Security attacks taxonomy on bring your own devices (BYOD) model
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenue...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wireilla
2014
|
Subjects: | |
Online Access: | http://eprints.usm.my/47317/1/SECURITY_ATTACKS_TAXONOMY_ON_BRING_YOUR.pdf http://eprints.usm.my/47317/ https://wireilla.com/ijmnct/vol4.html |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Sains Malaysia |
Language: | English |
Be the first to leave a comment!