BYOD时代的风险管理:技术采用、控制、责任、用户感知和用户行为的五要素

T. Yang, Radu E. Vlas, A. Yang, Cristina Vlas
{"title":"BYOD时代的风险管理:技术采用、控制、责任、用户感知和用户行为的五要素","authors":"T. Yang, Radu E. Vlas, A. Yang, Cristina Vlas","doi":"10.1109/SOCIALCOM.2013.64","DOIUrl":null,"url":null,"abstract":"An increasing number of companies and organizations have allowed employees (as well as business partners and contractors) to use their own devices to connect to company assets, resulting in the phenomena of BYOD (Bring Your Own Devices). Employees' own devices may pose greater threats against the corporation than its own assets would. They are perceived as more vulnerable and easier to become compromised than devices issued and controlled by the company. In this context, the need to manage the BYOD practice is undeniable. In this paper we propose the Risk Management Quintet as a model of understanding the BYOD practice. The relationships among the components of the Quintet, i.e., technology adoption, control, liabilities, user perception, and user behavior, are examined in the context of control mechanisms.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User Behavior\",\"authors\":\"T. Yang, Radu E. Vlas, A. Yang, Cristina Vlas\",\"doi\":\"10.1109/SOCIALCOM.2013.64\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An increasing number of companies and organizations have allowed employees (as well as business partners and contractors) to use their own devices to connect to company assets, resulting in the phenomena of BYOD (Bring Your Own Devices). Employees' own devices may pose greater threats against the corporation than its own assets would. They are perceived as more vulnerable and easier to become compromised than devices issued and controlled by the company. In this context, the need to manage the BYOD practice is undeniable. In this paper we propose the Risk Management Quintet as a model of understanding the BYOD practice. The relationships among the components of the Quintet, i.e., technology adoption, control, liabilities, user perception, and user behavior, are examined in the context of control mechanisms.\",\"PeriodicalId\":129308,\"journal\":{\"name\":\"2013 International Conference on Social Computing\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Social Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SOCIALCOM.2013.64\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Social Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOCIALCOM.2013.64","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

摘要

越来越多的公司和组织允许员工(以及业务合作伙伴和承包商)使用自己的设备连接到公司资产,导致BYOD(自带设备)现象。员工自己的设备可能比公司自己的资产对公司构成更大的威胁。它们被认为比该公司发行和控制的设备更容易受到攻击,也更容易受到损害。在这种背景下,管理BYOD实践的必要性是不可否认的。在本文中,我们提出风险管理五重奏作为理解BYOD实践的模型。五要素之间的关系,即技术采用、控制、责任、用户感知和用户行为,在控制机制的背景下进行了检查。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User Behavior
An increasing number of companies and organizations have allowed employees (as well as business partners and contractors) to use their own devices to connect to company assets, resulting in the phenomena of BYOD (Bring Your Own Devices). Employees' own devices may pose greater threats against the corporation than its own assets would. They are perceived as more vulnerable and easier to become compromised than devices issued and controlled by the company. In this context, the need to manage the BYOD practice is undeniable. In this paper we propose the Risk Management Quintet as a model of understanding the BYOD practice. The relationships among the components of the Quintet, i.e., technology adoption, control, liabilities, user perception, and user behavior, are examined in the context of control mechanisms.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Novel Group Recommendation Algorithm with Collaborative Filtering Access Control Policy Extraction from Unconstrained Natural Language Text Stock Market Manipulation Using Cyberattacks Together with Misinformation Disseminated through Social Media Friendship Prediction on Social Network Users An Empirical Comparison of Graph Databases
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1