Ounza et al., 2018 - Google Patents
Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in KenyaOunza et al., 2018
View PDF- Document ID
- 11173198789166932433
- Author
- Ounza J
- Liyala S
- Ogara S
- Publication year
- Publication venue
- International Journal of Science and Research (IJSR)
External Links
Snippet
Although a number of researches have been carried out by various organizations across the globe to establish security challenges facing education institutions due to BYOD adoption there is no evidence that a similar study has been carried out for universities in Kenya. Since …
- 230000002708 enhancing 0 abstract description 3
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bello et al. | A systematic approach to investigating how information security and privacy can be achieved in BYOD environments | |
Alotaibi et al. | A review of BYOD security challenges, solutions and policy best practices | |
Pendley | Finance and accounting professionals and cybersecurity awareness | |
Kobis | Human factor aspects in information security management in the traditional IT and cloud computing models | |
Pullin | Cybersecurity: positive changes through processes and team culture | |
Cunningham et al. | The eight business and security benefits of zero trust | |
Palanisamy et al. | Users’ attitude on perceived security of enterprise systems mobility: an empirical study | |
Farroha et al. | Challenges of “operationalizing” dynamic system access control: Transitioning from ABAC to RAdAC | |
Guclu et al. | A new scalable and expandable access control model for distributed database systems in data security | |
Sanjida Akrer et al. | Balancing Data Accessibility and Security in Cloud-Based Business Intelligence Systems | |
Magruder et al. | Bring Your Own Device (BYOD)-Who Is Running Organizations? | |
Shabtai et al. | Optimizing data misuse detection | |
Michelberger et al. | A possible tool for development of information security-SIEM system | |
Yoose | Balancing privacy and strategic planning needs: A case study in de-identification of patron data | |
Ounza et al. | Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya | |
Nosova et al. | Information Security System in Provision of the Economic Security and Risk Management of the Enterprise. | |
Mansikka | Data loss prevention: For securing enterprise data integrity | |
Purba et al. | Assessing Privileged Access Management (PAM) using ISO 27001: 2013 Control | |
Waghmare | Security and ethical considerations when using ChatGPT | |
Kobiela | The security of mobile business applications based on mCRM | |
KR20040011863A (en) | Real Time Information Security Risk Management System and Method | |
Boateng et al. | Technology Threat Avoidance Theory (TTAT) on Bring Your Own Device (BYOD): Adoption and User Risk | |
Vincent et al. | Implementation of critical information infrastructure protection techniques against cyber attacks using big data analytics | |
Mbalanya | Bring your own device and corporate information Technology security: case of firms listed on the Nairobi Securities exchange limited | |
Mthwazi | Local databases or cloud computing services: Cybersecurity issues at the NUST, Zimbabwe |