyber …, 2020 - books.google.com
Bring Your Own Device is the phenomenon that gained popularity since 2009 when CISCO
upon realising mobility of its employees adopted it. Also, IT consumerisation fuelled the …

Designing an email security awareness program for state-owned enterprises in namibia

MP Morolong, FB Shava, VG Shilongo - IOT with Smart Systems …, 2022 - Springer
Emails offer easy and timely communication enabling businesses to connect to their
stakeholders in real time. State-owned enterprises are no exception to this practice. Being a …

Is your android app insecure? patching security functions with dynamic policy based on a java reflection technique

SH Lee, SH Kim, JY Hwang, S Kim, SH Jin - IEEE Access, 2020 - ieeexplore.ieee.org
With the popularization of smart devices, companies are adopting bring-your-own-device or
mobile office policies that utilize personal smart devices for work. However, as work data are …