• No results found

[PDF] Top 20 Bring your own disclosure : analysing BYOD threats to corporate information

Has 10000 "Bring your own disclosure : analysing BYOD threats to corporate information" found on our website. Below are the top 20 most common "Bring your own disclosure : analysing BYOD threats to corporate information".

Bring your own disclosure : analysing BYOD threats to corporate information

Bring your own disclosure : analysing BYOD threats to corporate information

... sensitive corporate information [10], or perform network-related attacks [2], certain misconfigured device functionality, such as automatic data streaming, backup and content sharing [8] may pose serious ... See full document

9

Bring your own device organizational information security and privacy

Bring your own device organizational information security and privacy

... of BYOD tablet computers and 84% of BYOD smartphones accessing corporate data do not have any form of security installed on ...them. BYOD does not only reduce organisational control of systems ... See full document

9

Online Full Text

Online Full Text

... term BYOD(Bring Your Own Device) collectively refers to the related technologies, concepts and policies, where employees do works by accessing corporate’s internal IT resources, such as ... See full document

6

Corporate Governance and Accounting Information Disclosure in the Nigerian Banking Sector

Corporate Governance and Accounting Information Disclosure in the Nigerian Banking Sector

... between corporate governance, company attributes and voluntary disclosures of quoted companies in Nigeria using univariate, multivariate and cross section ...and corporate voluntary disclosure; Gao ... See full document

22

Informational Uniqueness, Corporate Disclosure and Information Environment

Informational Uniqueness, Corporate Disclosure and Information Environment

... discretionary disclosure behaviors 29 ...overall information endowment on the underlying firm over their common exposures, it also provides investors expanded knowledge about the timing of ... See full document

180

On Your Own

On Your Own

... Peter, went through me, and finally were delivered to Fraaz. This risked misunderstanding generated during the passing of information. Unfortunately, we could not schedule a weekly meeting between the three of us ... See full document

70

Modelling semantics of security risk assessment for bring your own device using metamodelling technique

Modelling semantics of security risk assessment for bring your own device using metamodelling technique

... In addition, malicious malware is also one of the most challenging security risks engaged to BYOD. Adopting BYOD may bring malware and viruses to the company network. Malware is the attack that is ... See full document

39

Bring Your Own Device: Security Challenges and A theoretical Framework for Two-Factor Authentication

Bring Your Own Device: Security Challenges and A theoretical Framework for Two-Factor Authentication

... a BYOD environment, with the loss of an employee mobile device, or if the device is stolen, an attacker with knowledge of the employee login details can gain improper access to the enterprise ... See full document

12

Taking the tablets   should you bring your own or use those prescribed?

Taking the tablets should you bring your own or use those prescribed?

... 4. Staff confidence is improved with a single device deployment. Staff focus groups indicated that preparing resources, information and activities for multiple devices (BYOD) was almost impossible to ... See full document

15

Bring your own authenticator/authentication security in physical access control systems

Bring your own authenticator/authentication security in physical access control systems

... We have explained in Subsection 3.7 that the threat modelling process includes iterative im- provements. In our experience, a lower level (more detailed) threat model can be used as a feed to return and improve the ... See full document

66

Bring your own device philosophy from the user's perspective: an empirical investigation

Bring your own device philosophy from the user's perspective: an empirical investigation

...  Security: The fundamental danger of BYOD philosophy is that the private owned devices can access and store corporate data. Security policies should be implemented from the IT department even if the ... See full document

13

Impact of incentives to voluntarily disclose corporate governance information in annual reports: an empirical study of Malaysian publicly listed companies

Impact of incentives to voluntarily disclose corporate governance information in annual reports: an empirical study of Malaysian publicly listed companies

... on information asymmetry problems among parties that are involved in the allocation of firm ...funds. Information asymmetry problems occur when one party (manager) has more information than the other ... See full document

192

Corporate Governance, Voluntary Disclosure, And Firm Information Environment

Corporate Governance, Voluntary Disclosure, And Firm Information Environment

... In addition to examining the board of directors, agency theory (Jensen and Meckling, 1976) presents managerial ownership as a governance mechanism that solves possible agency conflicts between managers and shareholders ... See full document

14

Corporate governance and financial information disclosure in developing coubtry

Corporate governance and financial information disclosure in developing coubtry

... the disclosure information importance has ...accounting information disclosure would have a comparative advantage evaluated to nations with inadequate ...Hence, disclosure requirements ... See full document

92

Literature Review on the Impression Management in Corporate Information Disclosure

Literature Review on the Impression Management in Corporate Information Disclosure

... Although we make literature review on the current researches and make our suggestions, some limitations exist: firstly, we only review the impression management related to the corporate [r] ... See full document

7

Firm Attributes and Earnings Quality of listed Oil and Gas Companies in Nigeria

Firm Attributes and Earnings Quality of listed Oil and Gas Companies in Nigeria

... Dwi Lusi T .S, (2013), Corporate Governance, Firm size , and Earning Management: Evidence in Indonesia Stock Exchange. IOSR Journal of Business and Management (IOSR-JBM) e-ISSN: 2278-487X, p-ISSN: 2319-7668. ... See full document

16

To what extent can 'bring your own device' be an enabler to widening participation in higher education for the socially disadvantaged?

To what extent can 'bring your own device' be an enabler to widening participation in higher education for the socially disadvantaged?

... Certain elements of higher education are historically regarded as being elitist and steeped in so much history and tradition that many institutions are unwilling to change to cater for the populations that they serve. ... See full document

10

Corporate financial reporting : firm characteristics and the use of the Internet as a medium of communication

Corporate financial reporting : firm characteristics and the use of the Internet as a medium of communication

... report disclosure among the clients of larger audit ...limited disclosure due to the economic consequences stemming from damages to their ‘brand name’ ... See full document

46

Threats and Vulnerabilities of BYOD and Android

Threats and Vulnerabilities of BYOD and Android

... In this paper, Containerization have been discussed. After that, we have been tried to explore the two main problems-one is container vulnerability and other is ‘second vulnerability’ that is App Installation Permission ... See full document

7

Bring your own device (BYOD) and teacher pedagogy in a New Zealand primary school

Bring your own device (BYOD) and teacher pedagogy in a New Zealand primary school

... who could not, for a number of reasons, bring a device to school. She tried to plan so the impact on these children would be minimal, while at the same time, planning for the children who were bringing devices. Jo ... See full document

9

Show all 10000 documents...