3,886
Views
14
CrossRef citations to date
0
Altmetric
Review

BYOD Policy Compliance: Risks and Strategies in Organizations

, & ORCID Icon

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (4)

Lakshmi Goel, Justin Zuopeng Zhang & Steven Williamson. (2023) IT assimilation: construct, measurement, and implications in cybersecurity. Enterprise Information Systems 17:7.
Read now
Lakshmi Goel, Justin Zuopeng Zhang & Steven Williamson. (2023) Work-to-Home Cybersecurity Spillover: Construct Development and Validation. Information Systems Management 40:3, pages 290-300.
Read now
Rathika Palanisamy, Azah Anir Norman & Miss Laiha Mat Kiah. (2023) Employees’ BYOD Security Policy Compliance in the Public Sector. Journal of Computer Information Systems 0:0, pages 1-16.
Read now
Rathika Palanisamy, Azah Anir Norman & Laiha Mat Kiah. (2021) BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts. Journal of Organizational Computing and Electronic Commerce 31:4, pages 320-342.
Read now

Articles from other publishers (10)

Nikhil Patel, Sandeep Trivedi & Nuruzzaman Faruqui. (2023) A Novel Sedentary Workforce Scheduling Optimization Algorithm using 2 nd Order Polynomial Kernel . A Novel Sedentary Workforce Scheduling Optimization Algorithm using 2 nd Order Polynomial Kernel .
Hao Chen & Yufei Yuan. (2022) The impact of ignorance and bias on information security protection motivation: a case of e-waste handling. Internet Research.
Crossref
Ayesha Sajid & Yousra Javed. (2022) Sector-wise Investigation of BYOD Security Policies in Pakistan. Sector-wise Investigation of BYOD Security Policies in Pakistan.
Kathleen Downer & Maumita Bhattacharya. (2022) BYOD Security: A Study of Human Dimensions. Informatics 9:1, pages 16.
Crossref
Mohamad Rahimi Mohamad Rosman, Nurfatihah S Baharuddin, Noor Azreen Alimin, Nik Nur Izzati Nik Rosli, Amira Idayu Mohd Shukry & Noor Masliana Razlan. (2022) Bring-Your-Own-Device (BYOD) and Productivity: A Conceptual Framework. Bring-Your-Own-Device (BYOD) and Productivity: A Conceptual Framework.
Chang Hai Goh & Ai Ping Teoh. (2021) Determining Bring Your Own Device (Byod) Security Policy Compliance Among Malaysian Teleworkers: Perceived Cybersecurity Governance as Moderator. Determining Bring Your Own Device (Byod) Security Policy Compliance Among Malaysian Teleworkers: Perceived Cybersecurity Governance as Moderator.
Yves Barlette, Annabelle Jaouen & Paméla Baillette. (2021) Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers’ coping strategies. International Journal of Information Management 56, pages 102212.
Crossref
Noor Ashitah Abu Othman, Azah Anir Norman & Miss Laiha Mat Kiah. (2021) Information System Audit for Mobile Device Security Assessment. Information System Audit for Mobile Device Security Assessment.
R. Thamilselvan, K. Tamil Selvi, C. Mahalakshmi, N. Sanjeev & Yogesh Bala. Android security: State of art and challenges. Android security: State of art and challenges.
Daniel Morato Oses, Eduardo Berrueta, Eduardo Magaña & Mikel Izal. (2022) A Chronological Evolution Model for Crypto-Ransomware Detection Based on Encrypted File-Sharing Traffic. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.