dc.contributor.author |
King, Joshua M. |
|
dc.date.accessioned |
2016-02-08T22:31:05Z |
|
dc.date.available |
2016-02-08T22:31:05Z |
|
dc.date.issued |
2016-12 |
|
dc.identifier.uri |
http://hdl.handle.net/1794/19633 |
|
dc.description |
48 pages |
en_US |
dc.description.abstract |
Increasing numbers of employers permit employees to use personal devices to perform work-related tasks, posing security risks. This annotated bibliography includes literature that identifies best practices for analysis, design, and implementation of bring your own device (BYOD) policies. Research results impact CIOs/CTOs, security professionals, IT operations management, compliance and audit teams, and end users interested in BYOD. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.publisher |
University of Oregon |
en_US |
dc.relation.ispartofseries |
AIM Capstone;2016 |
|
dc.rights |
Creative Commons BY-NC-ND 4.0-US |
en_US |
dc.subject |
BYOD |
en_US |
dc.subject |
Bring your own device |
en_US |
dc.subject |
BYOT |
en_US |
dc.subject |
Bring your own technology |
en_US |
dc.subject |
BYOD benefits |
en_US |
dc.subject |
BYOD risks and disadvantages |
en_US |
dc.subject |
BYOD risk mitigation strategies |
en_US |
dc.subject |
Security |
en_US |
dc.subject |
Mobile security |
en_US |
dc.subject |
Mobile computing |
en_US |
dc.title |
Identifying Best Practices for a BYOD Policy |
en_US |
dc.type |
Terminal Project |
en_US |