-
1
-
-
84963548329
-
Businesses must adapt to permanent BYOD presence: Ovum
-
Retrieved July 29, 2013
-
Eddy, N. (2013). Businesses must adapt to permanent BYOD presence: Ovum. eWeek. Retrieved July 29, 2013, from http://www.eweek.com/small-business/businesses-must-adapt-to-permanent-byod-presence-ovum/
-
(2013)
eWeek
-
-
Eddy, N.1
-
2
-
-
84921748115
-
Tech-savvy teaching: BYOD
-
Hockly, N. (2012). Tech-savvy teaching: BYOD. Modern English Teacher, 21(4), 44-45.
-
(2012)
Modern English Teacher
, vol.21
, Issue.4
, pp. 44-45
-
-
Hockly, N.1
-
3
-
-
84921802426
-
Peer research report: Insights on the current state of BYOD. Intel's IT Manager survey
-
Retrieved July 29, 2013
-
Intel. (2012). Peer research report: Insights on the current state of BYOD. Intel's IT Manager survey. Intel IT Center. Retrieved July 29, 2013, from http://www.intel.com/content/dam/www/public/us/en/documents/whitepapers/ consumerization-enterprise-byod-peer-research-paper.pdf
-
(2012)
Intel IT Center.
-
-
Intel1
-
4
-
-
84921810901
-
How to fit BYOD into an enterprise mobility strategy
-
Leong, K. B. (2013). How to fit BYOD into an enterprise mobility strategy. Network World Asia, 12-14.
-
(2013)
Network World Asia
, pp. 12-14
-
-
Leong, K.B.1
-
5
-
-
84860314406
-
Interview: BYOD and the enterprise network
-
Mansfield-Devine, S. (2012). Interview: BYOD and the enterprise network. Computer Fraud & Security, 2012(4), 14- 17.
-
(2012)
Computer Fraud & Security
, vol.2012
, Issue.4
, pp. 14- 17
-
-
Mansfield-Devine, S.1
-
6
-
-
84867375385
-
BYOD: Security and privacy considerations
-
Miller, K. W., Voas, J., & Hurlburt, G. F. (2012). BYOD: Security and privacy considerations. IT Professional, 14(5), 53-55.
-
(2012)
IT Professional
, vol.14
, Issue.5
, pp. 53-55
-
-
Miller, K.W.1
Voas, J.2
Hurlburt, G.F.3
-
7
-
-
84921807559
-
Nearly 60% of companies are vulnerable to BYOD risks
-
Network World Asia. (2013). Nearly 60% of companies are vulnerable to BYOD risks. Network World Asia, 5.
-
(2013)
Network World Asia
, pp. 5
-
-
Network World Asia1
-
8
-
-
84921814017
-
BYOD: North America and Asia embrace it; Western Europe, not so much
-
Retrieved July 29, 2013
-
Nusca, A. (2013). BYOD: North America and Asia embrace it; Western Europe, not so much. ZDNet. Retrieved July 29, 2013, from http://www.zdnet.com/byod-north-america-and-asia-embrace-it-western-europe-not-so-much- 7000016802/
-
(2013)
ZDNet
-
-
Nusca, A.1
-
9
-
-
84921805517
-
CIOs in Asia-Pacific are embracing BYOD
-
Osman, H. (2013). CIOs in Asia-Pacific are embracing BYOD. Computerworld Philippines, 22(5), 41-41.
-
(2013)
Computerworld Philippines
, vol.22
, Issue.5
, pp. 41
-
-
Osman, H.1
-
10
-
-
84921800474
-
IBM Connection 2013: BYOD at IBM
-
Retrieved July 29, 2013
-
Pepin, C. (2013). IBM Connection 2013: BYOD at IBM. Slideshare IBM Network. Retrieved July 29, 2013, from http://www.slideshare.net/chrispepin/ibm-connect-2013-byod-at-ibm
-
(2013)
Slideshare IBM Network
-
-
Pepin, C.1
-
11
-
-
84921758073
-
BYOD on rise in Asia, but challenges remain
-
Retrieved July 29, 2013
-
Qing, L. Y. (2013). BYOD on rise in Asia, but challenges remain. ZDNet. Retrieved July 29, 2013, from http://www.zdnet.com/byod-on-rise-in-asia-but-challenges-remain-7000010660/
-
(2013)
ZDNet
-
-
Qing, L.Y.1
-
13
-
-
84857696369
-
BYOD: Enabling the chaos
-
Thomson, G. (2012). BYOD: Enabling the chaos. Network Security, 2012(2), 5-8.
-
(2012)
Network Security
, vol.2012
, Issue.2
, pp. 5-8
-
-
Thomson, G.1
-
15
-
-
84921772354
-
Understanding BYOD legal issues under European privacy and data protection law
-
Retrieved July 29, 2013
-
Vandendriessche, J. (2012). Understanding BYOD legal issues under European privacy and data protection law. ISACA. Retrieved July 29, 2013, from http://www.slideshare.net/Johan_Vdd/understanding-byod-legal-issuesunder- european-privacy-and-data-protection-law
-
(2012)
ISACA
-
-
Vandendriessche, J.1
|