Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors
Bring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorize...
Saved in:
Main Authors: | Ibrahim Mohammed Al-Harthy, Fiza Abdul Rahim, Nor'Ashikin Ali, Amando P., Singun Jr. |
---|---|
Format: | Conference Proceeding |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | http://dspace.uniten.edu.my/jspui/handle/123456789/15311 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors
by: Al-Harthy I.M., et al.
Published: (2023) -
Bring Your Own Device (BYOD): legal protection of the employee in Malaysia
by: Ab Hamid, Zuraini, et al.
Published: (2022) -
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014) -
The effect of Bring your own device (BYOD) implementation / Suhaimi Daud
by: Daud, Suhaimi
Published: (2016) -
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)