2023
DOI: 10.3390/app13148048
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions

Aljuaid Turkea Ayedh M,
Ainuddin Wahid Abdul Wahab,
Mohd Yamani Idna Idris

Abstract: The number of devices connected within organisational networks through ”Bring Your Own Device” (BYOD) initiatives has steadily increased. BYOD security risks have resulted in significant privacy and security issues impacting organisational security. Many researchers have reviewed security and privacy issues in BYOD policies. However, not all of them have fully investigated security and privacy requirements. In addition to describing a system’s capabilities and functions, these requirements also reflect the sys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 102 publications
(104 reference statements)
0
1
0
Order By: Relevance
“…This is what makes the topic of BYOD mobile device security relevant, as it is becoming an integral part of modern business. As stated by [5], there is currently a large lack of control over devices in a BYOD environment. Organizations do not always have full control over employee devices, which leads to the risk of data leakage if the device is lost or compromised.…”
Section: Introductionmentioning
confidence: 99%
“…This is what makes the topic of BYOD mobile device security relevant, as it is becoming an integral part of modern business. As stated by [5], there is currently a large lack of control over devices in a BYOD environment. Organizations do not always have full control over employee devices, which leads to the risk of data leakage if the device is lost or compromised.…”
Section: Introductionmentioning
confidence: 99%
“…Security, privacy, and trust considerations in interconnected environments spanning administrative domains with decentralized data [21][22][23].…”
mentioning
confidence: 99%