1,829
Views
47
CrossRef citations to date
0
Altmetric
Articles

Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments

, , &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (6)

Melva Ratchford, Omar El-Gayar, Cherie Noteboom & Yong Wang. (2022) BYOD security issues: a systematic literature review. Information Security Journal: A Global Perspective 31:3, pages 253-273.
Read now
Rathika Palanisamy, Azah Anir Norman & Miss Laiha Mat Kiah. (2022) BYOD Policy Compliance: Risks and Strategies in Organizations. Journal of Computer Information Systems 62:1, pages 61-72.
Read now
Vincent Cho & W.H. Ip. (2018) A Study of BYOD adoption from the lens of threat and coping appraisal of its security policy. Enterprise Information Systems 12:6, pages 659-673.
Read now
Paul Benjamin Lowry, Tamara Dinev & Robert Willison. (2017) Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. European Journal of Information Systems 26:6, pages 546-563.
Read now
Kallol Bagchi. (2015) Editorial Preface. Journal of Information Privacy and Security 11:1, pages 1-2.
Read now

Articles from other publishers (41)

Christopher Ifeanyi Eke, Azah Anir Norman & Mwenge Mulenga. (2023) Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review. Artificial Intelligence Review 56:8, pages 8815-8858.
Crossref
Rajkumar Masih, Shadab Alam, Sazia Tabassum, Mohammed Shuaib & Sadaf Ahmad. (2023) An Analysis of the Significant Role Played by Mobile Cloud Forensics and its Key Obstacles. An Analysis of the Significant Role Played by Mobile Cloud Forensics and its Key Obstacles.
Jimshith. V.T & V.Mary Amala Bai. (2023) Analysis of Security and Privacy Challenges Associated with Byod in the Education Sector: State-of-the-Art Strategy. Analysis of Security and Privacy Challenges Associated with Byod in the Education Sector: State-of-the-Art Strategy.
Khalid Almarhabi, Adel Bahaddad & Ahmed Mohammed Alghamdi. (2023) Security management of BYOD and cloud environment in Saudi Arabia. Alexandria Engineering Journal 63, pages 103-114.
Crossref
Praveen K. Choudhary, Susmi Routray, Parijat Upadhyay & A.K. Pani. (2022) Adoption of enterprise mobile systems – An alternative theoretical perspective. International Journal of Information Management 67, pages 102539.
Crossref
Iris Junglas, Lakshmi Goel, Sven-V. Rehm & Blake Ives. (2022) On the benefits of consumer IT in the workplace—An IT empowerment perspective. International Journal of Information Management 64, pages 102478.
Crossref
Zauwiyah Ahmad, Thian Song Ong, Yen Wen Gan, Tze Hui Liew & Mariati Norhashim. (2022) Predictors of Employees’ Mobile Security Practice: An Analysis of Personal and Work-Related Variables. Applied Sciences 12:9, pages 4198.
Crossref
Kelly M. Torres & Aubrey Statti. 2022. Research Anthology on Human Resource Practices for the Modern Workforce. Research Anthology on Human Resource Practices for the Modern Workforce 588 605 .
Khalid AlmarhabiAliAli. (2022) Managing access control issues in the choose your own device environment. Thermal Science 26:Spec. issue 1, pages 445-455.
Crossref
Mengsi Zhang. 2022. Innovative Computing. Innovative Computing 1351 1358 .
Monique Janneck & Anna Steidle. 2022. Handbuch Gesundheitsförderung bei der Arbeit. Handbuch Gesundheitsförderung bei der Arbeit 251 265 .
Jessica Lichy. 2022. The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs. The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs 83 96 .
Hao Chen, Ying Li, Lirong Chen & Jin Yin. (2020) Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue. Journal of Enterprise Information Management 34:3, pages 770-792.
Crossref
Lizzy Oluwatoyin Ofusori, Ncamiso Nkululeko Jahalenkhosi Dlamini & Prabhakar Rontala Subramaniam. 2021. Research Anthology on Securing Mobile Technologies and Applications. Research Anthology on Securing Mobile Technologies and Applications 194 222 .
Kelly M. Torres & Aubrey Statti. 2021. Designing and Implementing HR Management Systems in Family Businesses. Designing and Implementing HR Management Systems in Family Businesses 83 100 .
Monique Janneck & Anna Steidle. 2020. Handbuch Gesundheitsförderung bei der Arbeit. Handbuch Gesundheitsförderung bei der Arbeit 1 16 .
Denis Obrezkov, Karsten Sohr & Rainer Malaka. 2021. Trust, Privacy and Security in Digital Business. Trust, Privacy and Security in Digital Business 126 139 .
Jessica Lichy. 2020. The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs. The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs 1 14 .
Rathika Palanisamy, Azah Anir Norman & Miss Laiha Mat Kiah. (2020) Compliance with bring your own device security policies in organizations: A systematic literature review. Computers & Security 98, pages 101998.
Crossref
António Lima, Luis Rosa, Tiago Cruz & Paulo Simões. (2020) A Security Monitoring Framework for Mobile Devices. Electronics 9:8, pages 1197.
Crossref
Jessica Lichy, Maher Kachour & Christophe Chesneau. (2020) Networking or Not-working: Managing ‘Bring Your Own Devices’ for French Gen X employees. Gestion 2000 Volume 37:1, pages 117-148.
Crossref
Hina Batool & Ammar Masood. (2020) Enterprise Mobile Device Management Requirements and Features. Enterprise Mobile Device Management Requirements and Features.
Robert Costello. 2020. Gamification Strategies for Retention, Motivation, and Engagement in Higher Education. Gamification Strategies for Retention, Motivation, and Engagement in Higher Education 145 173 .
Devasheesh P. Bhave, Laurel H. Teo & Reeshad S. Dalal. (2019) Privacy at Work: A Review and a Research Agenda for a Contested Terrain. Journal of Management 46:1, pages 127-164.
Crossref
Benoit A. Aubert & Suzanne Rivard. 2020. Information Systems Outsourcing. Information Systems Outsourcing 43 59 .
Dalal N. Alharthi, Mahmoud M. Hammad & Amelia C. Regan. 2020. Advances in Information and Communication. Advances in Information and Communication 27 41 .
Christian Matt, Manuel Trenz, Christy M. K. Cheung & Ofir Turel. (2019) The digitization of the individual: conceptual foundations and opportunities for research. Electronic Markets 29:3, pages 315-322.
Crossref
Alfred Musarurwa, Stephen Flowerday & Liezel Cilliers. (2019) The bring‐your‐own‐device unintended administrator: A perspective from Zimbabwe. The Electronic Journal of Information Systems in Developing Countries 85:4.
Crossref
Lixuan Zhang Zhang, Matthew Mouritsen & Jeffrey R. Miller. (2019) Role of Perceived Value in Acceptance of “Bring Your Own Device” Policy. Journal of Organizational and End User Computing 31:2, pages 65-82.
Crossref
Mary B. Burns & Amy Igou. (2019) “Alexa, Write an Audit Opinion”: Adopting Intelligent Virtual Assistants in Accounting Workplaces. Journal of Emerging Technologies in Accounting 16:1, pages 81-92.
Crossref
António Lima, Pedro Borges, Bruno Sousa, Paulo Simões & Tiago Cruz. 2018. Mobile Apps Engineering. Mobile Apps Engineering 1 34 .
Praveen Choudhary, Monika Mital, Ashis Kumar Pani, Armando Papa & Francesca Vicentini. (2018) Impact of enterprise mobile system implementation on organizational ambidexterity mediated through BPM customizability. Business Process Management Journal 24:5, pages 1235-1254.
Crossref
Anthony Duke Giwah. (2018) User Information Security Behavior Towards Data Breach in Bring Your Own Device (BYOD) Enabled Organizations - Leveraging Protection Motivation Theory. User Information Security Behavior Towards Data Breach in Bring Your Own Device (BYOD) Enabled Organizations - Leveraging Protection Motivation Theory.
Lizzy Oluwatoyin Ofusori, Ncamiso Nkululeko Jahalenkhosi Dlamini & Prabhakar Rontala Subramaniam. 2018. Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution. Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution 205 233 .
Filipe Portela, Ailton Moreira da Veiga & Manuel Filipe Santos. 2018. Next-Generation Mobile and Pervasive Healthcare Solutions. Next-Generation Mobile and Pervasive Healthcare Solutions 32 45 .
Abubakar Garba Bello, David Murray & Jocelyn Armarego. (2017) A systematic approach to investigating how information security and privacy can be achieved in BYOD environments. Information & Computer Security 25:4, pages 475-492.
Crossref
Mohamed Amoud & Ounsa Roudies. (2017) Experiences in Secure Integration of Byod. Experiences in Secure Integration of Byod.
Yung Shin Van Der Sype, Jonathan Guislain, Jean-Marc Seigneur & Xavier Titi. 2017. Data Protection and Privacy: (In)visibilities and Infrastructures. Data Protection and Privacy: (In)visibilities and Infrastructures 241 269 .
Tanty Oktavia, Yanti Tjong, Harjanto Prabowo & Meyliana. (2016) Security and privacy challenge in Bring Your Own Device environment: A Systematic Literature Review. Security and privacy challenge in Bring Your Own Device environment: A Systematic Literature Review.
Meredydd Williams, Louise Axon, Jason R. C. Nurse & Sadie Creese. (2016) Future scenarios and challenges for security and privacy. Future scenarios and challenges for security and privacy.
Noluvuyo Fani, Rossouw von Solms & Mariana Gerber. (2016) A framework towards governing “Bring Your Own Device in SMMEs”. A framework towards governing “Bring Your Own Device in SMMEs”.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.