• DocumentCode
    83934
  • Title

    Securing BYOD

  • Author

    Chang, J.M. ; Pao-Chung Ho ; Teng-Chang Chang

  • Author_Institution
    Iowa State Univ., Ames, IA, USA
  • Volume
    16
  • Issue
    5
  • fYear
    2014
  • fDate
    Sept.-Oct. 2014
  • Firstpage
    9
  • Lastpage
    11
  • Abstract
    Today´s IT departments are concerned with the popularity of BYOD, because mixing personal and enterprise data presents security threats to corporate proprietary information. IT departments must develop company security policies that let employees access sensitive resources using personal devices.
  • Keywords
    corporate modelling; security of data; BYOD; IT departments; bring your own device; company security policies; corporate proprietary information; personal devices; security threats; sensitive resources; Computer crime; Information technology; Internet; Malware; Mobile communication; Mobile handsets; Network security; Performance evaluation; Project management; BYOD; IT; Internet/Web technologies; cybercrime; information technology; mobile; project management; security;
  • fLanguage
    English
  • Journal_Title
    IT Professional
  • Publisher
    ieee
  • ISSN
    1520-9202
  • Type

    jour

  • DOI
    10.1109/MITP.2014.76
  • Filename
    6908957