Security attacks taxonomy on bring your own devices (BYOD) model
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenue...
| Main Authors: | Singh, Manmeet Mahinderjit, Soh, Sin Siang, Oh, Ying San, Malim, Nurul Hashimah Ahamed Hassain, Shariff, Azizul Rahman Mohd |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wireilla
2014
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/47317/ http://eprints.usm.my/47317/1/SECURITY_ATTACKS_TAXONOMY_ON_BRING_YOUR.pdf |
Similar Items
The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation
by: Doargajudhur, M., et al.
Published: (2018)
by: Doargajudhur, M., et al.
Published: (2018)
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018)
by: Jamal, Fara, et al.
Published: (2018)
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017)
by: Gooi, Hao Ming
Published: (2017)
Towards BYOD: examining Education student readiness for a policy of Bring Your Own Digital device at ECU
by: Pagram, J., et al.
Published: (2013)
by: Pagram, J., et al.
Published: (2013)
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016)
by: Morufu, Olalere
Published: (2016)
Factors affecting acceptance of “Bring Your Own Device” (BYOD) policy at HeiTech Padu Berhad / Najuwa Aqilah Mohd Muslim
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
A Bring-Your-Own-Device Framework over Software Defined Networking
by: Khoo, Wai Lung
Published: (2015)
by: Khoo, Wai Lung
Published: (2015)
Bring your own digital device in teacher education
by: Newhouse, C., et al.
Published: (2015)
by: Newhouse, C., et al.
Published: (2015)
Localizing user experience for mobile application: A case study among USM undergraduates
by: Fong, Jap Show, et al.
Published: (2015)
by: Fong, Jap Show, et al.
Published: (2015)
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015)
by: Olalere, Morufu, et al.
Published: (2015)
BYOD public system
by: Lee, Brenda Mun Yee
Published: (2015)
by: Lee, Brenda Mun Yee
Published: (2015)
'Bring Your Own Device': Considering potential risks to student health
by: Merga, Margaret
Published: (2015)
by: Merga, Margaret
Published: (2015)
Individual – Organizational Bindpoints: A Design Theory for Bring-Your-Own-System
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Extraction Of Defensin Antimicrobial Peptide From SWISS-PROT Database Using Extended Boyer-More Algorithm.
by: Ahamed Hassain Malim, N.H., et al.
Published: (2007)
by: Ahamed Hassain Malim, N.H., et al.
Published: (2007)
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
Bringing learning to your doorstep
by: The Star
Published: (2018)
by: The Star
Published: (2018)
Library advisor - an information management system on standard cell library
by: Lim, Wei Pin, et al.
Published: (2017)
by: Lim, Wei Pin, et al.
Published: (2017)
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Math E-Tutor: Towards A Better Self-Learning Environment.
by: Embong, Abdullah, et al.
Published: (2005)
by: Embong, Abdullah, et al.
Published: (2005)
iProt – A Data Warehouse For Protein Database.
by: Jaya, M.I., et al.
Published: (2007)
by: Jaya, M.I., et al.
Published: (2007)
Make your own disinfectant
by: Goh, Choon Fu, et al.
Published: (2020)
by: Goh, Choon Fu, et al.
Published: (2020)
Ignore It At Your Own Risk
by: New Straits Times,
Published: (2008)
by: New Straits Times,
Published: (2008)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
Readability of websites security privacy policies: A survey on text content and readers
by: Ali, Auwal Shehu, et al.
Published: (2020)
by: Ali, Auwal Shehu, et al.
Published: (2020)
Make your own natural fertilisers
by: Md Jaafar, Noraini
Published: (2023)
by: Md Jaafar, Noraini
Published: (2023)
Do good with your life and bring happiness to others
by: UMP, PNC
Published: (2020)
by: UMP, PNC
Published: (2020)
Impact of BYOD on organizational commitment: an empirical investigation
by: Doargajudhur, M., et al.
Published: (2018)
by: Doargajudhur, M., et al.
Published: (2018)
Build your own social-networking site
Published: (2008)
Published: (2008)
Cut Costs Plant Your Own Vegetables
by: Sunday Star, Rashvinjeet S.Bedia
Published: (2008)
by: Sunday Star, Rashvinjeet S.Bedia
Published: (2008)
Kick-start your own community garden
by: Arif Shah, Jasmin
Published: (2023)
by: Arif Shah, Jasmin
Published: (2023)
Effectiveness of blended active learning framework using Bring Your Own Device Learning (BYODL), Project Based Learning (PPBL) and Gamification Learning (GL)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
QR-map: BYOD indoor map directory service.
by: Ang, Jenn Ning
Published: (2013)
by: Ang, Jenn Ning
Published: (2013)
Avoid making your own disinfectant, warns researcher
by: Asrol, Awang
Published: (2020)
by: Asrol, Awang
Published: (2020)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Safeguarding your PC
Published: (2008)
Published: (2008)
A class of its own
by: Oxley, A.
Published: (2007)
by: Oxley, A.
Published: (2007)
A taxonomy and survey of semantic approaches for query expansion
by: Raza, Muhammad Ahsan, et al.
Published: (2019)
by: Raza, Muhammad Ahsan, et al.
Published: (2019)
Similar Items
-
The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation
by: Doargajudhur, M., et al.
Published: (2018) -
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020) -
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018) -
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017) -
Towards BYOD: examining Education student readiness for a policy of Bring Your Own Digital device at ECU
by: Pagram, J., et al.
Published: (2013)