Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors

Access control; Computation theory; Data privacy; Bring your own devices; Business organizations; Personal devices; Privacy and security; Privacy violation; Security breaches; Sensitive informations; Unauthorized access; Intelligent computing

Saved in:
Bibliographic Details
Main Authors: Al-Harthy I.M., Rahim F.A., Ali N., Singun A.P.
Other Authors: 57216312549
Format: Conference Paper
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items