Emergent BYOD security challenges and mitigation strategy
AuthorDEDECHE, AHMED; Liu, Fenglin; LE, MICHELLE; Lajami, Saeed
PublisherUniversity of Melbourne
AffiliationEngineering - Computing and Information Systems
Document TypeWorking Paper
CitationsDedeche, A., Liu, F., Le, M., & Lajami, S. (2013). Emergent BYOD security challenges and mitigation strategy. Melbourne, The University of Melbourne.
Access StatusOpen Access
© 2013 The authors
There is limited research and literature on the topic of ‘Bring-your-own-device’ (BYOD) in organizations. BYOD is a new business trend where employees are using their own devices for work purposes. This phenomenon has introduced new security challenges to the business environment. Traditionally, organizational security risks have been addressed by adapting various established Information Security (IS) strategies. This research paper aims to identify how these strategies can be implemented by organizations to address the emergent BYOD risks.
KeywordsBYOD; security controls
- Click on "Export Reference in RIS Format" and choose "open with... Endnote".
- Click on "Export Reference in RIS Format". Login to Refworks, go to References => Import References