Dimensions of protection behaviors: A systematic literature review
The term Bring Your Own Device (BYOD) has generated many hopes and fears among many users in this field related to behaviors of information protection. Threats of BYOD include illegal access to policy changes and information, disclosure of confidential details to the public, leakage of organization...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Published: |
Little Lion Scientific
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!