1. AirWatch. (2012). Enabling bring your own devices (BYOD) in the enterprise. Retrieved from http://www.ciosummits.com/media/solution_spotlight/byod-whitepaper.pdf Google Scholar
2. AlHarthy, K., Shawkat, W. (2013, November-December). Implement network security control solution in BYOD environment. IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia. Google Scholar, Crossref
3. Armando, A., Costa, G., Merlo, A. (2013, March). Bring your own device, securely. Proceedings of the 28th annual ACM Symposium on Applied Computing, Coimbra, Portugal. Google Scholar, Crossref
4. Ballagas, R., Rohs, M., Sheridan, J. G., Borchers, J. (2013). BYOD: Bring your own device. Retrieved from http://www.vs.inf.ethz.ch/publ/papers/rohs-byod-2004.pdf Google Scholar
5. Björn, N., Sebastian, K., Kevin, O., Stefan, K. (2012). Towards an IT consumerization theory: A theory and practice review. Working papers, ERCIS – European research center for information systems, no 13. Retrieved Febuary 10, 2014 from http://hdl.handle.net/10419/60246 Google Scholar