A review of bring your own device on security issues

M Olalere, MT Abdullah, R Mahmod… - Sage Open, 2015 - journals.sagepub.com
Mobile computing has supplanted internet computing because of the proliferation of cloud-
based applications and mobile devices (such as smartphones, palmtops, and tablets). As a …

BYOD: Current state and security challenges

M Eslahi, MV Naseri, H Hashim… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
Recently, BYOD or Bring Your own Device has become one of the most popular models for
enterprises to provide mobility and flexibility in workplaces. The emergence of new …

Android inter-app communication threats and detection techniques

S Bhandari, WB Jaballah, V Jain, V Laxmi… - Computers & …, 2017 - Elsevier
With the digital breakthrough, smart phones have become very essential component for
many routine tasks like shop**, paying bills, transferring money, instant messaging …

Digital tablets in the music classroom: A study about the academic performance of students in the BYOD context

FD Guillén-Gámez, FJ Álvarez-García… - Journal of Music …, 2018 - intellectdiscover.com
This study assesses whether the use of digital tablets in the context of Bring Your Own
Device (BYOD) produces an alteration in the academic performance of high school music …

Bring-your-own-device in medical schools and healthcare facilities: A review of the literature

K Kadimo, MB Kebaetse, D Ketshogileng… - International journal of …, 2018 - Elsevier
Background Enabling personal mobile device use through a bring-your-own device (BYOD)
policy can potentially save significant costs for medical schools and healthcare facilities, as …

Byod-insure: A security assessment model for enterprise byod

MM Ratchford, Y Wang - 2019 Fifth Conference on Mobile and …, 2019 - ieeexplore.ieee.org
As organizations continue allowing employees to use their personal mobile devices to
access the organizations' networks and the corporate data, a phenomenon calledBring Your …

Securing the" bring your own device" paradigm

A Armando, G Costa, L Verderame, A Merlo - Computer, 2014 - ieeexplore.ieee.org
The current mobile application distribution model cannot cope with the complex security
requirements of the emerging" bring your own device"(BYOD) paradigm. A secure …

Bring your own device: an overview of risk assessment

R Ogie - IEEE Consumer Electronics Magazine, 2015 - ieeexplore.ieee.org
As organizations constantly strive to improve strategies for ICT management, one of the
major challenges they must tackle is bring your own device (BYOD). BYOD is a term that …

A perceptional analysis of BYOD (bring your own device) for educational or workplace implementations in a South Korean case

JH Lee, H Tinmaz - Participatory Educational Research, 2019 - dergipark.org.tr
As the communication and information technologies (especially mobile devices) have
become a central part of our daily lives, people have started bringing their own devices to …

Analysis of BYOD security frameworks

S Ali, MN Qureshi, AG Abbasi - 2015 Conference on …, 2015 - ieeexplore.ieee.org
The trend of adapting BYOD or" Bring Your Own Device" concept in enterprise environment
is increasing due to mutual benefits that the company and employees get. Organizations get …