Securing BYOD

被引:7
作者
Chang, J. Morris [1 ]
Ho, Pao-Chung [2 ]
Chang, Teng-Chang [3 ]
机构
[1] Iowa State Univ, Ames, IA 50011 USA
[2] Inst Informat Ind, Taipei, Taiwan
[3] Inst Informat Ind, Smart Network & Syst Inst, Taipei, Taiwan
关键词
BYOD; cybercrime; information technology; Internet/Web technologies; IT; mobile; project management; security;
D O I
10.1109/MITP.2014.76
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's IT departments are concerned with the popularity of BYOD, because mixing personal and enterprise data presents security threats to corporate proprietary information. IT departments must develop company security policies that let employees access sensitive resources using personal devices. © 1999-2012 IEEE.
引用
收藏
页码:9 / 11
页数:3
相关论文
共 7 条
[1]  
Alberta, 2012, BRING YOUR OWN DEVIC
[2]  
[Anonymous], 2012, INS CURR STAT BYOD
[3]  
[Anonymous], 2014, FIX DISC EMPL EMPL B
[4]   The Design, Implementation, and Evaluation of Cells: A Virtual Smartphone Architecture [J].
Dall, Christoffer ;
Andrus, Jeremy ;
Van't Hof, Alexander ;
Laadan, Oren ;
Nieh, Jason .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2012, 30 (03)
[5]  
Hassell J., 2012, CIO 0517
[6]  
IBM Center for Applied Insights, 2012, ACH SUCC FLEX WORKPL
[7]  
Svajcer Vanja., 2014, Sophos mobile security threat report