{"title":"BYOD网络中的安全与信任问题","authors":"G. A. Safdar, Ali Mansour","doi":"10.1109/MITP.2023.3293714","DOIUrl":null,"url":null,"abstract":"Companies are striving for increased productivity as well as reduced costs in today's corporate environment. Both capital and operational expenditure can impact cost significantly, accordingly there is a drive to bring your own device (BYOD) networks as a solution. However, security and trust issues in BYOD networks are increasingly becoming a risk from small to large businesses. This introduces challenges for IT Professionals when it comes to the security of the network, as well as while trying to achieve compliance with data security standards set out by the governing bodies of the particular industry. This article aims to discuss “how organizations can introduce trust into BYOD networks” both by using existing and developing technologies. The overall outcome will be a clear understanding of common technologies that are either currently used or being developed, which can help organizations create trust between the corporate network and the BYOD.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"616 1","pages":"45-51"},"PeriodicalIF":2.6000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security and Trust Issues in BYOD Networks\",\"authors\":\"G. A. Safdar, Ali Mansour\",\"doi\":\"10.1109/MITP.2023.3293714\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Companies are striving for increased productivity as well as reduced costs in today's corporate environment. Both capital and operational expenditure can impact cost significantly, accordingly there is a drive to bring your own device (BYOD) networks as a solution. However, security and trust issues in BYOD networks are increasingly becoming a risk from small to large businesses. This introduces challenges for IT Professionals when it comes to the security of the network, as well as while trying to achieve compliance with data security standards set out by the governing bodies of the particular industry. This article aims to discuss “how organizations can introduce trust into BYOD networks” both by using existing and developing technologies. The overall outcome will be a clear understanding of common technologies that are either currently used or being developed, which can help organizations create trust between the corporate network and the BYOD.\",\"PeriodicalId\":49045,\"journal\":{\"name\":\"IT Professional\",\"volume\":\"616 1\",\"pages\":\"45-51\"},\"PeriodicalIF\":2.6000,\"publicationDate\":\"2023-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IT Professional\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1109/MITP.2023.3293714\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IT Professional","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/MITP.2023.3293714","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Companies are striving for increased productivity as well as reduced costs in today's corporate environment. Both capital and operational expenditure can impact cost significantly, accordingly there is a drive to bring your own device (BYOD) networks as a solution. However, security and trust issues in BYOD networks are increasingly becoming a risk from small to large businesses. This introduces challenges for IT Professionals when it comes to the security of the network, as well as while trying to achieve compliance with data security standards set out by the governing bodies of the particular industry. This article aims to discuss “how organizations can introduce trust into BYOD networks” both by using existing and developing technologies. The overall outcome will be a clear understanding of common technologies that are either currently used or being developed, which can help organizations create trust between the corporate network and the BYOD.
IT ProfessionalCOMPUTER SCIENCE, INFORMATION SYSTEMS-COMPUTER SCIENCE, SOFTWARE ENGINEERING
CiteScore
5.00
自引率
0.00%
发文量
111
审稿时长
>12 weeks
期刊介绍:
IT Professional is a technical magazine of the IEEE Computer Society. It publishes peer-reviewed articles, columns and departments written for and by IT practitioners and researchers covering:
practical aspects of emerging and leading-edge digital technologies,
original ideas and guidance for IT applications, and
novel IT solutions for the enterprise.
IT Professional’s goal is to inform the broad spectrum of IT executives, IT project managers, IT researchers, and IT application developers from industry, government, and academia.