Publication | Closed Access
BYOD: Security and Privacy Considerations
223
Citations
1
References
2012
Year
EngineeringPrivacy ConsiderationsInformation SecurityInformation ForensicsInformation PrivacyCommunicationOwn DevicesSecurity AwarenessManagementSecurity PrivacyPrivacy Enhancing TechnologyPrivacy ManagementInternet SecurityAssistive TechnologyPrivacy By DesignPrivacy IssueUser ExperienceData PrivacyComputer ScienceInformation ManagementPrivacy ConcernPrivacyData SecurityCryptographySeveral Important AdvantagesSecurityHuman-computer InteractionTechnology
Clearly, there are several important advantages for employees and employers when employees bring their own devices to work. But there are also significant concerns about security privacy. Companies and individuals involved, or thinking about getting involved with BYOD should think carefully about the risks as well as the rewards.
| Year | Citations | |
|---|---|---|
Page 1
Page 1