DocumentCode :
83934
Title :
Securing BYOD
Author :
Chang, J.M. ; Pao-Chung Ho ; Teng-Chang Chang
Author_Institution :
Iowa State Univ., Ames, IA, USA
Volume :
16
Issue :
5
fYear :
2014
fDate :
Sept.-Oct. 2014
Firstpage :
9
Lastpage :
11
Abstract :
Today´s IT departments are concerned with the popularity of BYOD, because mixing personal and enterprise data presents security threats to corporate proprietary information. IT departments must develop company security policies that let employees access sensitive resources using personal devices.
Keywords :
corporate modelling; security of data; BYOD; IT departments; bring your own device; company security policies; corporate proprietary information; personal devices; security threats; sensitive resources; Computer crime; Information technology; Internet; Malware; Mobile communication; Mobile handsets; Network security; Performance evaluation; Project management; BYOD; IT; Internet/Web technologies; cybercrime; information technology; mobile; project management; security;
fLanguage :
English
Journal_Title :
IT Professional
Publisher :
ieee
ISSN :
1520-9202
Type :
jour
DOI :
10.1109/MITP.2014.76
Filename :
6908957
Link To Document :
بازگشت