BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY

Bring Your Own Device is a fast and recent growing trend. It has evolved as a environment which allows employees to use their personal devices to access company. Organizations have started to use BYOD to cut the cost to company on devices and to improve employee productivity. For an organization, th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:NeuroQuantology 2022-01, Vol.20 (15), p.849
Hauptverfasser: Mohammed Rahmat Ali, Pathan Ahmed Khan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 15
container_start_page 849
container_title NeuroQuantology
container_volume 20
creator Mohammed Rahmat Ali
Pathan Ahmed Khan
description Bring Your Own Device is a fast and recent growing trend. It has evolved as a environment which allows employees to use their personal devices to access company. Organizations have started to use BYOD to cut the cost to company on devices and to improve employee productivity. For an organization, this brings some opportunities and security risks. The establishment of BYOD policies always be a tough task, as an organization needs to avoid security risks and increase employee productivity. However, the associated security risks with BYOD policy can be managed by developing an effective security policy and adopt some technical security control and procedures. This paper covers the review of current BYOD security challenges and issues, security solutions and policy best practices in organizational perspective. Moreover, a comprehensive security policy model presented and discussed.
doi_str_mv 10.14704/NQ.2022.20.15.NQ88081
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2901673124</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2901673124</sourcerecordid><originalsourceid>FETCH-proquest_journals_29016731243</originalsourceid><addsrcrecordid>eNqNTDtOwzAYtiohUR5XQL_E3PDbSZp0dByHWGrt1HapzFIxlKFCFBo6sPU0PRgnwVQcoMv30Pcg5I5iQrMCswc9TxgyFiGheaLnZYklHZAhTTEd5TTHS3LV9xvEvMDJeEi-q2Dqn8MROLjgvJxxrwTwrrOGixYaY4FrPg3PSj9GVcOTcgs-VSfvWwk-dBJMAzX3_FRQOo7-boyGysr4Ih0slW9BhEpacFIsrPLhhly8vrz169t_vib3jfSiHX3stp_7df-12mz3u_cYrdgE6bhIKcvS81q_XtJJCA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2901673124</pqid></control><display><type>article</type><title>BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Mohammed Rahmat Ali ; Pathan Ahmed Khan</creator><creatorcontrib>Mohammed Rahmat Ali ; Pathan Ahmed Khan</creatorcontrib><description>Bring Your Own Device is a fast and recent growing trend. It has evolved as a environment which allows employees to use their personal devices to access company. Organizations have started to use BYOD to cut the cost to company on devices and to improve employee productivity. For an organization, this brings some opportunities and security risks. The establishment of BYOD policies always be a tough task, as an organization needs to avoid security risks and increase employee productivity. However, the associated security risks with BYOD policy can be managed by developing an effective security policy and adopt some technical security control and procedures. This paper covers the review of current BYOD security challenges and issues, security solutions and policy best practices in organizational perspective. Moreover, a comprehensive security policy model presented and discussed.</description><identifier>EISSN: 1303-5150</identifier><identifier>DOI: 10.14704/NQ.2022.20.15.NQ88081</identifier><language>eng</language><publisher>Bornova Izmir: NeuroQuantology</publisher><subject>Access to information ; Best practice ; Communication ; Company structure ; Computer science ; Cybersecurity ; Data integrity ; Employees ; Engineering ; Internet ; Productivity ; Threats</subject><ispartof>NeuroQuantology, 2022-01, Vol.20 (15), p.849</ispartof><rights>Copyright NeuroQuantology 2022</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Mohammed Rahmat Ali</creatorcontrib><creatorcontrib>Pathan Ahmed Khan</creatorcontrib><title>BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY</title><title>NeuroQuantology</title><description>Bring Your Own Device is a fast and recent growing trend. It has evolved as a environment which allows employees to use their personal devices to access company. Organizations have started to use BYOD to cut the cost to company on devices and to improve employee productivity. For an organization, this brings some opportunities and security risks. The establishment of BYOD policies always be a tough task, as an organization needs to avoid security risks and increase employee productivity. However, the associated security risks with BYOD policy can be managed by developing an effective security policy and adopt some technical security control and procedures. This paper covers the review of current BYOD security challenges and issues, security solutions and policy best practices in organizational perspective. Moreover, a comprehensive security policy model presented and discussed.</description><subject>Access to information</subject><subject>Best practice</subject><subject>Communication</subject><subject>Company structure</subject><subject>Computer science</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Employees</subject><subject>Engineering</subject><subject>Internet</subject><subject>Productivity</subject><subject>Threats</subject><issn>1303-5150</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNqNTDtOwzAYtiohUR5XQL_E3PDbSZp0dByHWGrt1HapzFIxlKFCFBo6sPU0PRgnwVQcoMv30Pcg5I5iQrMCswc9TxgyFiGheaLnZYklHZAhTTEd5TTHS3LV9xvEvMDJeEi-q2Dqn8MROLjgvJxxrwTwrrOGixYaY4FrPg3PSj9GVcOTcgs-VSfvWwk-dBJMAzX3_FRQOo7-boyGysr4Ih0slW9BhEpacFIsrPLhhly8vrz169t_vib3jfSiHX3stp_7df-12mz3u_cYrdgE6bhIKcvS81q_XtJJCA</recordid><startdate>20220101</startdate><enddate>20220101</enddate><creator>Mohammed Rahmat Ali</creator><creator>Pathan Ahmed Khan</creator><general>NeuroQuantology</general><scope>3V.</scope><scope>7X7</scope><scope>7XB</scope><scope>88G</scope><scope>8FE</scope><scope>8FG</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>M0S</scope><scope>M2M</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PSYQQ</scope><scope>Q9U</scope></search><sort><creationdate>20220101</creationdate><title>BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY</title><author>Mohammed Rahmat Ali ; Pathan Ahmed Khan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_29016731243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access to information</topic><topic>Best practice</topic><topic>Communication</topic><topic>Company structure</topic><topic>Computer science</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Employees</topic><topic>Engineering</topic><topic>Internet</topic><topic>Productivity</topic><topic>Threats</topic><toplevel>online_resources</toplevel><creatorcontrib>Mohammed Rahmat Ali</creatorcontrib><creatorcontrib>Pathan Ahmed Khan</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Psychology Database (Alumni)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>ProQuest Psychology</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest One Psychology</collection><collection>ProQuest Central Basic</collection><jtitle>NeuroQuantology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mohammed Rahmat Ali</au><au>Pathan Ahmed Khan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY</atitle><jtitle>NeuroQuantology</jtitle><date>2022-01-01</date><risdate>2022</risdate><volume>20</volume><issue>15</issue><spage>849</spage><pages>849-</pages><eissn>1303-5150</eissn><abstract>Bring Your Own Device is a fast and recent growing trend. It has evolved as a environment which allows employees to use their personal devices to access company. Organizations have started to use BYOD to cut the cost to company on devices and to improve employee productivity. For an organization, this brings some opportunities and security risks. The establishment of BYOD policies always be a tough task, as an organization needs to avoid security risks and increase employee productivity. However, the associated security risks with BYOD policy can be managed by developing an effective security policy and adopt some technical security control and procedures. This paper covers the review of current BYOD security challenges and issues, security solutions and policy best practices in organizational perspective. Moreover, a comprehensive security policy model presented and discussed.</abstract><cop>Bornova Izmir</cop><pub>NeuroQuantology</pub><doi>10.14704/NQ.2022.20.15.NQ88081</doi></addata></record>
fulltext fulltext
identifier EISSN: 1303-5150
ispartof NeuroQuantology, 2022-01, Vol.20 (15), p.849
issn 1303-5150
language eng
recordid cdi_proquest_journals_2901673124
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Access to information
Best practice
Communication
Company structure
Computer science
Cybersecurity
Data integrity
Employees
Engineering
Internet
Productivity
Threats
title BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T00%3A21%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=BYOD%E2%80%A6%20A%20SYSTEMATIC%20APPROACH%20FOR%20ANALYZING%20AND%20VISUALIZING%20THE%20TYPE%20OF%20DATA%20AND%20INFORMATION%20BREACHES%20WITH%20CYBER%20SECURITY&rft.jtitle=NeuroQuantology&rft.au=Mohammed%20Rahmat%20Ali&rft.date=2022-01-01&rft.volume=20&rft.issue=15&rft.spage=849&rft.pages=849-&rft.eissn=1303-5150&rft_id=info:doi/10.14704/NQ.2022.20.15.NQ88081&rft_dat=%3Cproquest%3E2901673124%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2901673124&rft_id=info:pmid/&rfr_iscdi=true