Changing User Attitudes to Security in Bring Your Own Device (BYOD) & the Cloud

被引:0
|
作者
Lennon, R. G. [1 ]
机构
[1] Letterkenny Inst Technol, Dept Comp, Letterkenny, Donegal, Ireland
来源
2012 5TH ROMANIA TIER 2 FEDERATION GRID, CLOUD & HIGH PERFORMANCE COMPUTING SCIENCE (RO-LCG) | 2012年
关键词
component; Cloud; BYOD; Security; Bring Your Own Device;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Supporting modern workers and learners requires a shift in attitude of IT managers worldwide. Movement to bring your own device with further resources on the cloud seems inevitable. However despite the trend toward mobility and flexibility in IT there is a significant requirement for BYOD users to re-evaluate their attitude toward the security of their own devices and the resources they utilize on the cloud. This paper outlines an evaluation of business user's attitudes towards utilizing their own devices for business. The paper also outlines the results of a survey of on business users attitudes towards resources stored on the cloud. Finally recommendations are made regarding the best practice in aiding the users comprehension of security risks in BYOD and the Cloud
引用
收藏
页码:49 / 52
页数:4
相关论文
共 50 条
  • [1] The "Bring Your Own Device" (BYOD) Security Metrics Taxonomy
    Zulkefli, Zakiah
    Singh, Manmeet Mahinderjit
    ADVANCED SCIENCE LETTERS, 2018, 24 (11) : 8582 - 8590
  • [2] Current Status, Issues, and Future of Bring Your Own Device (BYOD)
    French, Aaron M.
    Guo, Chengqi
    Shim, J. P.
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 35 : 191 - 197
  • [3] Risk Assessment of BYOD: Bring Your Own Device
    Tanimoto, Shigeaki
    Yamada, Susumu
    Iwashita, Motoi
    Kobayashi, Toru
    Sato, Hiroyuki
    Kanai, Atsushi
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [4] A Qualitative Study on the Adoption of Bring Your Own Device (BYOD) Practice
    Arpaci, Ibrahim
    INTERNATIONAL JOURNAL OF E-ADOPTION, 2015, 7 (02) : 1 - 14
  • [5] Bring Your Own Device: Security Technologies
    Ketel, Mohammed
    Shumate, Thomas
    IEEE SOUTHEASTCON 2015, 2015,
  • [6] Considerations for Conducting Bring Your Own "Device" (BYOD) Clinical Studies
    Demanuele C.
    Lokker C.
    Jhaveri K.
    Georgiev P.
    Sezgin E.
    Geoghegan C.
    Zou K.H.
    Izmailova E.
    McCarthy M.
    Digital Biomarkers, 2022, 6 (02) : 47 - 60
  • [7] The Implementation of Bring Your Own Device (BYOD) in Primary [Elementary] Schools
    McLean, Karen J.
    FRONTIERS IN PSYCHOLOGY, 2016, 7
  • [8] An improved smart contract-based bring your own device (BYOD) security control framework
    Almarhabi, Khalid A.
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 105 : 598 - 612
  • [9] Status of bring-your-own-device (BYOD) security practices in Australian hospitals-A national survey
    Wani, Tafheem Ahmad
    Mendoza, Antonette
    Gray, Kathleen
    Smolenaers, Frank
    HEALTH POLICY AND TECHNOLOGY, 2022, 11 (03)
  • [10] “Bring-Your-Own-Device” (BYOD) and Productivity: Instrument Development and Validation
    Shukry A.I.M.
    Rosman M.R.M.
    Rosli N.N.I.N.
    Alias N.R.
    Razlan N.M.
    Alimin N.A.
    International Journal of Interactive Mobile Technologies, 2023, 17 (11) : 83 - 100