A systematic approach to investigating how information security and privacy can be achieved in BYOD environments.
Abubakar Garba BelloDavid MurrayJocelyn ArmaregoPublished in: Inf. Comput. Secur. (2017)
Keyphrases
- object recognition
- information security
- security issues
- privacy concerns
- security risks
- sensitive data
- countermeasures
- data security
- network security
- information systems
- intrusion detection
- smart card
- information security management
- cyber defense
- security requirements
- information assurance
- smart grid
- security threats
- iso iec
- privacy preserving
- private information
- risk assessment
- security mechanisms
- security level
- databases
- risk analysis
- technical issues
- data protection
- real world
- design theory