2021
DOI: 10.1007/978-981-15-9774-9_63
|View full text |Cite
|
Sign up to set email alerts
|

SWOT Analysis of BYOD (Bring Your Own Device)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…This review work can be utilized for providing guidelines in various organizations. Furthermore, considering the analysis of security work in BYOD, there are other two work which has done empirical survey and strengths, weaknesses, opportunities, and threats (SWOT) analysis in [40] and [41] respectively.…”
Section: Analysis Of Byod Security Policymentioning
confidence: 99%
“…This review work can be utilized for providing guidelines in various organizations. Furthermore, considering the analysis of security work in BYOD, there are other two work which has done empirical survey and strengths, weaknesses, opportunities, and threats (SWOT) analysis in [40] and [41] respectively.…”
Section: Analysis Of Byod Security Policymentioning
confidence: 99%