Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors
Access control; Computation theory; Data privacy; Bring your own devices; Business organizations; Personal devices; Privacy and security; Privacy violation; Security breaches; Sensitive informations; Unauthorized access; Intelligent computing
Saved in:
Main Authors: | Al-Harthy I.M., Rahim F.A., Ali N., Singun A.P. |
---|---|
Other Authors: | 57216312549 |
Format: | Conference Paper |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors
by: Ibrahim Mohammed Al-Harthy, et al.
Published: (2020) -
Bring Your Own Device (BYOD): legal protection of the employee in Malaysia
by: Ab Hamid, Zuraini, et al.
Published: (2022) -
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014) -
The effect of Bring your own device (BYOD) implementation / Suhaimi Daud
by: Daud, Suhaimi
Published: (2016) -
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)