Security attacks taxonomy on bring your own devices (BYOD) model
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenue...
Saved in:
Main Authors: | Singh, Manmeet Mahinderjit, Soh, Sin Siang, Oh, Ying San, Malim, Nurul Hashimah Ahamed Hassain, Shariff, Azizul Rahman Mohd |
---|---|
Format: | Article |
Language: | English |
Published: |
Wireilla
2014
|
Subjects: | |
Online Access: | http://eprints.usm.my/47317/1/SECURITY_ATTACKS_TAXONOMY_ON_BRING_YOUR.pdf http://eprints.usm.my/47317/ https://wireilla.com/ijmnct/vol4.html |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Bring Your Own Device (BYOD): legal protection of the employee in Malaysia
by: Ab Hamid, Zuraini, et al.
Published: (2022) -
The effect of Bring your own device (BYOD) implementation / Suhaimi Daud
by: Daud, Suhaimi
Published: (2016) -
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020) -
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018) -
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017)