Information technology security policies are designed explicitly to protect IT systems. However, overly restrictive information security policies may be inadvertently creating an unforeseen information risk by encouraging users to bypass protected systems in favor of personal devices, where the potential loss of organizational intellectual property is greater. Organizations that implement overly restrictive web filtering, website blocking, and other security measures to protect the integrity of their information systems are likely introducing a risk that sensitive or protected information will be processed on personal devices, outside of the organizational framework, as users identify the most efficient and effective way to accomplish work-...
Nowadays, information technology (IT) has become an integral part of our everyday life. In both the ...
© 2015 Daniel Alejandro ArreguiBYOD is a trend in organizations to allow employees, contractors and ...
With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has simplified com...
Information technology security policies are designed explicitly to protect IT systems. However, ove...
Companies are increasing their investment in technologies to enable better access to information and...
Organisations that allow employees to Bring Your Own Device (BYOD) in the workplace trade off the co...
The protection of proprietary information that users print from their information systems is a signi...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
In this work we address the main issues of Information Technology (IT) consumerization that are rela...
Organizations face new and growing security challenges as consumer technology continues to be integr...
The Internet and information technology have influenced human life significantly. However, informati...
The adoption of computer and internet technology has greatly improved the way businesses operate. Ho...
Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile d...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, t...
Nowadays, information technology (IT) has become an integral part of our everyday life. In both the ...
© 2015 Daniel Alejandro ArreguiBYOD is a trend in organizations to allow employees, contractors and ...
With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has simplified com...
Information technology security policies are designed explicitly to protect IT systems. However, ove...
Companies are increasing their investment in technologies to enable better access to information and...
Organisations that allow employees to Bring Your Own Device (BYOD) in the workplace trade off the co...
The protection of proprietary information that users print from their information systems is a signi...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
In this work we address the main issues of Information Technology (IT) consumerization that are rela...
Organizations face new and growing security challenges as consumer technology continues to be integr...
The Internet and information technology have influenced human life significantly. However, informati...
The adoption of computer and internet technology has greatly improved the way businesses operate. Ho...
Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile d...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, t...
Nowadays, information technology (IT) has become an integral part of our everyday life. In both the ...
© 2015 Daniel Alejandro ArreguiBYOD is a trend in organizations to allow employees, contractors and ...
With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has simplified com...