Identifying Best Practices for a BYOD Policy

dc.contributor.authorKing, Joshua M.
dc.date.accessioned2016-02-08T22:31:05Z
dc.date.available2016-02-08T22:31:05Z
dc.date.issued2016-12
dc.description48 pagesen_US
dc.description.abstractIncreasing numbers of employers permit employees to use personal devices to perform work-related tasks, posing security risks. This annotated bibliography includes literature that identifies best practices for analysis, design, and implementation of bring your own device (BYOD) policies. Research results impact CIOs/CTOs, security professionals, IT operations management, compliance and audit teams, and end users interested in BYOD.en_US
dc.identifier.urihttps://hdl.handle.net/1794/19633
dc.language.isoen_USen_US
dc.publisherUniversity of Oregonen_US
dc.relation.ispartofseriesAIM Capstone;2016
dc.rightsCreative Commons BY-NC-ND 4.0-USen_US
dc.subjectBYODen_US
dc.subjectBring your own deviceen_US
dc.subjectBYOTen_US
dc.subjectBring your own technologyen_US
dc.subjectBYOD benefitsen_US
dc.subjectBYOD risks and disadvantagesen_US
dc.subjectBYOD risk mitigation strategiesen_US
dc.subjectSecurityen_US
dc.subjectMobile securityen_US
dc.subjectMobile computingen_US
dc.titleIdentifying Best Practices for a BYOD Policyen_US
dc.typeTerminal Projecten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
KingJ2015.pdf
Size:
583.86 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
2.23 KB
Format:
Item-specific license agreed upon to submission
Description: