Compliance with bring your own device security policies in organizations: A systematic literature review.
Rathika PalanisamyAzah Anir NormanMiss Laiha Mat KiahPublished in: Comput. Secur. (2020)
Keyphrases
- literature review
- security policies
- home network
- access control
- ubiquitous computing environments
- network security
- case study
- security management
- fuzzy theory
- distributed systems
- security concerns
- security requirements
- information systems development
- access control systems
- information technology
- current issues
- public libraries
- information systems
- design science
- access control policies
- cyber attacks
- web applications
- multilevel secure
- competitive advantage
- databases