1. Security issues with mobile IT: a narrative review of Bring Your Own Device (BYOD);Aguboshim;J. Inf. Eng. Appl.,2019
2. Strategies to mitigate knowledge leakage risk caused by the use of mobile devices: a preliminary study;Agudelo-Serna,2017
3. Understanding knowledge leakage & BYOD (Bring Your Own Device): a mobile worker perspective;Agudelo,2015
4. The theory of planned behavior;Ajzen;Organ. Behav. Hum. Decis. Process.,1991
5. Smartphone information security awareness: a victim of operational pressures;Allam;Comput. Secur.,2014