BYOD: A Security Policy Evaluation Model View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018

AUTHORS

Melva M. Ratchford

ABSTRACT

The rapid increase of personal mobile devices (mainly smartphones and tablets) accessing corporate data has created a phenomenon commonly known as Bring Your Own Device (BYOD). Companies that allow the use of BYODs need to be aware of the risks of exposing their business to inadvertent data leakage or malicious intent posed by inside or outside threats. The adoption of BYOD policies mitigates these types of risks. However, many companies have weak policies, and the problem of exposure of corporate data persists. This paper addresses this problem by proposing a BYOD policy evaluation method to help companies to strengthen their BYOD policies. This initial research proposes a novel BYOD security policy evaluation model that aims to identify weaknesses in BYOD policies using mathematical comparisons. The results are measurable and provide specific recommendations to strengthen a BYOD policy. Further research is needed in order to demonstrate the viability and effectiveness of this model. More... »

PAGES

215-220

Book

TITLE

Information Technology - New Generations

ISBN

978-3-319-54977-4
978-3-319-54978-1

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-54978-1_30

DOI

http://dx.doi.org/10.1007/978-3-319-54978-1_30

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1090745841


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1503", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Business and Management", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/15", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Commerce, Management, Tourism and Services", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Dakota State University", 
          "id": "https://www.grid.ac/institutes/grid.254833.b", 
          "name": [
            "Dakota State University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ratchford", 
        "givenName": "Melva M.", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/2659651.2659742", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1008027748"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/s1353-4858(12)70013-2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016328951"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/0167-4048(96)81706-8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1024102992"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.3233/jcs-2007-15201", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1027079836"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2693208.2693231", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1028285157"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1201/9780203490426", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039360897"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mitp.2012.93", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061407381"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/ccnc.2014.6866552", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093774521"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2018", 
    "datePublishedReg": "2018-01-01", 
    "description": "The rapid increase of personal mobile devices (mainly smartphones and tablets) accessing corporate data has created a phenomenon commonly known as Bring Your Own Device (BYOD). Companies that allow the use of BYODs need to be aware of the risks of exposing their business to inadvertent data leakage or malicious intent posed by inside or outside threats. The adoption of BYOD policies mitigates these types of risks. However, many companies have weak policies, and the problem of exposure of corporate data persists. This paper addresses this problem by proposing a BYOD policy evaluation method to help companies to strengthen their BYOD policies. This initial research proposes a novel BYOD security policy evaluation model that aims to identify weaknesses in BYOD policies using mathematical comparisons. The results are measurable and provide specific recommendations to strengthen a BYOD policy. Further research is needed in order to demonstrate the viability and effectiveness of this model.", 
    "editor": [
      {
        "familyName": "Latifi", 
        "givenName": "Shahram", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-54978-1_30", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-54977-4", 
        "978-3-319-54978-1"
      ], 
      "name": "Information Technology - New Generations", 
      "type": "Book"
    }, 
    "name": "BYOD: A Security Policy Evaluation Model", 
    "pagination": "215-220", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-54978-1_30"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "cc3a4a00c2e6df4a1337f369c66a3a3543c3354459ab7a1e354b06f59f0e9329"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1090745841"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-54978-1_30", 
      "https://app.dimensions.ai/details/publication/pub.1090745841"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T15:25", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8672_00000279.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-54978-1_30"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-54978-1_30'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-54978-1_30'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-54978-1_30'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-54978-1_30'


 

This table displays all metadata directly associated to this object as RDF triples.

88 TRIPLES      23 PREDICATES      35 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-54978-1_30 schema:about anzsrc-for:15
2 anzsrc-for:1503
3 schema:author N9f2afb25ecf9433fa8eddd9277d2db9e
4 schema:citation https://doi.org/10.1016/0167-4048(96)81706-8
5 https://doi.org/10.1016/s1353-4858(12)70013-2
6 https://doi.org/10.1109/ccnc.2014.6866552
7 https://doi.org/10.1109/mitp.2012.93
8 https://doi.org/10.1145/2659651.2659742
9 https://doi.org/10.1145/2693208.2693231
10 https://doi.org/10.1201/9780203490426
11 https://doi.org/10.3233/jcs-2007-15201
12 schema:datePublished 2018
13 schema:datePublishedReg 2018-01-01
14 schema:description The rapid increase of personal mobile devices (mainly smartphones and tablets) accessing corporate data has created a phenomenon commonly known as Bring Your Own Device (BYOD). Companies that allow the use of BYODs need to be aware of the risks of exposing their business to inadvertent data leakage or malicious intent posed by inside or outside threats. The adoption of BYOD policies mitigates these types of risks. However, many companies have weak policies, and the problem of exposure of corporate data persists. This paper addresses this problem by proposing a BYOD policy evaluation method to help companies to strengthen their BYOD policies. This initial research proposes a novel BYOD security policy evaluation model that aims to identify weaknesses in BYOD policies using mathematical comparisons. The results are measurable and provide specific recommendations to strengthen a BYOD policy. Further research is needed in order to demonstrate the viability and effectiveness of this model.
15 schema:editor Nca908061a70c4945938436b303039e58
16 schema:genre chapter
17 schema:inLanguage en
18 schema:isAccessibleForFree false
19 schema:isPartOf N0a37bf4a9e944113ad87119f90681f67
20 schema:name BYOD: A Security Policy Evaluation Model
21 schema:pagination 215-220
22 schema:productId N4a26f318793c471aaa7b50cf07ead6b5
23 N8ccf41b2844f479eb9140b736e827f68
24 Nc54798bf17ad48ad8cb207705c0c30bd
25 schema:publisher N70b15c57a87a46a39c2b0ef091981655
26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090745841
27 https://doi.org/10.1007/978-3-319-54978-1_30
28 schema:sdDatePublished 2019-04-15T15:25
29 schema:sdLicense https://scigraph.springernature.com/explorer/license/
30 schema:sdPublisher Nc9e6c2f988b14ec68c97523fecb8ecf4
31 schema:url http://link.springer.com/10.1007/978-3-319-54978-1_30
32 sgo:license sg:explorer/license/
33 sgo:sdDataset chapters
34 rdf:type schema:Chapter
35 N0a37bf4a9e944113ad87119f90681f67 schema:isbn 978-3-319-54977-4
36 978-3-319-54978-1
37 schema:name Information Technology - New Generations
38 rdf:type schema:Book
39 N4a26f318793c471aaa7b50cf07ead6b5 schema:name dimensions_id
40 schema:value pub.1090745841
41 rdf:type schema:PropertyValue
42 N70b15c57a87a46a39c2b0ef091981655 schema:location Cham
43 schema:name Springer International Publishing
44 rdf:type schema:Organisation
45 N8ccf41b2844f479eb9140b736e827f68 schema:name readcube_id
46 schema:value cc3a4a00c2e6df4a1337f369c66a3a3543c3354459ab7a1e354b06f59f0e9329
47 rdf:type schema:PropertyValue
48 N9f2afb25ecf9433fa8eddd9277d2db9e rdf:first Nf0b923ef1fad407086fc78b256b7fcb8
49 rdf:rest rdf:nil
50 Nc54798bf17ad48ad8cb207705c0c30bd schema:name doi
51 schema:value 10.1007/978-3-319-54978-1_30
52 rdf:type schema:PropertyValue
53 Nc9e6c2f988b14ec68c97523fecb8ecf4 schema:name Springer Nature - SN SciGraph project
54 rdf:type schema:Organization
55 Nca908061a70c4945938436b303039e58 rdf:first Nf7c274bb8080469280e932bd8f5dce10
56 rdf:rest rdf:nil
57 Nf0b923ef1fad407086fc78b256b7fcb8 schema:affiliation https://www.grid.ac/institutes/grid.254833.b
58 schema:familyName Ratchford
59 schema:givenName Melva M.
60 rdf:type schema:Person
61 Nf7c274bb8080469280e932bd8f5dce10 schema:familyName Latifi
62 schema:givenName Shahram
63 rdf:type schema:Person
64 anzsrc-for:15 schema:inDefinedTermSet anzsrc-for:
65 schema:name Commerce, Management, Tourism and Services
66 rdf:type schema:DefinedTerm
67 anzsrc-for:1503 schema:inDefinedTermSet anzsrc-for:
68 schema:name Business and Management
69 rdf:type schema:DefinedTerm
70 https://doi.org/10.1016/0167-4048(96)81706-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024102992
71 rdf:type schema:CreativeWork
72 https://doi.org/10.1016/s1353-4858(12)70013-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016328951
73 rdf:type schema:CreativeWork
74 https://doi.org/10.1109/ccnc.2014.6866552 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093774521
75 rdf:type schema:CreativeWork
76 https://doi.org/10.1109/mitp.2012.93 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061407381
77 rdf:type schema:CreativeWork
78 https://doi.org/10.1145/2659651.2659742 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008027748
79 rdf:type schema:CreativeWork
80 https://doi.org/10.1145/2693208.2693231 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028285157
81 rdf:type schema:CreativeWork
82 https://doi.org/10.1201/9780203490426 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039360897
83 rdf:type schema:CreativeWork
84 https://doi.org/10.3233/jcs-2007-15201 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027079836
85 rdf:type schema:CreativeWork
86 https://www.grid.ac/institutes/grid.254833.b schema:alternateName Dakota State University
87 schema:name Dakota State University
88 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...