Success model for BYOD implementation considering human and security perspectives in Malaysia government environment
Currently, the most benefits of BYOD implementation is to provide mobility and flexibility in workplaces with the use of compact mobile devices makes it stressfree to bring it everywhere. Although the concept is easy for the user, it introduces a new threat to the security of information technology....
Main Author: | Mat Akhir, Haslinda |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://eprints.utm.my/91945/1/HaslindaMatAkhirMRAZAK2017.pdf |
Similar Items
-
Understanding success factors of an information security management system plan phase self-implementation
by: Mohd. Yusoff, Rasimah Che, et al.
Published: (2015) -
Data governance and data stewardship: a success procedure
by: Wong, Doris Hooi Ten, et al.
Published: (2020) -
IoT security risk management model for secured practice in healthcare environment
by: Zakaria, H., et al.
Published: (2019) -
Task scheduling in cloud environment: optimization, security prioritization and processor selection schemes.
by: Hai, Tao, et al.
Published: (2023) -
Novel risk assessment method to identify information security threats in cloud computing environment
by: Samy, G. N., et al.
Published: (2019)