• DocumentCode
    83785
  • Title

    From BYOD to BYOA, Phishing, and Botnets

  • Author

    Earley, Seth ; Harmon, Robert ; Lee, Maria R. ; Mithas, Sunil

  • Author_Institution
    Earley & Associates
  • Volume
    16
  • Issue
    5
  • fYear
    2014
  • fDate
    Sept.-Oct. 2014
  • Firstpage
    16
  • Lastpage
    18
  • Abstract
    Not too long ago, desktop computers were provisioned for users, and applications were carefully vetted and controlled. Now, CIOs are dealing with laptops, smartphones, tablets, and a raft of new tools and technologies that present significant security, reliability, and IP protection challenges. Moreover, users have come to expect an information experience on par with that of their personal lives. Clearly, new policies must be enacted and new tools deployed to reduce risks and keep up with growing user expectations, but balancing accessibility and security has proven to be a significant challenge.
  • Keywords
    Computer applications; Consumer products; Internet; Project management; Special issues and sections; Web and internet services; IT; Internet/Web technologies; consumerization; information technology; networking; project management;
  • fLanguage
    English
  • Journal_Title
    IT Professional
  • Publisher
    ieee
  • ISSN
    1520-9202
  • Type

    jour

  • DOI
    10.1109/MITP.2014.69
  • Filename
    6908910