{"title":"BYOD时代的风险管理:技术采用、控制、责任、用户感知和用户行为的五要素","authors":"T. Yang, Radu E. Vlas, A. Yang, Cristina Vlas","doi":"10.1109/SOCIALCOM.2013.64","DOIUrl":null,"url":null,"abstract":"An increasing number of companies and organizations have allowed employees (as well as business partners and contractors) to use their own devices to connect to company assets, resulting in the phenomena of BYOD (Bring Your Own Devices). Employees' own devices may pose greater threats against the corporation than its own assets would. They are perceived as more vulnerable and easier to become compromised than devices issued and controlled by the company. In this context, the need to manage the BYOD practice is undeniable. In this paper we propose the Risk Management Quintet as a model of understanding the BYOD practice. The relationships among the components of the Quintet, i.e., technology adoption, control, liabilities, user perception, and user behavior, are examined in the context of control mechanisms.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User Behavior\",\"authors\":\"T. Yang, Radu E. Vlas, A. Yang, Cristina Vlas\",\"doi\":\"10.1109/SOCIALCOM.2013.64\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An increasing number of companies and organizations have allowed employees (as well as business partners and contractors) to use their own devices to connect to company assets, resulting in the phenomena of BYOD (Bring Your Own Devices). Employees' own devices may pose greater threats against the corporation than its own assets would. They are perceived as more vulnerable and easier to become compromised than devices issued and controlled by the company. In this context, the need to manage the BYOD practice is undeniable. In this paper we propose the Risk Management Quintet as a model of understanding the BYOD practice. The relationships among the components of the Quintet, i.e., technology adoption, control, liabilities, user perception, and user behavior, are examined in the context of control mechanisms.\",\"PeriodicalId\":129308,\"journal\":{\"name\":\"2013 International Conference on Social Computing\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Social Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SOCIALCOM.2013.64\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Social Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOCIALCOM.2013.64","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User Behavior
An increasing number of companies and organizations have allowed employees (as well as business partners and contractors) to use their own devices to connect to company assets, resulting in the phenomena of BYOD (Bring Your Own Devices). Employees' own devices may pose greater threats against the corporation than its own assets would. They are perceived as more vulnerable and easier to become compromised than devices issued and controlled by the company. In this context, the need to manage the BYOD practice is undeniable. In this paper we propose the Risk Management Quintet as a model of understanding the BYOD practice. The relationships among the components of the Quintet, i.e., technology adoption, control, liabilities, user perception, and user behavior, are examined in the context of control mechanisms.