REFERENCES
- Anderson, N. (2012). Cisco bring your own device: Device freedom without compromising the IT network. San Jose, CA: Cisco Systems.
- Angwin, J., & Devries, J. V. (2011, April 22). Apple, Google collect user data. Wall Street Journal. Retrieved from www.wsj.com/articles/SB10001424052748703983704576277101723453610
- Avanade. (2012). Global survey: Dispelling six myths of consumerization of IT. Retrieved from www.avanade.com/Documents/Resources/consumerization-of-it-executive-summary.pdf
- Bradley, J., Loucks, J., Macaulay, J., Medcalf, R., & Buckalew, L. (2013). BYOD: A global perspective, harnessing employee-led innovation, Cisco IBSG Horizons. Retrieved from http://www.cisco.com/web/about/ac79/docs/re/BYOD_Horizons-Global.pdf
- Christopher, J. (2012). BYOD: A perilous path. Tempe, AZ: University of Advancing Technology.
- Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the Choicepoint and TJX data breaches. MIS Quarterly, 33(4), 673–687.
- Dhingra, V., & Arora, A. (2008, July). Pervasive computing: Paradigm for new era computing. Paper presented at the Emerging Trends in Engineering and Technology 2008 (ICETET ‘08) First International Conference, Nagpur, Maharashtra.
- Dutta, S., & Mathur, R. (2012, March). Cybersecurity—An integral part of STEM. Paper presented at the Integrated STEM education conference (ISEC), Ewing, NJ.
- Elson, R. J., & LeClerc, R. (2006). Customer information: Protecting the organization’s most critical asset from misappropriation and identity theft. Journal of Information Privacy and Security, 2(1), 3–15.
- Forman, G. H., & Zahorjan, J. (1994). The challenges of mobile computing. Computer, 27(4), 38–47.
- Fortinet. (2012). Fortinet global survey reveals ‘first generation’ BYOD workers pose serious security challenges to corporate IT systems. Retrieved from www.fortinet.com/press_releases/120619.html
- Fripp, C. (2011). Mobile and network policies could attract young talent to companies. Retrieved from www.itnewsafrica.com/2011/12/mobile-and-network-policies-could-attract-young-talent-to-companies/
- Gens, F., Levitas, D., & Segal, R. (2011). (2011 Consumerization of IT study: Closing the consumerization gap. Framingham, MA: International Data Corporation (IDC).
- Guan, L. (2012). Established BYOD management policies needed. Government News, 32(2), 9.
- Harris, C. (2012). Mobile consumerization trends & perceptions: IT Executive and CEO Survey. New York, NY: Decisive Analytics, LLC.
- Hayes, B., & Kotwica, K. (2013). Bring your own device (BYOD) to work: Trend report. Oxford, UK: Elsevier.
- iPass. (2011). The iPass global mobile workforce report: Understanding enterprise mobility trends and mobile usage. Retrieved from www.wballiance.com/wba/wp-content/uploads/downloads/2012/07/ipass_mobileworkforcereport_q4_2011.pdf
- Jain, A. K., & Shanbhag, D. (2012). Addressing security and privacy risks in mobile applications. IT Professional, 14(5), 28–33.
- Johnson, A. M. (2009). Business and security executives views of information security investment drivers: Results from a delphi study. Journal of Information Privacy and Security, 5(1), 3–27.
- Kamau, W. T. (2013). The bring your own device phenomena: Balancing productivity and corporate data security. Nairobi, Kenya: University of Nairobi.
- Kaspersky Lab. (2012). Kaspersky lab outlines key security trends in 2012: Predicts core threats for 2013. Retrieved from http://usa.kaspersky.com/about-us/press-center/press-releases/kaspersky-lab-outlines-key-security-trends-2012-predicts-core-t
- Keyes, J. (2013). Bring your own devices (BYOD) survival guide. Boca Raton, FL: CRC Press.
- Meru Networks. (2012). BYOD best practices, requirements and challenges. Retrieved from www.merunetworks.com/collateral/white-papers/2012-wp-byod-implementation-whitepaper-for-wlan-security.pdf.pdf
- Miller, K. W., Voas, J., & Hurlburt, G. F. (2012). BYOD: Security and privacy considerations. IT Professional, 14(5), 53–55.
- Niehaves, B., Koffer, S., & Ortbach, K. (2012, August). IT consumerization: A theory and practice review. Paper presented at the AMCIS 2012 Proceedings, Seattle, WA.
- Nitin, B. (2012). Mobile security strategies: Threats, solutions & market forecasts 2012–2017. Hampshire, UK: Basingstoke.
- Noda, T. (2013). Solving BYOD issues a must says HP. Retrieved from www.philstar.com/business/2013/03/16/920437/solving-byod-issues-must-says-hp
- Pfleeger, C. P., & Shari, L. P. (2006). Security in computing. Upper Saddle River, NJ: Prentice Hall PTR.
- Rhee, K., Jeon, W., & Won, D. (2012). Security requirements of a mobile device management system. International Journal of Security and Its Applications, 6(2), 353–358.
- Rivera, D., George, G., Peter, P., Muralidharan, S., & Khanum, S. (2013). Analysis of security controls for BYOD (bring your own device). Melbourne, Australia: The University of Melbourne.
- Rose, C. (2013). BYOD: An examination of bring your own device in business. Review of Business Information Systems (RBIS), 17(2), 65–70.
- Scarfo, A. (2012, November). New security perspectives around BYOD. Paper presented at the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, Victoria, BC.
- Shawn F. C., Ryan T. W., & Ronald E. P. (2010). Employee information privacy concerns with employer held data: A comparison of two prevalent privacy models. Journal of Information Privacy and Security, 6(3), 47–71.
- Sheng, H., Nah, F. F.-H., & Siau, K. (2005). Strategic implications of mobile technology: A case study using value-focused thinking. Journal of Strategic Information Systems, 14(3), 269–290.
- Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.
- Stagliano, T., DiPoalo, A., & Coonelly, P. (2013). Consumerization of IT, La Salle University Digital Commons Graduate Annual, 1(1), 1–43.
- Tokuyoshi, B. (2013). The security implications of BYOD. Network Security, 2013(4), 12–13.
- Whitman, M. E., & Mattord, H. J. (2010). Principles of information security. Boston MA: Cengage Learning.
- Willis, D. A. (2012). Gartner publishes ‘Bring your own device: New opportunities, new challenges’ report. Entertainment Close-Up. Retrieved from http://www.decorus.com/wp-content/uploads/2011/12/bring_your_own_device_new_op_238131.pdf