Security attacks taxonomy on bring your own devices (BYOD) model

Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenue...

Full description

Saved in:
Bibliographic Details
Main Authors: Singh, Manmeet Mahinderjit, Soh, Sin Siang, Oh, Ying San, Malim, Nurul Hashimah Ahamed Hassain, Shariff, Azizul Rahman Mohd
Format: Article
Language:English
Published: Wireilla 2014
Subjects:
Online Access:http://eprints.usm.my/47317/1/SECURITY_ATTACKS_TAXONOMY_ON_BRING_YOUR.pdf
http://eprints.usm.my/47317/
https://wireilla.com/ijmnct/vol4.html
Tags: Add Tag
No Tags, Be the first to tag this record!