Identifying Best Practices for a BYOD Policy
dc.contributor.author | King, Joshua M. | |
dc.date.accessioned | 2016-02-08T22:31:05Z | |
dc.date.available | 2016-02-08T22:31:05Z | |
dc.date.issued | 2016-12 | |
dc.description | 48 pages | en_US |
dc.description.abstract | Increasing numbers of employers permit employees to use personal devices to perform work-related tasks, posing security risks. This annotated bibliography includes literature that identifies best practices for analysis, design, and implementation of bring your own device (BYOD) policies. Research results impact CIOs/CTOs, security professionals, IT operations management, compliance and audit teams, and end users interested in BYOD. | en_US |
dc.identifier.uri | https://hdl.handle.net/1794/19633 | |
dc.language.iso | en_US | en_US |
dc.publisher | University of Oregon | en_US |
dc.relation.ispartofseries | AIM Capstone;2016 | |
dc.rights | Creative Commons BY-NC-ND 4.0-US | en_US |
dc.subject | BYOD | en_US |
dc.subject | Bring your own device | en_US |
dc.subject | BYOT | en_US |
dc.subject | Bring your own technology | en_US |
dc.subject | BYOD benefits | en_US |
dc.subject | BYOD risks and disadvantages | en_US |
dc.subject | BYOD risk mitigation strategies | en_US |
dc.subject | Security | en_US |
dc.subject | Mobile security | en_US |
dc.subject | Mobile computing | en_US |
dc.title | Identifying Best Practices for a BYOD Policy | en_US |
dc.type | Terminal Project | en_US |