DocumentCode
83785
Title
From BYOD to BYOA, Phishing, and Botnets
Author
Earley, Seth ; Harmon, Robert ; Lee, Maria R. ; Mithas, Sunil
Author_Institution
Earley & Associates
Volume
16
Issue
5
fYear
2014
fDate
Sept.-Oct. 2014
Firstpage
16
Lastpage
18
Abstract
Not too long ago, desktop computers were provisioned for users, and applications were carefully vetted and controlled. Now, CIOs are dealing with laptops, smartphones, tablets, and a raft of new tools and technologies that present significant security, reliability, and IP protection challenges. Moreover, users have come to expect an information experience on par with that of their personal lives. Clearly, new policies must be enacted and new tools deployed to reduce risks and keep up with growing user expectations, but balancing accessibility and security has proven to be a significant challenge.
Keywords
Computer applications; Consumer products; Internet; Project management; Special issues and sections; Web and internet services; IT; Internet/Web technologies; consumerization; information technology; networking; project management;
fLanguage
English
Journal_Title
IT Professional
Publisher
ieee
ISSN
1520-9202
Type
jour
DOI
10.1109/MITP.2014.69
Filename
6908910
Link To Document