Risk assessment of BYOD: Bring your own device.
Shigeaki TanimotoSusumu YamadaMotoi IwashitaToru KobayashiHiroyuki SatoAtsushi KanaiPublished in: GCCE (2016)
Keyphrases
- risk assessment
- risk management
- risk analysis
- network security
- risk factors
- information security
- decision making
- evidence theory
- economic impact
- emergency management
- databases
- artificial intelligence
- crime prevention
- business continuity
- situation assessment
- data acquisition
- cost effective
- intrusion detection
- artificial neural networks
- knowledge base
- data mining
- real world