[go: up one dir, main page]

Ounza et al., 2018 - Google Patents

Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya

Ounza et al., 2018

View PDF
Document ID
11173198789166932433
Author
Ounza J
Liyala S
Ogara S
Publication year
Publication venue
International Journal of Science and Research (IJSR)

External Links

Snippet

Although a number of researches have been carried out by various organizations across the globe to establish security challenges facing education institutions due to BYOD adoption there is no evidence that a similar study has been carried out for universities in Kenya. Since …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Bello et al. A systematic approach to investigating how information security and privacy can be achieved in BYOD environments
Alotaibi et al. A review of BYOD security challenges, solutions and policy best practices
Pendley Finance and accounting professionals and cybersecurity awareness
Kobis Human factor aspects in information security management in the traditional IT and cloud computing models
Pullin Cybersecurity: positive changes through processes and team culture
Cunningham et al. The eight business and security benefits of zero trust
Palanisamy et al. Users’ attitude on perceived security of enterprise systems mobility: an empirical study
Farroha et al. Challenges of “operationalizing” dynamic system access control: Transitioning from ABAC to RAdAC
Guclu et al. A new scalable and expandable access control model for distributed database systems in data security
Sanjida Akrer et al. Balancing Data Accessibility and Security in Cloud-Based Business Intelligence Systems
Magruder et al. Bring Your Own Device (BYOD)-Who Is Running Organizations?
Shabtai et al. Optimizing data misuse detection
Michelberger et al. A possible tool for development of information security-SIEM system
Yoose Balancing privacy and strategic planning needs: A case study in de-identification of patron data
Ounza et al. Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya
Nosova et al. Information Security System in Provision of the Economic Security and Risk Management of the Enterprise.
Mansikka Data loss prevention: For securing enterprise data integrity
Purba et al. Assessing Privileged Access Management (PAM) using ISO 27001: 2013 Control
Waghmare Security and ethical considerations when using ChatGPT
Kobiela The security of mobile business applications based on mCRM
KR20040011863A (en) Real Time Information Security Risk Management System and Method
Boateng et al. Technology Threat Avoidance Theory (TTAT) on Bring Your Own Device (BYOD): Adoption and User Risk
Vincent et al. Implementation of critical information infrastructure protection techniques against cyber attacks using big data analytics
Mbalanya Bring your own device and corporate information Technology security: case of firms listed on the Nairobi Securities exchange limited
Mthwazi Local databases or cloud computing services: Cybersecurity issues at the NUST, Zimbabwe