A review of bring your own device on security issues
Mobile computing has supplanted internet computing because of the proliferation of cloud-based applications and mobile devices (such as smartphones, palmtops, and tablets). As a result of this, workers bring their mobile devices to the workplace and use them for enterprise work. The policy of allowi...
Main Authors: | Olalere, Morufu, Abdullah, Mohd Taufik, Mahmod, Ramlan, Abdullah, Azizol |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publications
2015
|
Online Access: | http://psasir.upm.edu.my/id/eprint/43564/1/A%20Review%20of%20Bring%20Your%20Own%20Device%20on.pdf |
Similar Items
-
A Review of Bring Your Own Device on Security Issues
by: Morufu Olalere, et al.
Published: (2015-04-01) -
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016) -
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016) -
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018) -
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)