Author:
Almarhabi Khalid,Bahaddad Adel,Mohammed Alghamdi Ahmed
Reference34 articles.
1. Bring your own device. Available: https://ico.org.uk/media/for-organisations/documents/1563/ico_bring_your_own_device_byod_guidance.pdf
2. Bring your own device: benefits, risks and control techniques;Shumate,2014
3. A.V. Herrera, M. Ron, C. Rabadão, National cyber-security policies oriented to BYOD (bring your own device): Systematic review, in: 2017 12th Iberian Conference on Information Systems and Technologies (CISTI), 2017, pp. 1-4: IEEE.
4. Legal issues in secure implementation of bring your own device (BYOD);Dhingra;Procedia Comput. Sci.,2016
5. Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments;Garba;J. Information Privacy Security,2015
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献