Computing and Information Systems - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 2 of 2
  • Item
    Thumbnail Image
    Emergent BYOD security challenges and mitigation strategy
    DEDECHE, AHMED ; Liu, Fenglin ; LE, MICHELLE ; Lajami, Saeed (University of Melbourne, 2013)
    There is limited research and literature on the topic of ‘Bring-your-own-device’ (BYOD) in organizations. BYOD is a new business trend where employees are using their own devices for work purposes. This phenomenon has introduced new security challenges to the business environment. Traditionally, organizational security risks have been addressed by adapting various established Information Security (IS) strategies. This research paper aims to identify how these strategies can be implemented by organizations to address the emergent BYOD risks.
  • Item
    Thumbnail Image
    Analysis of security controls for BYOD (Bring Your Own Device)
    Rivera, David ; George, Geethu ; Peter, Prathap ; Muralidharan, Sahithya ; Khanum, Sumaya ( 2013)
    This paper researches on the impact of Bring Your Own Devices (BYOD) to Organizational security. It examines the principal threats and control mechanisms covered in academic and industry literatures. The paper also identifies key areas where organizations can implement security controls in order to reduce BYOD related security threats. An analysis of the key risks and how existing control mechanisms address them is also conducted.