Identifying Best Practices for a BYOD Policy
Loading...
Date
2016-12
Authors
King, Joshua M.
Journal Title
Journal ISSN
Volume Title
Publisher
University of Oregon
Abstract
Increasing numbers of employers permit employees to use personal devices to perform work-related tasks, posing security risks. This annotated bibliography includes literature that identifies best practices for analysis, design, and implementation of bring your own device (BYOD) policies. Research results impact CIOs/CTOs, security professionals, IT operations management, compliance and audit teams, and end users interested in BYOD.
Description
48 pages
Keywords
BYOD, Bring your own device, BYOT, Bring your own technology, BYOD benefits, BYOD risks and disadvantages, BYOD risk mitigation strategies, Security, Mobile security, Mobile computing