Login / Signup
This is my device! Why should I follow your rules? Employees' compliance with BYOD security policy.
Anat Hovav
Frida Ferdani Putri
Published in:
Pervasive Mob. Comput. (2016)
Keyphrases
</>
security policies
access control
home network
security management
network security
network management
distributed systems
security concerns
access control systems
information technology
association rules
security requirements
ubiquitous computing environments
data mining
knowledge management
security architecture