Using mobile devices with BYOD

被引:5
|
作者
机构
[1] Disterer, Georg
[2] Kleiner, Carsten
来源
| 1600年 / IGI Global卷 / 05期
关键词
D O I
10.4018/ijwp.2013100103
中图分类号
学科分类号
摘要
Using mobile devices like smartphones and tablets offers many advantages and has become very popular in private life. Using them in the workplace is also popular, but nobody wants to carry around and handle two devices: one for personal use, and one for work-related tasks. Therefore Bring Your Own Device (BYOD) may be appropriate: users make their personal devices available for company use. Apart from improved convenience this also incurs additional opportunities and risks for companies at the same time. We describe and discuss organizational issues, technical approaches, and solutions. Copyright © 2013, IGI Global.
引用
收藏
相关论文
共 50 条
  • [21] Impact of Using Mobile Devices in Earthquake
    Thapa, M.
    Alsadoon, Abeer
    Prasad, P. W. C.
    Pham, L.
    Elchouemi, A.
    2016 13TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2016, : 139 - 144
  • [22] Object identification using mobile devices
    Juang, Li-Hong
    Wu, Ming-Ni
    Weng, Zhi-Zhong
    MEASUREMENT, 2014, 51 : 100 - 111
  • [23] Mobile learning and BYOD: implementations in an intensive English program
    Al-Okaily, Rasha
    LEARNING AND TEACHING IN HIGHER EDUCATION-GULF PERSPECTIVES, 2013, 10 (02):
  • [24] Mobile search - Social network search using mobile devices
    Tiago, Pedro
    Kotilainen, Niko
    Vapa, Mikko
    Kokkinen, Heikki
    Nurminen, Jukka K.
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1201 - +
  • [25] Promoting Mobile Computing and Security Learning Using Mobile Devices
    You, Wanqing
    Qian, Kai
    Lo, Dan Chia-Tien
    Bhattacharya, Prabir
    Chen, Wei
    Rogers, Tamara
    Chern, Johng-Chern
    Yao, Junfeng
    2015 5th IEEE Integrated STEM Education Conference (ISEC), 2015, : 205 - 209
  • [26] A Novel Approach for Mobile Maintenance Using Mobile Agents Technology and Mobile Devices
    Abid, Khadija
    Mouss, L. Hayet
    Kazar, Okba
    Kahloul, Laid
    JOURNAL OF ADVANCED MANUFACTURING SYSTEMS, 2015, 14 (02) : 55 - 74
  • [27] Remote Mobile Screen (RMS): an approach for secure BYOD environments
    Ocano, Santiago Gimenez
    Ramamurthy, Byrav
    Wang, Yong
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 52 - 56
  • [28] Detection of Misconfigured BYOD Devices in Wi-Fi Networks
    Choi, Jaehyuk
    APPLIED SCIENCES-BASEL, 2020, 10 (20): : 1 - 16
  • [29] Security enhancement on mobile devices using steganography
    Iqbal, S
    Saberwal, V
    Alameldin, T
    ISWS '05: Proceedings of the 2005 International Symposium on Web Services and Applications, 2005, : 29 - 34
  • [30] BIOPROCESS MONITORING AND CONTROL USING MOBILE DEVICES
    Mednis, Martins
    Meitalovs, Jurijs
    Vilums, Sandis
    Vanags, Juris
    Galvanauskas, Vytautas
    INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (03): : 195 - 201