Emergent BYOD security challenges and mitigation strategy
Citations
Altmetric
Author
DEDECHE, AHMED; Liu, Fenglin; LE, MICHELLE; Lajami, SaeedDate
2013Publisher
University of MelbourneAffiliation
Engineering - Computing and Information SystemsMetadata
Show full item recordDocument Type
Working PaperCitations
Dedeche, A., Liu, F., Le, M., & Lajami, S. (2013). Emergent BYOD security challenges and mitigation strategy. Melbourne, The University of Melbourne.Access Status
Open AccessDescription
© 2013 The authors
Abstract
There is limited research and literature on the topic of ‘Bring-your-own-device’ (BYOD) in organizations. BYOD is a new business trend where employees are using their own devices for work purposes. This phenomenon has introduced new security challenges to the business environment. Traditionally, organizational security risks have been addressed by adapting various established Information Security (IS) strategies. This research paper aims to identify how these strategies can be implemented by organizations to address the emergent BYOD risks.
Keywords
BYOD; security controlsExport Reference in RIS Format
Endnote
- Click on "Export Reference in RIS Format" and choose "open with... Endnote".
Refworks
- Click on "Export Reference in RIS Format". Login to Refworks, go to References => Import References