2015
DOI: 10.15394/jdfsl.2015.1202
|View full text |Cite
|
Sign up to set email alerts
|

The "Bring your own device" conundrum for organizations and investigators: An examination of the policy and legal concerns in light of investigatory challenges

Abstract: With the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (smartphones) within the corporate and enterprise environment. The movement, known as "Bring Your Own Device" (hereinafter referred to as "BYOD"), seeks to eliminate the need for two separate mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 2 publications
0
0
0
Order By: Relevance
“…To address these risks, organisations can effectively manage BYOD usage by implementing security access control and security policy technologies that address these vulnerabilities and obstacles [6]. However, there are significant gaps between the security offered by current BYOD access control policies and the desired outcomes [7]. Rhee et al [8] provide fundamental access control policies that address security and privacy issues in three primary categories: authenticity, confidentiality, and integrity.…”
Section: Introductionmentioning
confidence: 99%
“…To address these risks, organisations can effectively manage BYOD usage by implementing security access control and security policy technologies that address these vulnerabilities and obstacles [6]. However, there are significant gaps between the security offered by current BYOD access control policies and the desired outcomes [7]. Rhee et al [8] provide fundamental access control policies that address security and privacy issues in three primary categories: authenticity, confidentiality, and integrity.…”
Section: Introductionmentioning
confidence: 99%