Information system audit for mobile device security assessment
The competency to use mobile devices for work-related tasks gives advantages to the company productiveness and expedites business processes. Thus Bring Your Own Device (BYOD) setting emerge to enable work flexibility and technological compatibility. For management, employees' productivity is im...
Saved in:
Main Authors: | Abu Othman, Noor Ashitah, Norman, Azah Anir, Mat Kiah, Miss Laiha |
---|---|
Format: | Conference or Workshop Item |
Published: |
2021
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/35393/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Compliance with bring your own device security policies in organizations: A systematic literature review
by: Palanisamy, Rathika, et al.
Published: (2020) -
Employees’ BYOD security policy compliance in the public sector
by: Palanisamy, Rathika, et al.
Published: (2024) -
Employees' BYOD security policy compliance in the public sector
by: Palanisamy, Rathika, et al.
Published: (2024) -
BYOD security risks and mitigation strategies: Insights from IT security experts
by: Palanisamy, Rathika, et al.
Published: (2021) -
BYOD policy compliance: risks and strategies in organizations
by: Palanisamy, Rathika, et al.
Published: (2022)