2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) 2014
DOI: 10.1109/iscaie.2014.7010235
|View full text |Cite
|
Sign up to set email alerts
|

BYOD: Current state and security challenges

Abstract: Recently, BYOD or Bring Your own Device has become one of the most popular models for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral parts of every aspect of daily business activities. Also, mobile networks are now well integrated with the Internet (e.g. 3G, 4G and LTE technologies), therefore, in BYOD, the personal devices (i.e. mobile devices) can be used to increase employees' satisfaction and reduce an orga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 47 publications
(31 citation statements)
references
References 15 publications
0
31
0
Order By: Relevance
“…The problem with MIM is it requires an internet connection to access resources which is inconvenient to staff who travel a lot (Eshlahi et al 2014). This limitation is also shared by the VPN-based access model (Ali et al 2015).…”
Section: Alternative Solutions An Alternative Solution To Mdm Is Mobmentioning
confidence: 99%
“…The problem with MIM is it requires an internet connection to access resources which is inconvenient to staff who travel a lot (Eshlahi et al 2014). This limitation is also shared by the VPN-based access model (Ali et al 2015).…”
Section: Alternative Solutions An Alternative Solution To Mdm Is Mobmentioning
confidence: 99%
“…The main purpose of MIM is to store enterprise information on a central location, possibly a private cloud, then share it with different endpoints in a secure manner (Eslahi et al, 2014). These endpoints could be a limited number of devices which can access or manage the encrypted data.…”
Section: Enterprise Mobility Managementmentioning
confidence: 99%
“…BYOD is one of the major enablers of enterprise mobility, as organisations do not have to purchase and provide any mobile devices for its employees. The number of organisations taking advantage of BYOD is increasing globally with countries such as Spain, Malaysia and Brazil reporting up to 80% adoption (Eslahi et al, 2014).…”
Section: Enterprise Mobility Enablersmentioning
confidence: 99%
“…Moreover, SMS messages are not free; thus, costs of messages may notify mobile device owners and disclose suspicious activities. Therefore, the majority of real world mobile Botnets such as Geinimi, Anserverbot, and Beanbot employ HTTP and WEB technology as the mobile device are well integrated with the Internet [8].…”
Section: Related Workmentioning
confidence: 99%