Academic literature on the topic 'BYOT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'BYOT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "BYOT"

1

Dhingra, Madhavi. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS." International Journal of Engineering Technologies and Management Research 5, no. 2 (April 27, 2020): 101–6. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.620.

Full text
Abstract:
BYOD (Bring your own Device) is a piece of its bigger pattern consumerization, in which purchaser programming and equipment are being brought into the undertaking. BYOT (bring your own particular innovation) alludes to the utilization of customer gadgets and applications in the workplace. A powerful BYOD procedure can prompt various advantages for organizations, including enhanced representative employment fulfillment, expanded occupation proficiency and adaptability. BYOD can likewise give cost reserve funds from starting gadget buy to on-going use and IT helpdesk bolster as representatives put resources into their own gadgets. Despite worries about Bring Your Own Device (BYOD) security dangers, representatives over the previous years have appreciated the different advantages of BYOD. So too have businesses, who are far-fetched ever to prevent staff from conveying their own particular gadgets to work or utilizing them remotely for work purposes. The test stays to distinguish security dangers related with BYOD and locate the most fitting answers for alleviate these risks. By recognizing potential dangers, the framework can settle on an astute choice in the matter of how to react. This paper manages the security dangers related with it and the conceivable answers for it.
APA, Harvard, Vancouver, ISO, and other styles
2

Earley, Seth, Robert Harmon, Maria R. Lee, and Sunil Mithas. "From BYOD to BYOA, Phishing, and Botnets." IT Professional 16, no. 5 (September 2014): 16–18. http://dx.doi.org/10.1109/mitp.2014.69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prieto-González, Lisardo, Ricardo Colomo-Palacios, Beatriz Puerta, and Gerrit Tamm. "ModEAS." International Journal of Human Capital and Information Technology Professionals 5, no. 2 (April 2014): 52–61. http://dx.doi.org/10.4018/ijhcitp.2014040105.

Full text
Abstract:
Mobile technologies and more precisely apps have disrupted technology scenario. Bring your own application (BYOA) is a new trend that has emerged after the “bring your own device” (BYOD) vogue. However, and in spite of its intrinsic benefits, the trend presents also several caveats and Enterprise app stores are seen as a way to tackle these risks. In this paper, authors present ModEAS, a system designed to serve as a modular and scalable architecture when developing a middle scale or personal Enterprise app store.
APA, Harvard, Vancouver, ISO, and other styles
4

Junk, Günter, and Mathias Widler. "BYOD." Digitale Welt 2, no. 2 (March 7, 2018): 49–52. http://dx.doi.org/10.1007/s42354-018-0076-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walker-Osborn, C., S. Mann, and V. Mann. "to Byod or ... not to Byod." ITNOW 55, no. 1 (February 26, 2013): 38–39. http://dx.doi.org/10.1093/itnow/bws142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gaff, Brian M. "BYOD? OMG!" Computer 48, no. 2 (February 2015): 10–11. http://dx.doi.org/10.1109/mc.2015.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bisson, Terry. "BYOB FAQ." Nature 449, no. 7163 (October 2007): 754. http://dx.doi.org/10.1038/449754a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, J. Morris, Pao-Chung Ho, and Teng-Chang Chang. "Securing BYOD." IT Professional 16, no. 5 (September 2014): 9–11. http://dx.doi.org/10.1109/mitp.2014.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Neves, Ulysses Moreira, and Flávio Luis de Mello. "BYOD with Security." Journal of Information Security and Cryptography (Enigma) 5, no. 1 (January 27, 2019): 40. http://dx.doi.org/10.17648/jisc.v5i1.70.

Full text
Abstract:
<p class="IndexTerms">The concern of companies to keep sensitive data protected from improper access and information leaking has grown a lot. The constant cases of industrial espionage and information leakage regarding companies are an evidence of the need to apply strict information security policies, improve data protection and allow an auditing track. With the evolution of technology, the usage of personal mobile devices increased in organizations (BYOD - Bring Your Own Device), which allows the employees to use their own mobile devices at work. This paper addresses the current challenges faced by IT companies and teams in protecting access to this kind of information, and what strategies are used to mitigate, to track leaks, and reduce the misuse of documents in the organization. Considering the scenario evaluated, a framework with good Information Security practices based on the ISO 27002:2005 and the practical controls of the Center of Internet Security (CIS) is proposed, associating good practices with the needs of BYOD’s culture. The framework suggested in this paper reinforces the necessity for a standardization of the rules of information security in the process of adoption of BYOD’s culture, following the life cycle of the user with his personal mobile device in the company.</p><p class="IndexTerms"> </p><p class="IndexTerms"> </p>
APA, Harvard, Vancouver, ISO, and other styles
10

Köffer, Sebastian, Kevin Ortbach, Iris Junglas, Björn Niehaves, and Jeanne Harris. "Innovation Through BYOD?" Business & Information Systems Engineering 57, no. 6 (May 27, 2015): 363–75. http://dx.doi.org/10.1007/s12599-015-0387-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "BYOT"

1

Winterhalder, Joy Erin. "Teachers' Perceptions and Experiences in Implementing Mobile Devices Into Their Teaching." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3377.

Full text
Abstract:
This phenomenological study addressed the lack of understanding of how teachers implement personal devices in the classroom and whether the instruction is constructivist in nature. Although mobile technology is convenient, it is not yet understood if Bring Your Own Device/Technology (BYOD/BYOT) programs encourage a teacher pedagogy shift. The purpose of this qualitative study was to explore the perceptions and lived experiences of 10 teachers in Grades 6 to 12 who had been part of a BYOD/BYOT program for more than 2 years. Data from interviews and lesson demonstrations were analyzed via a constructivist framework first identifying themes and then categories. Teachers perceived that using mobile technology provided the replacement of old tools, instructional planning changes, and the shifting of learning to the students from the traditional design of the teacher as the lecturer to the teacher as the facilitator. Teachers experienced more student engagement and collaboration although they needed to monitor students more carefully to avoid students' being off task and to ensure safety usage of the mobile devices in the classroom. There are implications for social change both on the local and organizational level. Teachers can better understand how their pedagogy aligns with constructivist teaching and learning, and therefore can see where they still need to grow. On the organizational level, school districts may better understand that using technology at first will be used to replace previous pedagogy practices directly and that it will take support and time for technology implementation to impact changes in teachers' philosophy of teaching.
APA, Harvard, Vancouver, ISO, and other styles
2

Cardoza, Yanet. "An Exploration of Teachers' Adoption of the Bring Your Own Technology Program." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc283863/.

Full text
Abstract:
The purpose of this study was to explore teachers' concerns, use, and actual practices in their adoption of the bring your own technology (BYOT) initiative. Twelve secondary teachers in a private school setting participated in this study. The participants represented all content areas including reading, math, science, and electives. The private school was in its third year of implementing BYOT. This case study incorporated multiple methods to collect data to gain a better understanding of teachers' adoption of an innovation, BYOT. The concerns-based adoption model (CBAM) was used as a theoretical framework. All three CBAM tools provided data: the Stages of Concern Questionnaire (SoCQ), levels of use interview protocol (LoUIP), and the innovation configuration (IC) map. Twelve of the participants completed the SoCQ across three different points in time. Six of the twelve teachers participated in three one-on-one interviews, including the LoUIP. Additionally, six teachers were observed in their classrooms during instruction. After triangulating all pieces of data, the majority of teachers had highest concerns related to self. Teachers were concerned about their ability to implement the innovation and managing BYOT in their classroom. Four of the six teachers had a level of use (LoU) at mechanical, and two teachers had a LoU at routine. The teachers' LoU indicated that they are using BYOT in the classroom; however, the majority of teachers observed had adoption practices mostly in the non-ideal variations of IC. The teachers' LoU and IC indicated that teachers had implemented BYOT in their own way and not necessarily in alignment with the campus' vision or expectations. This case study had several limitations, including the small number of participants and the brevity of classroom observations. Additionally, this study was limited to one school setting. Recommendations for future research include exploring teachers' adoption of BYOT in various school settings (i.e., both public and private schools) and teachers at the elementary, middle, and high school levels. Researchers should consider exploring the impact of specific interventions and support on teachers' adoption.
APA, Harvard, Vancouver, ISO, and other styles
3

Scholz, Carol Louise. "A Study of the Application of a Bring Your Own Device Strategy in an Elementary School." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2689.

Full text
Abstract:
Numerous studies have been published on the efficacy of a Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) at the U.S. secondary and postsecondary school levels to increase student access to technology. However, there is a lack of data on the efficacy of a BYOD AUP to increase elementary student technology access. The purpose of this descriptive case study was to determine if a BYOD AUP at the U.S. K-5 level would increase students' access to technology as necessitated by the implementation of the Common Core State Standards (CCSS). This study was grounded in social transmission and transformative theories. The phenomenon of a northwest suburban elementary school BYOD implementation was examined by documenting the perceptions, attitudes, beliefs, lived experiences, and practices of administrators and teachers. This study used interview and classroom observation of a purposive selection of 3 elementary educators, the principal, and superintendent. Coding of data according to key words lead to analysis according to nodes and themes. Triangulation of multiple data sources and member checking helped to establish the credibility of data. Study findings documented increased access to technology for elementary students, best practices and steps to implementation. Study recommendations for elementary educators and administrators considering BYOD include consensus building, AUP, technology infrastructure, communications, professional development, classroom management, and lesson design to inform the field on elementary BYOD. Study findings facilitate social change by providing BYOD implementation recommendations, increasing elementary student access to technology at a reduced cost to districts and schools.
APA, Harvard, Vancouver, ISO, and other styles
4

Asparuhov, Lachezar. "BYOD - Risks, Solutions and Guidelines." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-48630.

Full text
Abstract:
During the past few years the use of mobile devices became extremely popular not only for personal use but also for working. When personal mobile devices are used as working assets the enterprises should search for some suitable ways to protect their data and network from the unmanaged mobile devices. On the other hand, it is widely believed that employees are more productive when they work from their own devices. This arise three questions: what risks these devices are bringing to the organizations, how to protect the company data and network while allowing the employees to work from their devices, and how adapted the real world is to the Bring Your Own Device trend. To answer these questions and the sub-questions deriving from them, an extensive literature study and a survey approach are used. The results from the study show that even though there are many risks for the companies, brought by the use of personal mobile devices, there exist adequate solutions to mitigate these risks. However, the results from the survey approach show that the companies are not very adapted to this trend yet and there exist a need for better understanding of the problem.
APA, Harvard, Vancouver, ISO, and other styles
5

MAGNUSSON, MALIN. "Vidareutveckling av sport-bh för större byst." Thesis, Högskolan i Borås, Institutionen Textilhögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17530.

Full text
Abstract:
I denna studie behandlas vidareutvecklingen en sport-bh för kvinnor med stor byst. Forskning inom relaterade områden, såsom begreppen ”encapsulation” och ”compression”, studier av bröstens rörelsemönster under fysisk aktivitet, storlekssystem och bröstens anatomiska förutsättningar, har studerats för att ytterligare hjälpa utvecklingen av denna produkt. En mindre enkät utfördes bland vanliga, på olika sätt, fysiskt aktiva, kvinnor för att avgöra vilka preferenser dessa hade gällande sport-bh. Denna information har sedan tillämpats, i möjlig mån, på produktutvecklingen. Förutsättningar för den fysiska produkten, som designönskemål och ett begränsat materialutbud, har satt upp ramar för utvecklingsprocessen, som gått igenom CAD-baserad mönsterkonstruktion, samt drapering, avprovning och testning.
Program: Designteknikerutbildningen
APA, Harvard, Vancouver, ISO, and other styles
6

Zagray, Peter G. "BYOD: The PreK-12 Technology Leader's Perspective." Youngstown State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1559239825777546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Svensson, Markus, and Alexander Svensson. "Bring Your Own Device (BYOD) : Potentialen och problematiken." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23228.

Full text
Abstract:
Många konsumenter är snabbare än organisationer på att börja använda ny teknik och utrustning. När de sedan tar med denna utrustning och teknik till arbetet för att på ett mer tillfredsställande sätt utföra sina arbetsuppgifter uppstår fenomenet BYOD som har blivit allt vanligare och vanligare. Syftet med denna studie är att ta reda på vad fenomenet BYOD är och hur det påverkar organisationer som anammar det. Dess fördelar och risker har undersökts samt fenomenets utbredning bland svenska organisationer. Tidigare undersökningar har legat till grund för att identifiera ofta förekommande fördelar och risker. Utifrån dessa har sedan en enkätundersökning utformats som skickats ut till svenska organisationer. Undersökningen visar att BYOD medför vissa fördelar. Dessa är t.ex. ökad produktivitet och kreativitet bland de anställda vilket i sin tur ger organisationer en ökad operationell effektivitet, fler nöjda, flexibla och mobila anställda och bättre kundbemötande. Undersökningen visar även att många organisationer saknar en formell BYOD-policy och att stöld eller borttappade enheter är ett stort säkerhetsproblem. Stora orosmomenten bland organisationerna är bland annat ökad belastning på IT-avdelningen och undermålig enhetssäkerhet. Det är viktigt att organisationer som anammar BYOD tänker på säkerhetslösningar som mitigerar dessa risker.
APA, Harvard, Vancouver, ISO, and other styles
8

Veljkovic, Ivan. "BYOD: Risk considerations in a South African organisation." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29850.

Full text
Abstract:
In recent times, while numerous organisations have difficulty keeping abreast with the frequent year-on-year technology changes, their employees on the other hand, continue to bring their personal devices to work to more readily access organisational data. This concept is known as Bring Your Own Device (BYOD). Studies have demonstrated that the introduction of BYOD commonly has a positive effect on both organisation and employees: increased optimism, job satisfaction and productivity are some of the perceived positive effects. Furthermore, BYOD can improve employees’ opportunities for mobile working and assist with the work flexibility they seek. This phenomenon, however, is still not well understood. In the South African context, this refers particularly to an inadequate understanding of risks associated with the introduction of BYOD into organisations. Some of the risks associated with this phenomenon are, for instance, related to information security, legislation and privacy issues. Hence, the intention of this research was to investigate, determine and assess BYOD risk considerations in a South African organisation. Using the available literature on this subject and an interpretative exploratory case study approach, this research explored various facets of BYOD-related risks (e.g. implementational, technological, legislation, regulation and privacy risks, human aspects and organisational concerns) as well as the impact these risks may have on both employees and an organisation. The organisation under investigation – from this point onward referred to as “Organisation A” – is a South African based information technology (IT) security consulting and service management organisation, which has seen increased expansion in its business and thus an increase in the number of its employees utilising their personal devices at the workplace. Even so, Organisation A was uncertain regarding possible risks that might hinder benefits of BYOD. Hence, this researcher defined the main research question as “What are the risks of introducing the BYOD in the South African organisation and what is an effective approach to address identified risks?”. The main objective was to identify and describe BYOD-related risks and to propose an appropriate model for addressing these risks. To answer the main research question, this researcher reviewed the applicable literature on the BYOD, including the limited South African literature pertaining to the subject. The review elicited the most common BYOD-related risks but also some models, frameworks and standards that may be applied for addressing these risks. Based on these revelations, an applicable BYOD risk management model was created and proposed. The literature review findings were subsequently tested in the empirical setting (in Organisation A) by conducting comprehensive interviews with research participants. This research adopted a qualitative approach in general and a case study methodology in particular. The collected data were analysed using the interpretative phenomenological analysis (IPA), which aided in providing a comprehensive understanding of the interviewees’ responses regarding the BYOD risks. The interviewees were selected based on a purposeful (pre-defined) sampling. The results of this interpretative research suggest that the interviewees’ responses are closely aligned with the information on BYOD risks collected from the pertinent literature. The results show that successful introduction and usage of BYOD in the studied organisation requires the implementation of mixed risk management measures: technological (e.g. mobile device management and its additional components), non-technological (e.g. IT or BYOD security policies), the usage of general risk management frameworks (e.g. ISO 27001), the development of an organisational security culture and skilling of the human factor (e.g. employee awareness, training and education, for example). Additionally, it was found that participation of employees in the development of BYOD policies is an essential and effective tactic for transforming a fragile BYOD risk link (i.e. employees) into a strong risk prevention mechanism. Furthermore, this research also revealed that in the South African context, it is important that an organisation’s BYOD security policies are sound, preferably meeting the POPI Act requirements and thereby avoiding legislation risks. The contribution of this research is twofold: first academic, and second, practical. The academic contribution is realised by adding to the body of knowledge on the BYOD risks – most particularly in terms of understanding potential risks when introducing BYOD in the South African context. The practical contribution manifests through the provision of detailed risk considerations and mitigation guidelines for organisations wishing to introduce BYOD practices or considering ways to improve their current BYOD risk management strategy. It is acknowledged that this research has some limitations, particularly in regard to the limited generalisation of the findings due to the limited sample provided by only one organisation. Although the results are not necessarily applicable to other South African organisations, these limitations did not impact the relevance and validity of this research.
APA, Harvard, Vancouver, ISO, and other styles
9

Pokorný, David. "Zavedení BYOD pro notebooky v Telefónica Czech Republic." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-198248.

Full text
Abstract:
This thesis deals with the implementation of the Bring Your Own Device program for employee's private laptops at Telefonica Czech Republic. It describes the solution using a distributed virtualization. The private laptops are given identical system environments as standard corporate laptops. The solution of the problem is set in the environment of the real corporation. Areas focused on the establishment and operation of the program are security, technology, finance and processes.
APA, Harvard, Vancouver, ISO, and other styles
10

Jönsson, Mariela. ""Byt babyrösten mot dirty snack"." Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-24227.

Full text
Abstract:
The overall aim of this study is to examine how Swedish women’s youth- magazines describes women. Through a social constructivist perspective, this essay particularly focuses on how the magazines deals with issues of gender and sexuality and what norms they reproduce. The magazine’s image of the young Swedish woman is a somewhat complex one, although one thing is strikingly clear: she is very different from men. While adjectives as hard, cold and tough are being ascribed to the latter, the woman is often depicted with more “soft” qualities. In some cases she is portrayed as an emotional and goodhearted little princess that faithfully is waiting for “mr. Right” (heterosexuality is a consistent assumption), while in other cases the magazines seem to urge her to take responsibility for both her own and the man’s sexuality and pleasure.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "BYOT"

1

Lee, Mal. Bring your own technology: The BYOT guide for schools and families. Camberwell, Vic: ACER Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roald, Dahl. Bytt beite! Oslo: Gyldendal Norsk Forlag, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Beneš, Svatopluk. Být hercem. 2nd ed. Praha: Brána, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kočík, Tibor. Byʹt namiesto maʹt. Bratislava: Vyd. Spolku slovenských spisovatel̓ov, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Donin, Hayim. Byt ́evreem. Rostov-na-Donu: Feniks, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ivanov, Petr. Byt: Stikhi. Ri͡a︡zanʹ: Profsoi͡u︡z literatorov, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Molho, Renata. Byt £ Armani. Sankt-Peterburg: Izd. Dom "Azbuka-klassika", 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yabe, Takeshi. Amerika-byo. To kyo: Shincho sha, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pavlyutenkov, E. M. Kem byt'? Kiev: Molod', 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1961. byol song gzhis ka. Lan kru'u: Kan su'u mi rigs dpe skrun khang, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "BYOT"

1

Erhard, Franz Xaver. "dPal-'byor." In Kindlers Literatur Lexikon (KLL), 1. Stuttgart: J.B. Metzler, 2020. http://dx.doi.org/10.1007/978-3-476-05728-0_10958-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Halsey, Mike. "Managing BYOD Hardware." In Windows 10 Troubleshooting, 417–23. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-0925-7_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Konopinski-Klein, Nina. "Wohnung – Byt." In Slowakisch-Deutsch für die Pflege zu Hause, 91–107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49025-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Heinen, Richard. "BYOD in der Stadt." In Tablets in Schule und Unterricht, 191–208. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-13809-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Erhard, Franz Xaver. "dPal-'byor: gTsug g.yu." In Kindlers Literatur Lexikon (KLL), 1–2. Stuttgart: J.B. Metzler, 2020. http://dx.doi.org/10.1007/978-3-476-05728-0_10959-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hallett, Joseph, and David Aspinall. "Capturing Policies for BYOD." In ICT Systems Security and Privacy Protection, 310–23. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ratchford, Melva, Ping Wang, and Raed Omar Sbeit. "BYOD Security Risks and Mitigations." In Advances in Intelligent Systems and Computing, 193–97. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54978-1_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Handal, Boris, David Marcovitz, Robert Ritter, and Daniel Madigan. "Rethinking BYOD Models and Student’s Control." In Education in the Asia-Pacific Region: Issues, Concerns and Prospects, 473–93. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4944-6_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Donaldson, Scott E., Stanley G. Siegel, Chris K. Williams, and Abdul Aslam. "Enterprise Cybersecurity for Mobile and BYOD." In Enterprise Cybersecurity, 119–29. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ng, Wan. "Mobile Learning: BYOD and Personalised Learning." In New Digital Technology in Education, 171–89. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-05822-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "BYOT"

1

Sedigh, Arya, Carlene Campbell, and Kapilan Radhakrishnan. "BYOT Network Solutions for Enterprise Environment." In 2014 UKSim-AMSS 16th International Conference on Modelling and Simulation (UKSim). IEEE, 2014. http://dx.doi.org/10.1109/uksim.2014.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bachlechner, Daniel. "Determinants of successful BYOT initiatives: A theoretical framework." In 2016 SAI Computing Conference (SAI). IEEE, 2016. http://dx.doi.org/10.1109/sai.2016.7556145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mishra, Ajaykumar, and Kuntesh Jani. "Comparative study on bring your own technology [BYOT]: Applications & security." In 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO). IEEE, 2015. http://dx.doi.org/10.1109/eesco.2015.7253841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Balkind, Jonathan, Katie Lim, Michael Schaffner, Fei Gao, Grigory Chirkov, Ang Li, Alexey Lavrov, et al. "BYOC." In ASPLOS '20: Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3373376.3378479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Business Priorities Driving BYOD Adoption: A Case Study of a South African Financial Services Organization." In InSITE 2019: Informing Science + IT Education Conferences: Jerusalem. Informing Science Institute, 2019. http://dx.doi.org/10.28945/4284.

Full text
Abstract:
[This Proceedings paper was revised and published in the 2019 issue of the journal Issues in Informing Science and Information Technology, Volume 16] Aim/Purpose: Bring your own device (BYOD) provides opportunities for both the organization and employees, but the adoption of BYOD also introduces risks. This case study of an organization’s BYOD program identifies key positive and negative influences on the adoption decision. Background: The consumerization of IT introduced the BYOD phenomenon into the enterprise environment. As mobile and Internet technologies improve employees are opting to use their personal devices to access organizational systems to perform their work tasks. Such devices include smartphones, tablets and laptop computers. Methodology: This research uses a case study approach to investigate how business priorities drive the adoption of BYOD and how resulting benefits and risks are realized and managed by the organization. Primary empirical data was collected using semi-structured interviews with 15 senior employees from a large South African financial services organization. Policy documents from the organization were analyzed as secondary data. Contribution: Thematic analysis of the data revealed six major themes: improving employee mobility; improving client service and experience; creating a competitive industry advantage; improving business processes; information security risks; and management best practices. Findings: The themes were analyzed using the Technology-Organization-Environment (TOE) framework, showing the key positive and negative influences on the adoption decision. Recommendations for Practitioners: Organizations need to clearly understand the reasons they want to introduce BYOD in their organizations. The conceptual framework can be applied by practitioners in their organizations to achieve their BYOD business objectives. Recommendations for Researchers: BYOD remains an important innovation for organizations with several aspects worthy of further study. The TOE framework presents a suitable lens for analysis, but other models should also be considered. Impact on Society: The findings show that organizations can use BYOD to improve client service, gain competitive advantage, and improve their processes using their digital devices and backend systems. The BYOD trend is thus not likely to go away anytime soon. Future Research: The applicability of findings should be validated across additional contexts. Additional models should also be used.
APA, Harvard, Vancouver, ISO, and other styles
6

Lyon, Cate, and Mike Osterman. "Security BYOD." In the 2014 ACM SIGUCCS Annual Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2661172.2661176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ratchford, Melva M., and Yong Wang. "BYOD-Insure: A Security Assessment Model for Enterprise BYOD." In 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ). IEEE, 2019. http://dx.doi.org/10.1109/mobisecserv.2019.8686551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Perini, Vinícius Lahm, and Maria de Fátima Webber do Prado Lima. "BYOD Manager Kit." In the XIV Brazilian Symposium. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3229345.3229392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Günther, Sebastian, Martin Schmitz, Florian Müller, Jan Riemann, and Max Mühlhäuser. "BYO*." In IUI'17: 22nd International Conference on Intelligent User Interfaces. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3038450.3038456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Martín-Ramos, Pablo, Maria Susano, Pedro S. Pereira da Silva, and Manuela Ramos Silva. "BYOD for Physics Lab." In TEEM 2017: 5th International Conference Technological Ecosystems for Enhancing Multiculturality. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3144826.3145413.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "BYOT"

1

Benham, P. H., and E. T. Burden. Stratigraphy of Cretaceous - Tertiary Rocks of North Bylot Trough, Bylot Island, N.w.t. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1990. http://dx.doi.org/10.4095/131353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haggart, J. W. Bylot Island ancient environments research. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2017. http://dx.doi.org/10.4095/299666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haggart, J. W. Bylot Island ancient environments research. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2017. http://dx.doi.org/10.4095/299667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Klassen, R. A. Quaternary geology and glacial history of Bylot Island, Northwest Territories. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1993. http://dx.doi.org/10.4095/183984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Souppaya, Murugiah P., and Karen A. Scarfone. User's Guide to Telework and Bring Your Own Device (BYOD) Security. National Institute of Standards and Technology, July 2016. http://dx.doi.org/10.6028/nist.sp.800-114r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Klassen, R. A. Surficial geology, Bylot Island and adjacent areas, District of Franklin, Northwest Territories. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1993. http://dx.doi.org/10.4095/183997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jackson, G. D., T. R. Iannelli, R. D. Knight, and D. Lebel. Neohelikian bylot supergroup of Borden rift basin, northwestern Baffin Island, District of Franklin. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1985. http://dx.doi.org/10.4095/120171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Souppaya, Murugiah P., and Karen A. Scarfone. Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security. National Institute of Standards and Technology, July 2016. http://dx.doi.org/10.6028/nist.sp.800-46r2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ioannides, N. S. Dinoflagellate cysts from upper cretaceous-lower tertiary sections, Bylot and Devon Islands, Arctic Archipelago. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jackson, G. D., and D. F. Sangster. Geology, Mineral Deposits and Occurrences, Northwest Baffin Island and Bylot Island, District of Franklin, Northwest Territories. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/123765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography