Does BYOD increase risks or drive benefits
暂无分享,去创建一个
[1] Brent Gatewood. The nuts and bolts of making BYOD work , 2012 .
[2] Henri Barki,et al. User Participation in Information Systems Security Risk Management , 2010, MIS Q..
[3] BarkiHenri,et al. User participation in information systems security risk management , 2010 .
[4] Atif Ahmad,et al. Incorporating a knowledge perspective into security risk assessments , 2011 .
[5] Daniel Minoli,et al. Information Security Risk Management , 2009 .
[6] Mikko T. Siponen,et al. Information security standards focus on the existence of process, not its content , 2006, CACM.
[7] Andrew Blyth,et al. Threat Assessment: Assessing cyber-threats in the information environment , 2004 .
[8] Mike Potts. The state of information security , 2012, Netw. Secur..
[9] Stefan Stieglitz,et al. Increasing Organizational Performance by Transforming into a Mobile Enterprise , 2012, MIS Q. Executive.
[10] Saonee Sarker,et al. Managing Employees' Use of Mobile Technologies to Minimize Work-Life Balance Impacts , 2012, MIS Q. Executive.
[11] Donn B. Parker,et al. Risks of risk-based security , 2007, Commun. ACM.
[12] Atif Ahmad,et al. Risk Management Standards - The Perception of Ease of Use , 2006 .