BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY
Bring Your Own Device is a fast and recent growing trend. It has evolved as a environment which allows employees to use their personal devices to access company. Organizations have started to use BYOD to cut the cost to company on devices and to improve employee productivity. For an organization, th...
Gespeichert in:
Veröffentlicht in: | NeuroQuantology 2022-01, Vol.20 (15), p.849 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 15 |
container_start_page | 849 |
container_title | NeuroQuantology |
container_volume | 20 |
creator | Mohammed Rahmat Ali Pathan Ahmed Khan |
description | Bring Your Own Device is a fast and recent growing trend. It has evolved as a environment which allows employees to use their personal devices to access company. Organizations have started to use BYOD to cut the cost to company on devices and to improve employee productivity. For an organization, this brings some opportunities and security risks. The establishment of BYOD policies always be a tough task, as an organization needs to avoid security risks and increase employee productivity. However, the associated security risks with BYOD policy can be managed by developing an effective security policy and adopt some technical security control and procedures. This paper covers the review of current BYOD security challenges and issues, security solutions and policy best practices in organizational perspective. Moreover, a comprehensive security policy model presented and discussed. |
doi_str_mv | 10.14704/NQ.2022.20.15.NQ88081 |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2901673124</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2901673124</sourcerecordid><originalsourceid>FETCH-proquest_journals_29016731243</originalsourceid><addsrcrecordid>eNqNTDtOwzAYtiohUR5XQL_E3PDbSZp0dByHWGrt1HapzFIxlKFCFBo6sPU0PRgnwVQcoMv30Pcg5I5iQrMCswc9TxgyFiGheaLnZYklHZAhTTEd5TTHS3LV9xvEvMDJeEi-q2Dqn8MROLjgvJxxrwTwrrOGixYaY4FrPg3PSj9GVcOTcgs-VSfvWwk-dBJMAzX3_FRQOo7-boyGysr4Ih0slW9BhEpacFIsrPLhhly8vrz169t_vib3jfSiHX3stp_7df-12mz3u_cYrdgE6bhIKcvS81q_XtJJCA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2901673124</pqid></control><display><type>article</type><title>BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Mohammed Rahmat Ali ; Pathan Ahmed Khan</creator><creatorcontrib>Mohammed Rahmat Ali ; Pathan Ahmed Khan</creatorcontrib><description>Bring Your Own Device is a fast and recent growing trend. It has evolved as a environment which allows employees to use their personal devices to access company. Organizations have started to use BYOD to cut the cost to company on devices and to improve employee productivity. For an organization, this brings some opportunities and security risks. The establishment of BYOD policies always be a tough task, as an organization needs to avoid security risks and increase employee productivity. However, the associated security risks with BYOD policy can be managed by developing an effective security policy and adopt some technical security control and procedures. This paper covers the review of current BYOD security challenges and issues, security solutions and policy best practices in organizational perspective. Moreover, a comprehensive security policy model presented and discussed.</description><identifier>EISSN: 1303-5150</identifier><identifier>DOI: 10.14704/NQ.2022.20.15.NQ88081</identifier><language>eng</language><publisher>Bornova Izmir: NeuroQuantology</publisher><subject>Access to information ; Best practice ; Communication ; Company structure ; Computer science ; Cybersecurity ; Data integrity ; Employees ; Engineering ; Internet ; Productivity ; Threats</subject><ispartof>NeuroQuantology, 2022-01, Vol.20 (15), p.849</ispartof><rights>Copyright NeuroQuantology 2022</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Mohammed Rahmat Ali</creatorcontrib><creatorcontrib>Pathan Ahmed Khan</creatorcontrib><title>BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY</title><title>NeuroQuantology</title><description>Bring Your Own Device is a fast and recent growing trend. It has evolved as a environment which allows employees to use their personal devices to access company. Organizations have started to use BYOD to cut the cost to company on devices and to improve employee productivity. For an organization, this brings some opportunities and security risks. The establishment of BYOD policies always be a tough task, as an organization needs to avoid security risks and increase employee productivity. However, the associated security risks with BYOD policy can be managed by developing an effective security policy and adopt some technical security control and procedures. This paper covers the review of current BYOD security challenges and issues, security solutions and policy best practices in organizational perspective. Moreover, a comprehensive security policy model presented and discussed.</description><subject>Access to information</subject><subject>Best practice</subject><subject>Communication</subject><subject>Company structure</subject><subject>Computer science</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Employees</subject><subject>Engineering</subject><subject>Internet</subject><subject>Productivity</subject><subject>Threats</subject><issn>1303-5150</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNqNTDtOwzAYtiohUR5XQL_E3PDbSZp0dByHWGrt1HapzFIxlKFCFBo6sPU0PRgnwVQcoMv30Pcg5I5iQrMCswc9TxgyFiGheaLnZYklHZAhTTEd5TTHS3LV9xvEvMDJeEi-q2Dqn8MROLjgvJxxrwTwrrOGixYaY4FrPg3PSj9GVcOTcgs-VSfvWwk-dBJMAzX3_FRQOo7-boyGysr4Ih0slW9BhEpacFIsrPLhhly8vrz169t_vib3jfSiHX3stp_7df-12mz3u_cYrdgE6bhIKcvS81q_XtJJCA</recordid><startdate>20220101</startdate><enddate>20220101</enddate><creator>Mohammed Rahmat Ali</creator><creator>Pathan Ahmed Khan</creator><general>NeuroQuantology</general><scope>3V.</scope><scope>7X7</scope><scope>7XB</scope><scope>88G</scope><scope>8FE</scope><scope>8FG</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>M0S</scope><scope>M2M</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PSYQQ</scope><scope>Q9U</scope></search><sort><creationdate>20220101</creationdate><title>BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY</title><author>Mohammed Rahmat Ali ; Pathan Ahmed Khan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_29016731243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access to information</topic><topic>Best practice</topic><topic>Communication</topic><topic>Company structure</topic><topic>Computer science</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Employees</topic><topic>Engineering</topic><topic>Internet</topic><topic>Productivity</topic><topic>Threats</topic><toplevel>online_resources</toplevel><creatorcontrib>Mohammed Rahmat Ali</creatorcontrib><creatorcontrib>Pathan Ahmed Khan</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Psychology Database (Alumni)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>ProQuest Psychology</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest One Psychology</collection><collection>ProQuest Central Basic</collection><jtitle>NeuroQuantology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mohammed Rahmat Ali</au><au>Pathan Ahmed Khan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY</atitle><jtitle>NeuroQuantology</jtitle><date>2022-01-01</date><risdate>2022</risdate><volume>20</volume><issue>15</issue><spage>849</spage><pages>849-</pages><eissn>1303-5150</eissn><abstract>Bring Your Own Device is a fast and recent growing trend. It has evolved as a environment which allows employees to use their personal devices to access company. Organizations have started to use BYOD to cut the cost to company on devices and to improve employee productivity. For an organization, this brings some opportunities and security risks. The establishment of BYOD policies always be a tough task, as an organization needs to avoid security risks and increase employee productivity. However, the associated security risks with BYOD policy can be managed by developing an effective security policy and adopt some technical security control and procedures. This paper covers the review of current BYOD security challenges and issues, security solutions and policy best practices in organizational perspective. Moreover, a comprehensive security policy model presented and discussed.</abstract><cop>Bornova Izmir</cop><pub>NeuroQuantology</pub><doi>10.14704/NQ.2022.20.15.NQ88081</doi></addata></record> |
fulltext | fulltext |
identifier | EISSN: 1303-5150 |
ispartof | NeuroQuantology, 2022-01, Vol.20 (15), p.849 |
issn | 1303-5150 |
language | eng |
recordid | cdi_proquest_journals_2901673124 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Access to information Best practice Communication Company structure Computer science Cybersecurity Data integrity Employees Engineering Internet Productivity Threats |
title | BYOD… A SYSTEMATIC APPROACH FOR ANALYZING AND VISUALIZING THE TYPE OF DATA AND INFORMATION BREACHES WITH CYBER SECURITY |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T00%3A21%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=BYOD%E2%80%A6%20A%20SYSTEMATIC%20APPROACH%20FOR%20ANALYZING%20AND%20VISUALIZING%20THE%20TYPE%20OF%20DATA%20AND%20INFORMATION%20BREACHES%20WITH%20CYBER%20SECURITY&rft.jtitle=NeuroQuantology&rft.au=Mohammed%20Rahmat%20Ali&rft.date=2022-01-01&rft.volume=20&rft.issue=15&rft.spage=849&rft.pages=849-&rft.eissn=1303-5150&rft_id=info:doi/10.14704/NQ.2022.20.15.NQ88081&rft_dat=%3Cproquest%3E2901673124%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2901673124&rft_id=info:pmid/&rfr_iscdi=true |