Changing User Attitudes to Security in Bring Your Own Device (BYOD) & the Cloud

被引:0
|
作者
Lennon, R. G. [1 ]
机构
[1] Letterkenny Inst Technol, Dept Comp, Letterkenny, Donegal, Ireland
关键词
component; Cloud; BYOD; Security; Bring Your Own Device;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Supporting modern workers and learners requires a shift in attitude of IT managers worldwide. Movement to bring your own device with further resources on the cloud seems inevitable. However despite the trend toward mobility and flexibility in IT there is a significant requirement for BYOD users to re-evaluate their attitude toward the security of their own devices and the resources they utilize on the cloud. This paper outlines an evaluation of business user's attitudes towards utilizing their own devices for business. The paper also outlines the results of a survey of on business users attitudes towards resources stored on the cloud. Finally recommendations are made regarding the best practice in aiding the users comprehension of security risks in BYOD and the Cloud
引用
收藏
页码:49 / 52
页数:4
相关论文
共 50 条
  • [1] The "Bring Your Own Device" (BYOD) Security Metrics Taxonomy
    Zulkefli, Zakiah
    Singh, Manmeet Mahinderjit
    ADVANCED SCIENCE LETTERS, 2018, 24 (11) : 8582 - 8590
  • [2] BYOD — Bring Your Own Device
    Georg Disterer
    Carsten Kleiner
    HMD Praxis der Wirtschaftsinformatik, 2013, 50 (2) : 92 - 100
  • [3] DISCOVERING USER ACCEPTANCE OF BRING YOUR OWN DEVICE(BYOD) IN HIGHER EDUCATION
    Masilo, G.
    Simelane-Mnisi, S.
    Mji, A.
    Mokgobo, I
    EDULEARN19: 11TH INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES, 2019, : 1988 - 1994
  • [4] Bring Your Own Device (BYOD) Information Security Risks: Case of Lesotho
    Morolong, Mamoqenelo Priscilla
    Shava, Fungai Bhunu
    Gamundan, Attlee M.
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 346 - 354
  • [5] Cooperative solutions for Bring Your Own Device (BYOD)
    Jaramillo, D.
    Katz, N.
    Bodin, B.
    Tworek, W.
    Smart, R.
    Cook, T.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2013, 57 (06)
  • [6] Risk Assessment of BYOD: Bring Your Own Device
    Tanimoto, Shigeaki
    Yamada, Susumu
    Iwashita, Motoi
    Kobayashi, Toru
    Sato, Hiroyuki
    Kanai, Atsushi
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [7] Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security
    Hong, Sungmin
    Baykov, Robert
    Xu, Lei
    Nadimpalli, Srinath
    Gu, Guofei
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [8] Proactive Security Metrics for Bring Your Own Device (BYOD) in ISO 27001 Supported Environments
    Hajdarevic, Kemal
    Allen, Pat
    Spremic, Mario
    2016 24TH TELECOMMUNICATIONS FORUM (TELFOR), 2016, : 41 - 44
  • [9] To BYOD or not: Are device latencies important for bring-your-own-device (BYOD) smartphone cognitive testing?
    Nicosia, Jessica
    Wang, Benjamin
    Aschenbrenner, Andrew J.
    Sliwinski, Martin J.
    Yabiku, Scott T.
    Roque, Nelson A.
    Germine, Laura T.
    Bateman, Randall J.
    Morris, John C.
    Hassenstab, Jason
    BEHAVIOR RESEARCH METHODS, 2023, 55 (06) : 2800 - 2812
  • [10] To BYOD or not: Are device latencies important for bring-your-own-device (BYOD) smartphone cognitive testing?
    Jessica Nicosia
    Benjamin Wang
    Andrew J. Aschenbrenner
    Martin J. Sliwinski
    Scott T. Yabiku
    Nelson A. Roque
    Laura T. Germine
    Randall J. Bateman
    John C. Morris
    Jason Hassenstab
    Behavior Research Methods, 2023, 55 : 2800 - 2812