DocumentCode :
83785
Title :
From BYOD to BYOA, Phishing, and Botnets
Author :
Earley, Seth ; Harmon, Robert ; Lee, Maria R. ; Mithas, Sunil
Author_Institution :
Earley & Associates
Volume :
16
Issue :
5
fYear :
2014
fDate :
Sept.-Oct. 2014
Firstpage :
16
Lastpage :
18
Abstract :
Not too long ago, desktop computers were provisioned for users, and applications were carefully vetted and controlled. Now, CIOs are dealing with laptops, smartphones, tablets, and a raft of new tools and technologies that present significant security, reliability, and IP protection challenges. Moreover, users have come to expect an information experience on par with that of their personal lives. Clearly, new policies must be enacted and new tools deployed to reduce risks and keep up with growing user expectations, but balancing accessibility and security has proven to be a significant challenge.
Keywords :
Computer applications; Consumer products; Internet; Project management; Special issues and sections; Web and internet services; IT; Internet/Web technologies; consumerization; information technology; networking; project management;
fLanguage :
English
Journal_Title :
IT Professional
Publisher :
ieee
ISSN :
1520-9202
Type :
jour
DOI :
10.1109/MITP.2014.69
Filename :
6908910
Link To Document :
بازگشت