2016 IEEE 5th Global Conference on Consumer Electronics 2016
DOI: 10.1109/gcce.2016.7800494
|View full text |Cite
|
Sign up to set email alerts
|

Risk assessment of BYOD: Bring your own device

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 3 publications
2
8
0
Order By: Relevance
“…Privacy in this context is defined as the behaviour of the organisation to protect their information assets and their customer personally identifiable information. As also observed in other research (Tanimoto et al, 2016) advantages such as employee satisfaction and heightened employee productivity are key advantages of adopting BYOD. This paper recognizes the risk in lowering the control of an organisation by giving the employees the responsibility to protect the organisations.…”
Section: Mfa Bring Your Own Device (Byod)supporting
confidence: 70%
See 2 more Smart Citations
“…Privacy in this context is defined as the behaviour of the organisation to protect their information assets and their customer personally identifiable information. As also observed in other research (Tanimoto et al, 2016) advantages such as employee satisfaction and heightened employee productivity are key advantages of adopting BYOD. This paper recognizes the risk in lowering the control of an organisation by giving the employees the responsibility to protect the organisations.…”
Section: Mfa Bring Your Own Device (Byod)supporting
confidence: 70%
“…Tanimoto (2016) proposes a risk assessment strategy which reviews operations and systems and then applies the appropriate risk strategy; transference, avoidance, mitigation. The study concluded that information leakage was the biggest risk and that a mobile device management system was the strongest countermeasure (Tanimoto et al, 2016).…”
Section: Mfa Bring Your Own Device (Byod)mentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, at first, we added new risk factors such as cost overrun of BYOD implementation from a more practical point of view to the results of the risk assessment in previous study [3]. Next, we evaluated the effectiveness of these risk assessment results by quantitative evaluation with risk values.…”
Section: Introductionmentioning
confidence: 99%
“…However, these advances also have their downside. The probability of attacks on the smart grid has increased [2], [3], [9].These attacks also put at risk personal data that may be associated with these smart technologies, including the Internet Protocol (IP) addresses and smart meters used to reach individual consumers [10], [11], [12], [13], [14].…”
Section: Introduction (Heading 1)mentioning
confidence: 99%