The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - Sept.-Oct. (2012 vol.14)
pp: 53-55
Keith W. Miller , University of Illinois Springfield
George F. Hurlburt , Change Index
ABSTRACT
Clearly, there are several important advantages for employees and employers when employees bring their own devices to work. But there are also significant concerns about security privacy. Companies and individuals involved, or thinking about getting involved with BYOD should think carefully about the risks as well as the rewards.
INDEX TERMS
Information technology, Employment, Handset devices, Mobile handsets, Computer security, Network sercurity, Security of data, Privacy, information technology, bring your own device, BYOD, bring your own technology, BYOT, security, privacy
CITATION
Keith W. Miller, Jeffrey Voas, George F. Hurlburt, "BYOD: Security and Privacy Considerations", IT Professional, vol.14, no. 5, pp. 53-55, Sept.-Oct. 2012, doi:10.1109/MITP.2012.93
REFERENCES
1. B. Dickenson, “How to Check Your Stress Levels and Heart Rate on Your Mobile Phone,” blog, 25 Aug. 2011; www.smartplanet.com/blog/science-scope/how-to-check-your-stress-levels-and-heart-rate-on-your-mobile-phone 10044 .
2. A. Smith, “46% of American Adults are Smartphone Owners,” Pew Research Center, Mar. 2012; http://pewinternet.org/~/media/Files/Reports/ 2012Smartphone%20ownership%202012.pdf .
3. A. Smith, “Mobile Access 2010,” Pew Research Center, July 2010; http://www.pewinternet.org/~/media/Files/ Reports/2010PIP_Mobile_Access_2010.pdf .
4. M.C. Hagood, “Media Literacy Education: On the Move,”, J. Media Literacy Education, vol. 3, no. 1, 2011, pp. 11–13.
5. “Cisco Study: IT Saying Yes to BYOD,” Cisco, 16 May 2012; http://newsroom.cisco.com/release/854754 Cisco-Study-IT-Saying-Yes-To-BYOD.
6. A. Savvas, “European Firms Allow BYOD Despite Security Concerns,” Computer World UK,23 May 2012; www.computerworlduk.com/news/mobile-wireless/ 3359491european-firms-allow-byod-despite-security-concerns .
7. A. Newcomb, “FCC, Wireless Carriers Will Create National Database to Fight Smartphone, Tablet Thefts,” ABC News, 10 Apr. 2012; http://abcnews.go.com/Technology/fcc-wireless-companies-create-stolen-smartphone-database story?id=16107358#.T_M8IY5QYWY .
8. “Forrsights Workforce Employee Survey, Q4 2011,” Forrester, Nov. 2011; www.forrester.com/Forrsights+Workforce+Employee+Survey+Q4+2011/ -E-SUS887.
9. R. Shekhar, “Security Breach at South Block: Pen Drive, Laptop Missing,” The Times of India,19 Mar. 2022; http://articles.timesofindia.indiatimes.com/ 2012-03-19/india31209853_1_security-breach-pen-drive-usb-flash-drive .
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool