DocumentCode
83934
Title
Securing BYOD
Author
Chang, J.M. ; Pao-Chung Ho ; Teng-Chang Chang
Author_Institution
Iowa State Univ., Ames, IA, USA
Volume
16
Issue
5
fYear
2014
fDate
Sept.-Oct. 2014
Firstpage
9
Lastpage
11
Abstract
Today´s IT departments are concerned with the popularity of BYOD, because mixing personal and enterprise data presents security threats to corporate proprietary information. IT departments must develop company security policies that let employees access sensitive resources using personal devices.
Keywords
corporate modelling; security of data; BYOD; IT departments; bring your own device; company security policies; corporate proprietary information; personal devices; security threats; sensitive resources; Computer crime; Information technology; Internet; Malware; Mobile communication; Mobile handsets; Network security; Performance evaluation; Project management; BYOD; IT; Internet/Web technologies; cybercrime; information technology; mobile; project management; security;
fLanguage
English
Journal_Title
IT Professional
Publisher
ieee
ISSN
1520-9202
Type
jour
DOI
10.1109/MITP.2014.76
Filename
6908957
Link To Document