A review of bring your own device on security issues
Mobile computing has supplanted internet computing because of the proliferation of cloud-based applications and mobile devices (such as smartphones, palmtops, and tablets). As a result of this, workers bring their mobile devices to the workplace and use them for enterprise work. The policy of allowi...
| Main Authors: | Olalere, Morufu, Abdullah, Mohd Taufik, Mahmod, Ramlan, Abdullah, Azizol |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SAGE Publications
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/43564/ http://psasir.upm.edu.my/id/eprint/43564/1/A%20Review%20of%20Bring%20Your%20Own%20Device%20on.pdf |
Similar Items
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016)
by: Morufu, Olalere
Published: (2016)
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018)
by: Jamal, Fara, et al.
Published: (2018)
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
Bring your own digital device in teacher education
by: Newhouse, C., et al.
Published: (2015)
by: Newhouse, C., et al.
Published: (2015)
'Bring Your Own Device': Considering potential risks to student health
by: Merga, Margaret
Published: (2015)
by: Merga, Margaret
Published: (2015)
A Bring-Your-Own-Device Framework over Software Defined Networking
by: Khoo, Wai Lung
Published: (2015)
by: Khoo, Wai Lung
Published: (2015)
The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation
by: Doargajudhur, M., et al.
Published: (2018)
by: Doargajudhur, M., et al.
Published: (2018)
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017)
by: Gooi, Hao Ming
Published: (2017)
Towards BYOD: examining Education student readiness for a policy of Bring Your Own Digital device at ECU
by: Pagram, J., et al.
Published: (2013)
by: Pagram, J., et al.
Published: (2013)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Individual – Organizational Bindpoints: A Design Theory for Bring-Your-Own-System
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Factors affecting acceptance of “Bring Your Own Device” (BYOD) policy at HeiTech Padu Berhad / Najuwa Aqilah Mohd Muslim
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
Bringing learning to your doorstep
by: The Star
Published: (2018)
by: The Star
Published: (2018)
Effectiveness of blended active learning framework using Bring Your Own Device Learning (BYODL), Project Based Learning (PPBL) and Gamification Learning (GL)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
Make your own disinfectant
by: Goh, Choon Fu, et al.
Published: (2020)
by: Goh, Choon Fu, et al.
Published: (2020)
Ignore It At Your Own Risk
by: New Straits Times,
Published: (2008)
by: New Straits Times,
Published: (2008)
Make your own natural fertilisers
by: Md Jaafar, Noraini
Published: (2023)
by: Md Jaafar, Noraini
Published: (2023)
Do good with your life and bring happiness to others
by: UMP, PNC
Published: (2020)
by: UMP, PNC
Published: (2020)
Security issues in 5G device to device communication
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
Build your own social-networking site
Published: (2008)
Published: (2008)
Cut Costs Plant Your Own Vegetables
by: Sunday Star, Rashvinjeet S.Bedia
Published: (2008)
by: Sunday Star, Rashvinjeet S.Bedia
Published: (2008)
Kick-start your own community garden
by: Arif Shah, Jasmin
Published: (2023)
by: Arif Shah, Jasmin
Published: (2023)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Vehicular ad hoc networks and security issues: survey
by: Abdulkader, Zaid A., et al.
Published: (2017)
by: Abdulkader, Zaid A., et al.
Published: (2017)
Avoid making your own disinfectant, warns researcher
by: Asrol, Awang
Published: (2020)
by: Asrol, Awang
Published: (2020)
Bringing Your A-Game to Digital Archaeology: Issues with Serious Games and Virtual Heritage and What We Can Do About It
by: Champion, Erik
Published: (2017)
by: Champion, Erik
Published: (2017)
Use Your Own Device (UYOD) guidelines as a mechanism to enable sustainable mobile learning in a higher education institution
by: Igbrude, Claudia
Published: (2018)
by: Igbrude, Claudia
Published: (2018)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
The health benefits and risks of growing-your-own produce in an urban environment
by: Stubberfield, Jonathan
Published: (2018)
by: Stubberfield, Jonathan
Published: (2018)
Psycho-geographical Choose Your Own Adventure: A city in the outermost west
by: Fyfe, A., et al.
Published: (2023)
by: Fyfe, A., et al.
Published: (2023)
Cancelable and hybrid biometric cryptosystems: current directions and open research issues
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
“Find One of Your Own Kind”: Auto-ethnography and my Aboriginal Women Ancestors
by: Dowling, Carol Susan
Published: (2017)
by: Dowling, Carol Susan
Published: (2017)
Formalization in digital forensic triage for identification of malicious IoT devices
by: Ibrahim, Mohammed, et al.
Published: (2019)
by: Ibrahim, Mohammed, et al.
Published: (2019)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Have your say over many issues
Published: (2008)
Published: (2008)
"You Can't Do It on Your Own": Experiences of a motivational interviewing intervention on physical activity and dietary behaviour
by: Hardcastle, S., et al.
Published: (2011)
by: Hardcastle, S., et al.
Published: (2011)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Similar Items
-
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016) -
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016) -
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018) -
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020) -
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)