Information security in the BYOD model
DOI:
https://doi.org/10.15584/nsawg.2018.1.15Keywords:
BYOD, mobility of users, security of BYOD, information securityAbstract
The development of mobile devices, which can be seen now favors their use not only for communication, or entertainment, but increasingly also for work. New technologies such as Cloud Computing, fast, and public wireless networks, ever more perfect mobile devices, where a wide range available on the market makes that each user can adjust it to their requirements mean that more and more dynamically growing trend of workforce mobility. Mobility of workers, and thus the possibility of mobile computing is growing very rapidly and allows the use of newer and newer technologies. One of the models or trends that can be observed is BYOD (Bring Your Own Device). It is a model that allows for the use of their personal devices for business purposes. Ensure an appropriate level of information security in the case of new technologies related to user mobility is not an easy task. For organizations, this means a complete change of approach to managing the IT network, mobile devices, security management and management employees themselves. In the article will be presented the main aspects of information security, which should be in any organization which implements or has implemented a BYOD model for its IT infrastructure. Also it will be discussed the legal aspects, financial and related to licensing, which are directly connected with the BYOD model.Downloads
Published
2020-11-13
How to Cite
Podgórski, G. (2020). Information security in the BYOD model. Social Inequalities and Economic Growth, 1(53), 180–192. https://doi.org/10.15584/nsawg.2018.1.15
Issue
Section
Articles
License
Copyright (c) 2018 University of Rzeszow
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.