2016 International Conference on Information Management and Technology (ICIMTech) 2016
DOI: 10.1109/icimtech.2016.7930328
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy challenge in Bring Your Own Device environment: A Systematic Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…As discussed by Oktavia (2016) there are implications BYOD policies bring to the security and privacy of the organisation. Privacy in this context is defined as the behaviour of the organisation to protect their information assets and their customer personally identifiable information.…”
Section: Mfa Bring Your Own Device (Byod)mentioning
confidence: 99%
See 1 more Smart Citation
“…As discussed by Oktavia (2016) there are implications BYOD policies bring to the security and privacy of the organisation. Privacy in this context is defined as the behaviour of the organisation to protect their information assets and their customer personally identifiable information.…”
Section: Mfa Bring Your Own Device (Byod)mentioning
confidence: 99%
“…The critical components according to this study into BYOD view the main challenges to be privacy and security related. This research advocates for the implementation of adequate BYOD policies as well segregation of the corporate space from personal data with the goal of protecting corporate data (Oktavia et al, 2016).…”
Section: Mfa Bring Your Own Device (Byod)mentioning
confidence: 99%
“…Currently, few reviews and survey research have been conducted on BYOD security implementation (Akin-Adetoro & Kabanda, 2015; Oktavia et al, 2016;Wang et al, 2014). For instance, Garba et al (2015) conducted a review study on BYOD with a focus on information security and privacy challenges.…”
Section: Introductionmentioning
confidence: 99%
“…The context column shows that the found related reviews address broader research areas such as IoT , Bring Your Own Device (BYOD) (Oktavia et al, 2017) and big data (Nelson and Olovsson, 2016). Although smart toys are considered a sub-area of IoT or BYOD, these more general reviews fail to address smart toys as this is a very specific subject within IoT and BYOD and they refer to more general aspects.…”
Section: Related Workmentioning
confidence: 99%
“…Authors (and year) Context Period Data source 2 Papers Nunes et al (2015) Toys for clinical treatment 2010-2015 X,DL,WoS,SL,GS 13 Nelson and Olovsson (2016) Privacy and security in big data 2012-2015 GS,SC 82 Oktavia et al (2017) Privacy and security in BYOD 2000-2017 S,GS,X 5 Nunes et al 2017Toys for clinical treatment N/D 1 X,DL,GS 16 Privacy in IoT 2010-2017 DL,X,SD,WoS 90 de Albuquerque and Kelner (2018) Smart * Stems were used to increase the chances of finding relevant papers. 1 For the 'and' relationship between these two terms, we used the 'within' (W/ n) operator, where query terms must be within a specified number of terms n, with = n 5.…”
Section: Inclusion and Exclusion Criteriamentioning
confidence: 99%