From Surf Wiki (app.surf) — the open knowledge base
Bring your own device
Technological policy
Technological policy
References
- (2018). "Pronunciation of BYOD".
- (2020). "Bring Your Own Phone to AT&T".
- "Bring your own device (BYOD) guide".
- (2018). "Bring Your Own Device And Switch To Verizon Today". Verizon.
- [https://www.pcworld.com/article/246760/pros_and_cons_of_bringing_your_own_device_to_work.html BYOD on pcworld.com]{{Dead link. (October 2023)
- "Enterprise & Gateway Suites – Trend Micro".
- "BYOD – Research findings". Logicalis.
- Rene Millman, ITPro. "[http://www.itpro.co.uk/mobile/19944/surge-byod-sees-710-employees-using-their-own-devices#ixzz31cNhd9ul Surge in BYOD sees 7/10 employees using their own devices]." August 12, 2012. Retrieved June 5, 2013.
- (March 21, 2004). "Broadvoice".
- (December 1, 2014). "New words notes December 2014".
- "Definition of BYOB".
- "Definition of byob {{!}} Dictionary.com".
- "Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices". Gov Info Security.
- (June 24, 2013). "Rise of the 'consumer enterprise'". VentureBeat.
- (2012). "BYOD: From company-issued to employee-owned devices".
- (January 7, 2013). "BlackBerry Strategizes For More U.S. Government Clients".
- "Support BYOD and a smarter workforce".
- (June 6, 2018). "The State of Enterprise Mobility in 2018: Five Key Trends".
- El Ajou, Nadeen. (September 24, 2012). "Bring Your Own Device trend is ICT industry's hottest talking point at GITEX Technology Week".
- "BYOD research findings". Logicalis.
- UC Strategies. (May 1, 2013). "BYOD's Productivity Gains Are "Hard to Calculate" – Study Says".
- Gina Smith. (February 16, 2012). "10 myths of BYOD in the enterprise". TechRepublic.
- "Cisco ASA + Workspot = BYOD". Workspot.
- Bernice Hurst. (August 6, 2012). "Happiness Is ... Bringing Your Own Computer Devices to Work". RetailWire.
- Kevin Casey. (November 19, 2012). "Risks Your BYOD Policy Must Address". InformationWeek.
- "90% American workers use their own smartphones for work".
- (October 24, 2022). "What is bring your own device?".
- "Release details".
- "Threat, Violation and Consumerization Impact".
- (June 23, 2014}}{{Dead link). "Bring your own device (BYOD) policies". Fraud Advisory Panel.
- (September 22, 2014). "The Rise and Risk of BYOD – Druva".
- The U.S. Air Force Research Lab's (AFRL) Leader iPad Pilot used this method to provide its researchers unfiltered access to the Internet, reserving its filtered, sensitive network for other use.
- "Nearly half of firms supporting BYOD report data breaches".
- [http://www.esecurityplanet.com/mobile-security/4-steps-to-securing-mobile-devices-and-apps-in-the-workplace-mdm-byod.html 4 Steps to Securing Mobile Devices and Apps in the Workplace] – eSecurityPlanet.com
- Wiech, Dean. "The Benefits And Risks Of BYOD". Manufacturing Business Technology.
- (May 1, 2013). "Greatest Threat to Enterprise Mobility: Employee's Children".
- (September 2013). "Bring your own device: Security and risk considerations for your mobile device program".
- "Enterprise & Gateway Suites – Trend Micro".
- "Implementing BYOD Plans: Are You Letting Malware In?".
- David Weldon, FierceMobileIT. "[http://www.fiercemobileit.com/story/no-one-size-fits-all-solution-byod-policies-panel-reveals/2014-05-13#ixzz31cYPeds5 No one-size-fits-all solution for BYOD policies, panel reveals] {{Webarchive. link. (July 16, 2014 ." May 13, 2014. Retrieved July 11, 2014.)
- Tom Kaneshige, CIO. "[http://www.cio.com/article/2379003/mobile-device-management/attack-of-the-byod-killing-mdm-software.html Attack of the BYOD-Killing MDM Software]." February 4, 2014. Retrieved July 15, 2014.
- Lauren Weber, Wall Street Journal. "[https://www.wsj.com/news/articles/SB10001424052702304027204579335033824665964?KEYWORDS=BYOD BYOD? Leaving a Job Can Mean Losing Pictures of Grandma]." January 21, 2014. Retrieved July 15, 2014.
- Kaneshige, Tom. "BYOD's Phone Number Problem".
- "BYOD Policy". Logicalis.
- Kenneth C. Laudon, Jane P. Laudon, "Management of Information Systems"
- Jarrett, Marshall. "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations". Office of Legal Education.
- (June 2, 2018). "How Much Should You Compensate BYOD Employees for Mobile Expenses?".
- Bettanin, Eric. "11 considerations to underpin your company's BYOD strategic planning". Australian Computer Society.
- Cassidy, Steve. "Mobile device management". Dennis Publishing Ltd..
- "As Mobile Devices Catch On with Businesses, Data Breach Risks Grow {{!}} PropertyCasualty360". PropertyCasualty360.
- Hassell, Jonathan. "7 Tips for Establishing a Successful BYOD Policy". CIO.
- Emery, Scott. (2012). "Factors for Consideration when Developing a Bring Your Own Device (BYOD)". University of Oregon Interdisciplinary Studies Program Presentation.
This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.
Ask Mako anything about Bring your own device — get instant answers, deeper analysis, and related topics.
Research with MakoFree with your Surf account
Create a free account to save articles, ask Mako questions, and organize your research.
Sign up freeThis content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.
Report