Exploring Security Theory Approach in BYOD Environment

3Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

BYOD (Bring Your Own Device) is a business policy to allow employees to bring their own devices at their work. The employee uses the same device in and out of the corporate office and during outside use, it may be connected to insecure internet and critical corporate data become public or when a device is used in an insecure environment, it may get infected by big threats and they may get activated when the device is used in organization's environment and may harm the confidential information. In both cases the organization will be in losing side because if internal data become public it may hurt business strategies and future policies. If internal organization gets infected from outside attack, it will certainly hurt the business in any way. In this paper we are suggesting some approaches which can guard against these types of threat and secure the corporate data. © Springer International Publishing Switzerland 2014.

Cite

CITATION STYLE

APA

Sangroha, D., & Gupta, V. (2014). Exploring Security Theory Approach in BYOD Environment. In Smart Innovation, Systems and Technologies (Vol. 28, pp. 259–266). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-07350-7_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free