Best Practices for Secure BYOD Implementations

dc.contributor.authorRice, Andrew L.
dc.date.accessioned2017-05-23T23:57:29Z
dc.date.available2017-05-23T23:57:29Z
dc.date.issued2016
dc.description58 pagesen_US
dc.description.abstractThe popularity of Bring Your Own Devices (BYOD) has increased dramatically over the last decade. BYOD bestows many benefits including increased productivity, flexibility, and employee satisfaction. However, BYOD also introduces new risks to the organization that must be understood and controlled. This annotated bibliography is comprised of literature published from 2012-2016 to help IT decision makers create policies and procedures to promote secure and flexible BYOD implementations.en_US
dc.identifier.urihttps://hdl.handle.net/1794/22340
dc.language.isoen_USen_US
dc.relation.ispartofseriesAIM Capstone;Rice2016
dc.rightsCreative Commons BY-NC-ND 4.0-USen_US
dc.subjectBring your own deviceen_US
dc.subjectBring your own device (BYOD)en_US
dc.subjectSecurityen_US
dc.subjectMobile device managementen_US
dc.subjectSmartphonesen_US
dc.titleBest Practices for Secure BYOD Implementationsen_US
dc.typeTerminal Projecten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Rice Week 7 FINAL.pdf
Size:
578.4 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.23 KB
Format:
Item-specific license agreed upon to submission
Description: