Bring Your Own Device: An overview of risk assessment

@article{Ogie2016BringYO,
  title={Bring Your Own Device: An overview of risk assessment},
  author={Robert Ogie},
  journal={IEEE Consumer Electronics Magazine},
  year={2016},
  volume={5},
  pages={114-119}
}
As organizations constantly strive to improve strategies for ICT management, one of the major challenges they must tackle is bring your own device (BYOD). BYOD is a term that collectively refers to the related technologies, concepts, and policies in which employees are allowed to access internal corporate IT resources, such as databases and applications, using their personal mobile devices like smartphones, laptop computers, and tablet PCs [1]. It is a side effect of the consumerization of IT… CONTINUE READING

From This Paper

Topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 36 references

A study on security threats and dynamic access control technology for BYOD, Smart-work environment

  • E. B. Koh, J. Oh, C. Im
  • Proc. Int. MultiConf., vol. II, Hong Kong, Mar…
  • 2014
Highly Influential
10 Excerpts

Security management of bring-your-owndevices

  • S. Gallotto, W. Chen
  • Proc. Int. Conf. Security and Management (SAM…
  • 2014
Highly Influential
6 Excerpts

Similar Papers

Loading similar papers…