King, Joshua M.2016-02-082016-02-082016-12https://hdl.handle.net/1794/1963348 pagesIncreasing numbers of employers permit employees to use personal devices to perform work-related tasks, posing security risks. This annotated bibliography includes literature that identifies best practices for analysis, design, and implementation of bring your own device (BYOD) policies. Research results impact CIOs/CTOs, security professionals, IT operations management, compliance and audit teams, and end users interested in BYOD.en-USCreative Commons BY-NC-ND 4.0-USBYODBring your own deviceBYOTBring your own technologyBYOD benefitsBYOD risks and disadvantagesBYOD risk mitigation strategiesSecurityMobile securityMobile computingIdentifying Best Practices for a BYOD PolicyTerminal Project