Dimensions of protection behaviors: A systematic literature review
The term Bring Your Own Device (BYOD) has generated many hopes and fears among many users in this field related to behaviors of information protection. Threats of BYOD include illegal access to policy changes and information, disclosure of confidential details to the public, leakage of organization...
Saved in:
Main Authors: | Al-Harthy I.M., Rahim F.A., Ali N., Singun A.P., JR |
---|---|
Other Authors: | 57216312549 |
Format: | Article |
Published: |
Little Lion Scientific
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors
by: Al-Harthy I.M., et al.
Published: (2023) -
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-OwnDevice (BYOD) Protection Behaviors
by: Ibrahim Mohammed Al-Harthy, et al.
Published: (2020) -
DETERMINANTS OF BYOD PROTECTION BEHAVIOR: AN EMPLOYEE'S PERSPECTIVE
by: Al-Harthy I.M., et al.
Published: (2023) -
Identifying factors that influence security behaviors relating to phishing attacks susceptibility: A systematic literature review
by: ASFOOR A.H., et al.
Published: (2023) -
Usability Dimensions for Chronic Disease Mobile Applications: A Systematics Literature Review
by: Zahra, Fatima, et al.
Published: (2018)