Bring your own device: a survey of threats and security management models Online publication date: Thu, 20-Sep-2018
by Fabricio R. Rivadeneira Zambrano; Glen D. Rodriguez Rafael
International Journal of Electronic Business (IJEB), Vol. 14, No. 2, 2018
Abstract: Bring your own device (BYOD) is used for the benefits offered by allowing the use of mobile devices to perform business tasks, but the following questions should be analysed if any organisation want to adopt a BYOD environment: What threats do currently face mobile devices that are being used in BYOD environments? What are the characteristics of the security models proposed until now in order to manage BYOD? Are there integral security models with the minimum requirements in order to take full advantage of BYOD? What are the basic controls that should be taken into account for designing security policies in a business with a BYOD environment? What are the main differences between security on BYOD environments vs. security on corporate owned mobile device environments, regarding how easy is to meet security needs? By giving answers to these questions, we will be able to have a clear vision of what it takes to adopt BYOD in an organisation.
Online publication date: Thu, 20-Sep-2018
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Business (IJEB):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com