Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors

Access control; Computation theory; Data privacy; Bring your own devices; Business organizations; Personal devices; Privacy and security; Privacy violation; Security breaches; Sensitive informations; Unauthorized access; Intelligent computing

保存先:
書誌詳細
主要な著者: Al-Harthy I.M., Rahim F.A., Ali N., Singun A.P.
その他の著者: 57216312549
フォーマット: Conference Paper
出版事項: Institute of Electrical and Electronics Engineers Inc. 2023
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!