Identifying Best Practices for a BYOD Policy

Loading...
Thumbnail Image

Date

2016-12

Authors

King, Joshua M.

Journal Title

Journal ISSN

Volume Title

Publisher

University of Oregon

Abstract

Increasing numbers of employers permit employees to use personal devices to perform work-related tasks, posing security risks. This annotated bibliography includes literature that identifies best practices for analysis, design, and implementation of bring your own device (BYOD) policies. Research results impact CIOs/CTOs, security professionals, IT operations management, compliance and audit teams, and end users interested in BYOD.

Description

48 pages

Keywords

BYOD, Bring your own device, BYOT, Bring your own technology, BYOD benefits, BYOD risks and disadvantages, BYOD risk mitigation strategies, Security, Mobile security, Mobile computing

Citation