Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Nuno Miguel Carvalho Galego, Assistent Professor – ISTEC Lisbon
Media
To cite this article
Nuno Miguel Carvalho Galego, BYOD – Impact in Architecture and Information Security Corporate Policy
DOI: 10.31112/kriativ-tech-2021-10-67
Abstract
BYOD is a new business trend where employees are using their own devices for work purposes. This phenomenon has created new challenges in information security. Thus, organizations should adapt information security corporate strategy in order to address this new reality. This paper tries to identify and explore the optimal way to do this rearrangement, evaluating BYOD environment and measuring all relevant factors.
Keywords
BYOD; Mobility; Threat; Risk; Information Security; Corporate Strategy
References
Astani, M., Ready, K., & Tessema, M. (2013). BYOD ISSUES AND STRATEGIES IN ORGANIZATIONS. Issues in Information Systems, 195-201.
Dedeche, A., Liu, F., Le, M., & Lajami , S. (2013). Emergent BYOD Security Challenges. Melbourne, Australia: University of Melbourne.
Disterer, G., & Kleiner, C. (2013). BYOD Bring Your Own Device. CENTERIS 2013 - Conference on ENTERprise Information Systems / ProjMAN 2013 - (pp. 43 – 53). Procedia Technology.
International Organization for Standardization. (2008, 06 15). ISO/IEC 27005. (I. C. Office, Ed.) Retrieved 02 06, 2014
ISACA. (2008). Glossary of Items. Retrieved 02 06, 2014, from ISACA: http://www.isaca.org/Knowledge-Center/ Documents/Glossary/glossary.pdf
Nicolai, F. J. (1997). Resources Firms and Strategies. In A Reader in the Resource-based Perspective. Oxford.
Risk. (n.d.). Retrieved 02 06, 2014, from Wikipedia: http://en.wikipedia.org/wiki/Risk
Singh, N. (2012). B.Y.O.D. Genie Is Out Of the Bottle – “Devil Or Angel”. Journal of Business Management & Social Sciences Research (JBM&SSR), 1, 3.