2018
AUTHORSMelva M. Ratchford
ABSTRACTThe rapid increase of personal mobile devices (mainly smartphones and tablets) accessing corporate data has created a phenomenon commonly known as Bring Your Own Device (BYOD). Companies that allow the use of BYODs need to be aware of the risks of exposing their business to inadvertent data leakage or malicious intent posed by inside or outside threats. The adoption of BYOD policies mitigates these types of risks. However, many companies have weak policies, and the problem of exposure of corporate data persists. This paper addresses this problem by proposing a BYOD policy evaluation method to help companies to strengthen their BYOD policies. This initial research proposes a novel BYOD security policy evaluation model that aims to identify weaknesses in BYOD policies using mathematical comparisons. The results are measurable and provide specific recommendations to strengthen a BYOD policy. Further research is needed in order to demonstrate the viability and effectiveness of this model. More... »
PAGES215-220
Information Technology - New Generations
ISBN
978-3-319-54977-4
978-3-319-54978-1
http://scigraph.springernature.com/pub.10.1007/978-3-319-54978-1_30
DOIhttp://dx.doi.org/10.1007/978-3-319-54978-1_30
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1090745841
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1503",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Business and Management",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/15",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Commerce, Management, Tourism and Services",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Dakota State University",
"id": "https://www.grid.ac/institutes/grid.254833.b",
"name": [
"Dakota State University"
],
"type": "Organization"
},
"familyName": "Ratchford",
"givenName": "Melva M.",
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.1145/2659651.2659742",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1008027748"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/s1353-4858(12)70013-2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1016328951"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/0167-4048(96)81706-8",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1024102992"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.3233/jcs-2007-15201",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1027079836"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/2693208.2693231",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1028285157"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1201/9780203490426",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1039360897"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/mitp.2012.93",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061407381"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/ccnc.2014.6866552",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1093774521"
],
"type": "CreativeWork"
}
],
"datePublished": "2018",
"datePublishedReg": "2018-01-01",
"description": "The rapid increase of personal mobile devices (mainly smartphones and tablets) accessing corporate data has created a phenomenon commonly known as Bring Your Own Device (BYOD). Companies that allow the use of BYODs need to be aware of the risks of exposing their business to inadvertent data leakage or malicious intent posed by inside or outside threats. The adoption of BYOD policies mitigates these types of risks. However, many companies have weak policies, and the problem of exposure of corporate data persists. This paper addresses this problem by proposing a BYOD policy evaluation method to help companies to strengthen their BYOD policies. This initial research proposes a novel BYOD security policy evaluation model that aims to identify weaknesses in BYOD policies using mathematical comparisons. The results are measurable and provide specific recommendations to strengthen a BYOD policy. Further research is needed in order to demonstrate the viability and effectiveness of this model.",
"editor": [
{
"familyName": "Latifi",
"givenName": "Shahram",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-319-54978-1_30",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": {
"isbn": [
"978-3-319-54977-4",
"978-3-319-54978-1"
],
"name": "Information Technology - New Generations",
"type": "Book"
},
"name": "BYOD: A Security Policy Evaluation Model",
"pagination": "215-220",
"productId": [
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-319-54978-1_30"
]
},
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"cc3a4a00c2e6df4a1337f369c66a3a3543c3354459ab7a1e354b06f59f0e9329"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1090745841"
]
}
],
"publisher": {
"location": "Cham",
"name": "Springer International Publishing",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-319-54978-1_30",
"https://app.dimensions.ai/details/publication/pub.1090745841"
],
"sdDataset": "chapters",
"sdDatePublished": "2019-04-15T15:25",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8672_00000279.jsonl",
"type": "Chapter",
"url": "http://link.springer.com/10.1007/978-3-319-54978-1_30"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-54978-1_30'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-54978-1_30'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-54978-1_30'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-54978-1_30'
This table displays all metadata directly associated to this object as RDF triples.
88 TRIPLES
23 PREDICATES
35 URIs
20 LITERALS
8 BLANK NODES