Author:
Blancaflor Eric B.,Hernandez Joel R.
Publisher
Springer Nature Switzerland
Reference14 articles.
1. Alotaibi, B., Almagwashi, H.: A Review of BYOD Security Challenges, Solutions and Policy Best Practices. 23 August 2018 INSPEC Accession Number:18043305 (2018). https://doi.org/10.1109/CAIS.2018.8441967
2. Oktavia, T., Yanti, H.P., Meyliana: Security and Privacy Challenge in Bring Your Own Device Environment: A Systematic Literature Review. 18 May 2017 NSPEC Accession Number: 16885652 (2016) https://doi.org/10.1109/ICIMTech.2016.7930328
3. Tu, C.Z., Adkins, J., Zhao, G.Yu.: Complying with BYOD security policies: a moderation model based on protection motivation theory. J. Midwest Assoc. Inf. Syst. (JMWAIS), 2019(1), Article 2 (2019). https://aisel.aisnet.org/jmwais/vol2019/iss1/2
4. Cohen. 2020 Windows Computers Were Targets of 83% of All Malware Attacks in Q1 (2020). https://www.pcmag.com/news/windows-computers-account-for-83-of-all-malware-attacks-in-q1-2020
5. Casati, L., Visconti, A.: The Dangers of Rooting Data Leakage Detection in Android Applications. Volume 2018, Article ID 6020461, 9 p. (2017). https://doi.org/10.1155/2018/6020461
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献