Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors
Access control; Computation theory; Data privacy; Bring your own devices; Business organizations; Personal devices; Privacy and security; Privacy violation; Security breaches; Sensitive informations; Unauthorized access; Intelligent computing
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Conference Paper |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|