University Library
  • Login
A gateway to Melbourne's research publications
Minerva Access is the University's Institutional Repository. It aims to collect, preserve, and showcase the intellectual output of staff and students of the University of Melbourne for a global audience.
View Item 
  • Minerva Access
  • Engineering and Information Technology
  • Computing and Information Systems
  • Computing and Information Systems - Research Publications
  • View Item
  • Minerva Access
  • Engineering and Information Technology
  • Computing and Information Systems
  • Computing and Information Systems - Research Publications
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

    Emergent BYOD security challenges and mitigation strategy

    Thumbnail
    Download
    Emergent BYOD security challenges and mitigation strategy (287.4Kb)

    Citations
    Altmetric
    Author
    DEDECHE, AHMED; Liu, Fenglin; LE, MICHELLE; Lajami, Saeed
    Date
    2013
    Publisher
    University of Melbourne
    University of Melbourne Author/s
    DEDECHE, AHMED; Liu, Fenglin
    Affiliation
    Engineering - Computing and Information Systems
    Metadata
    Show full item record
    Document Type
    Working Paper
    Citations
    Dedeche, A., Liu, F., Le, M., & Lajami, S. (2013). Emergent BYOD security challenges and mitigation strategy. Melbourne, The University of Melbourne.
    Access Status
    Open Access
    URI
    http://hdl.handle.net/11343/33340
    Description

    © 2013 The authors

    Abstract
    There is limited research and literature on the topic of ‘Bring-your-own-device’ (BYOD) in organizations. BYOD is a new business trend where employees are using their own devices for work purposes. This phenomenon has introduced new security challenges to the business environment. Traditionally, organizational security risks have been addressed by adapting various established Information Security (IS) strategies. This research paper aims to identify how these strategies can be implemented by organizations to address the emergent BYOD risks.
    Keywords
    BYOD; security controls

    Export Reference in RIS Format     

    Endnote

    • Click on "Export Reference in RIS Format" and choose "open with... Endnote".

    Refworks

    • Click on "Export Reference in RIS Format". Login to Refworks, go to References => Import References


    Collections
    • Computing and Information Systems - Research Publications [1565]
    Minerva AccessDepositing Your Work (for University of Melbourne Staff and Students)NewsFAQs

    BrowseCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects
    My AccountLoginRegister
    StatisticsMost Popular ItemsStatistics by CountryMost Popular Authors