Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data through their personal devices. Although the BYO...
Main Authors: | Manal Rajeh AlShalaan, Suliman Mohamed Fati |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-05-01
|
Series: | Information |
Subjects: | |
Online Access: | https://www.mdpi.com/2078-2489/14/5/275 |
Similar Items
-
Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions
by: Emmanuel A. Adeniyi, et al.
Published: (2022-09-01) -
Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography
by: Ghanima Sabr Shyaa, et al.
Published: (2023-06-01) -
Privacy-Preserving Biometrics Image Encryption and Digital Signature Technique Using Arnold and ElGamal
by: Ying Qin, et al.
Published: (2023-07-01) -
BYOD Security: A Study of Human Dimensions
by: Kathleen Downer, et al.
Published: (2022-02-01) -
EC-ElGamal and Genetic Algorithm-Based Enhancement for Lightweight Scalable Blockchain in IoT Domain
by: J. Guruprakash, et al.
Published: (2020-01-01)