BYOD-Insure vs Existing Modalities for BYOD Security Assessment: A Comparison Study.
Melva M. RatchfordYong WangCherie Bakker NoteboomOmar F. El-GayarPublished in: AMCIS (2020)
Keyphrases
- information security
- computer security
- risk assessment
- access control
- security issues
- case study
- intrusion detection
- network security
- information assurance
- security vulnerabilities
- security management
- security requirements
- statistical databases
- neural network
- security policies
- security mechanisms
- information systems
- security protocols
- situation awareness
- security model
- cyber attacks
- security problems
- security threats
- data sets
- real time