Respite for SMEs: A systematic review of socio-technical cybersecurity metrics

M Van Haastrecht, B Yigit Ozkan, M Brinkhuis… - Applied sciences, 2021 - mdpi.com
Featured Application The results of this work will be incorporated in an application for SMEs
in Europe, which aims to improve cybersecurity awareness and resilience, as part of the EU …

Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic map** review

CI Eke, AA Norman, M Mulenga - Artificial Intelligence Review, 2023 - Springer
Bring your own device (BYOD) paradigm that permits employees to come with their own
mobile devices to join the organizational network is rapidly changing the organizational …

Kee** customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce

N Ameen, A Tarhini, MH Shah, N Madichie… - Computers in Human …, 2021 - Elsevier
Employees are increasingly relying on mobile devices. In international organizations, more
employees are using their personal smartphones for work purposes. Meanwhile, the number …

Employees' behavioural intention to smartphone security: A gender-based, cross-national study

N Ameen, A Tarhini, MH Shah, NO Madichie - Computers in Human …, 2020 - Elsevier
Despite the benefits of bring your own device (BYOD) programmes, they are considered one
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …

Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and …

AT Ayedh M, AWA Wahab, MYI Idris - Applied Sciences, 2023 - mdpi.com
The number of devices connected within organisational networks through” Bring Your Own
Device”(BYOD) initiatives has steadily increased. BYOD security risks have resulted in …

[HTML][HTML] Security management of BYOD and cloud environment in Saudi Arabia

K Almarhabi, A Bahaddad, AM Alghamdi - Alexandria Engineering Journal, 2023 - Elsevier
The increasing trend of Bring Your Own Device (BYOD) to work has led to a significant surge
in the risks related to network security. This trend is very beneficial to employers and …

Secure containers in Android: the Samsung KNOX case study

U Kanonov, A Wool - Proceedings of the 6th Workshop on Security and …, 2016 - dl.acm.org
Bring Your Own Device (BYOD) is a growing trend among enterprises, aiming to improve
workers' mobility and productivity via their smartphones. The threats and dangers posed by …

BYOD security issues: A systematic literature review

M Ratchford, O El-Gayar, C Noteboom… - … Security Journal: A …, 2022 - Taylor & Francis
Organizations are exposed to new security risks when they allow employees' personal
mobile devices to access the network and the corporate data (a phenomenon called 'Bring …

Complying with BYOD security policies: A moderation model based on protection motivation theory

CZ Tu, J Adkins, GY Zhao - Journal of the Midwest Association for …, 2019 - aisel.aisnet.org
As security concerns have become critical to organizations' Bring Your Own Device (BYOD)
strategy, it is important for employees to comply with organization's security measures and …

" Bring Your Own Device" Policies: Perspectives of Both Employees and Organizations.

KG Gökçe, O Dogerlioglu - Knowledge Management & E-Learning, 2019 - ERIC
Bring Your Own Device (BYOD) policy, which allows employees to use their own mobile
devices for work and connection to their corporate network, is getting popular in enterprises …