COMPARATIVE STUDY ON BRING YOUR OWN TECHNOLOGY [BYOT]: APPLICATIONS & SECURITY

被引:0
作者
Mishra, Ajaykumar [1 ]
Jani, Kuntesh [1 ]
机构
[1] Govt Engn Coll, Dept Comp Sci & Engn, Sect 28, Gandhinagar, India
来源
2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO) | 2015年
关键词
BYOT; BYOD; Mobile Security; BYOD strategies and mobile device management technology;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
BYOT (Bring Your Own Technology), also known as BYOD (Bring Your Own Device) is a business policy to allow employees to bring their own devices at their work. The same device is used in and out of the corporate office and during outside use, it may be connected to insecure internet and critical corporate data become public when device is lost. This can be a big threat to the office as well as business strategies and future policies are derived from this data. This paper discusses about several issues on BYOT and provides solution on loss of device.
引用
收藏
页数:5
相关论文
共 14 条
  • [1] [Anonymous], MAK BYOD WORK YOUR O
  • [2] [Anonymous], MAN IMPL BYOD POL
  • [3] [Anonymous], BYOD BEST PRACT REQ
  • [4] Astani Marzie, 2013, BYOD ISSUES STRATEGI
  • [5] Costello Tom, 2013, 2013 TRENDS STRATEGI
  • [6] Genie B.Y.O.D., 2012, J BUSINESS MANAG DEC
  • [7] Gupta Vishal, 2012, INT J ENG INNOVA SEP
  • [8] Miller Keith W., 2012, BYOD SECURITY PRIVAC
  • [9] Nickle Susan, BYOD CLOUD COMPUTING
  • [10] Oh Joohyung, 2014, SMART WORK ENV P IME