메뉴 건너뛰기




Volumn 35, Issue , 2014, Pages 191-197

Current status, issues, and future of bring your own device (BYOD)

Author keywords

Adoption; Bring your own device; BYOD; Culture; Security

Indexed keywords

CELL CULTURE; INFORMATION SYSTEMS;

EID: 84921731321     PISSN: 15293181     EISSN: None     Source Type: Journal    
DOI: 10.17705/1cais.03510     Document Type: Article
Times cited : (86)

References (16)
  • 1
    • 84963548329 scopus 로고    scopus 로고
    • Businesses must adapt to permanent BYOD presence: Ovum
    • Retrieved July 29, 2013
    • Eddy, N. (2013). Businesses must adapt to permanent BYOD presence: Ovum. eWeek. Retrieved July 29, 2013, from http://www.eweek.com/small-business/businesses-must-adapt-to-permanent-byod-presence-ovum/
    • (2013) eWeek
    • Eddy, N.1
  • 2
    • 84921748115 scopus 로고    scopus 로고
    • Tech-savvy teaching: BYOD
    • Hockly, N. (2012). Tech-savvy teaching: BYOD. Modern English Teacher, 21(4), 44-45.
    • (2012) Modern English Teacher , vol.21 , Issue.4 , pp. 44-45
    • Hockly, N.1
  • 3
    • 84921802426 scopus 로고    scopus 로고
    • Peer research report: Insights on the current state of BYOD. Intel's IT Manager survey
    • Retrieved July 29, 2013
    • Intel. (2012). Peer research report: Insights on the current state of BYOD. Intel's IT Manager survey. Intel IT Center. Retrieved July 29, 2013, from http://www.intel.com/content/dam/www/public/us/en/documents/whitepapers/ consumerization-enterprise-byod-peer-research-paper.pdf
    • (2012) Intel IT Center.
    • Intel1
  • 4
    • 84921810901 scopus 로고    scopus 로고
    • How to fit BYOD into an enterprise mobility strategy
    • Leong, K. B. (2013). How to fit BYOD into an enterprise mobility strategy. Network World Asia, 12-14.
    • (2013) Network World Asia , pp. 12-14
    • Leong, K.B.1
  • 5
    • 84860314406 scopus 로고    scopus 로고
    • Interview: BYOD and the enterprise network
    • Mansfield-Devine, S. (2012). Interview: BYOD and the enterprise network. Computer Fraud & Security, 2012(4), 14- 17.
    • (2012) Computer Fraud & Security , vol.2012 , Issue.4 , pp. 14- 17
    • Mansfield-Devine, S.1
  • 6
    • 84867375385 scopus 로고    scopus 로고
    • BYOD: Security and privacy considerations
    • Miller, K. W., Voas, J., & Hurlburt, G. F. (2012). BYOD: Security and privacy considerations. IT Professional, 14(5), 53-55.
    • (2012) IT Professional , vol.14 , Issue.5 , pp. 53-55
    • Miller, K.W.1    Voas, J.2    Hurlburt, G.F.3
  • 7
    • 84921807559 scopus 로고    scopus 로고
    • Nearly 60% of companies are vulnerable to BYOD risks
    • Network World Asia. (2013). Nearly 60% of companies are vulnerable to BYOD risks. Network World Asia, 5.
    • (2013) Network World Asia , pp. 5
    • Network World Asia1
  • 8
    • 84921814017 scopus 로고    scopus 로고
    • BYOD: North America and Asia embrace it; Western Europe, not so much
    • Retrieved July 29, 2013
    • Nusca, A. (2013). BYOD: North America and Asia embrace it; Western Europe, not so much. ZDNet. Retrieved July 29, 2013, from http://www.zdnet.com/byod-north-america-and-asia-embrace-it-western-europe-not-so-much- 7000016802/
    • (2013) ZDNet
    • Nusca, A.1
  • 9
    • 84921805517 scopus 로고    scopus 로고
    • CIOs in Asia-Pacific are embracing BYOD
    • Osman, H. (2013). CIOs in Asia-Pacific are embracing BYOD. Computerworld Philippines, 22(5), 41-41.
    • (2013) Computerworld Philippines , vol.22 , Issue.5 , pp. 41
    • Osman, H.1
  • 10
    • 84921800474 scopus 로고    scopus 로고
    • IBM Connection 2013: BYOD at IBM
    • Retrieved July 29, 2013
    • Pepin, C. (2013). IBM Connection 2013: BYOD at IBM. Slideshare IBM Network. Retrieved July 29, 2013, from http://www.slideshare.net/chrispepin/ibm-connect-2013-byod-at-ibm
    • (2013) Slideshare IBM Network
    • Pepin, C.1
  • 11
    • 84921758073 scopus 로고    scopus 로고
    • BYOD on rise in Asia, but challenges remain
    • Retrieved July 29, 2013
    • Qing, L. Y. (2013). BYOD on rise in Asia, but challenges remain. ZDNet. Retrieved July 29, 2013, from http://www.zdnet.com/byod-on-rise-in-asia-but-challenges-remain-7000010660/
    • (2013) ZDNet
    • Qing, L.Y.1
  • 13
    • 84857696369 scopus 로고    scopus 로고
    • BYOD: Enabling the chaos
    • Thomson, G. (2012). BYOD: Enabling the chaos. Network Security, 2012(2), 5-8.
    • (2012) Network Security , vol.2012 , Issue.2 , pp. 5-8
    • Thomson, G.1
  • 15
    • 84921772354 scopus 로고    scopus 로고
    • Understanding BYOD legal issues under European privacy and data protection law
    • Retrieved July 29, 2013
    • Vandendriessche, J. (2012). Understanding BYOD legal issues under European privacy and data protection law. ISACA. Retrieved July 29, 2013, from http://www.slideshare.net/Johan_Vdd/understanding-byod-legal-issuesunder- european-privacy-and-data-protection-law
    • (2012) ISACA
    • Vandendriessche, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.