• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Saturday, February 7, 2026
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Bring your own (security) disaster

Bioengineer by Bioengineer
December 14, 2016
in Science News
Reading Time: 2 mins read
0
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

Bring your own device (BYOD) to work is common practice these days. Almost everyone has a smart or a tablet and in many office and other jobs, using the device makes workers more effective and more efficient in their work (games and personal social media aside, perhaps). A new study in the International Journal of Teaching and Case Studies suggests, however, that most company IT security managers would prefer employees not to BYOD.

Khaled Zayed of the International School of Management in New York, USA and also Paris, France, reiterates the security and safety concerns that surround BYOD and has carried out a qualitative case study of information technology security managers to determine the industry perspective on BYOD.

"IT is critical in our modern world for doing business and communicating with others," explains Zayed, "Businesses, governments, and individuals rely on internet-enabled technology to achieve this, using mobile devices, e-mails, and social media, and companies around the world conduct business using local and wide area networks and virtual private networks." The social networking servers, process virtualization, and cloud computing present both opportunities for rapid innovation as well as risks to proprietary information, trade secrets and intellectual property, especially when those workers with access to sensitive data use their own devices.

There are security concerns for any networked data and system, viruses and other malware, phishing and hacking attacks, identity theft, data leaks, corporate espionage, denial of service attacks, and of course social engineering and confidence tricks. It has been said many times before that companies must establish strict policies to address the risks, as employees using IT at work and in particular in the context of BYOD are wholly unaware of the risks. If they are aware of the risks they are not necessarily aware of ways to mitigate those risks or how to address problems that arise if their or the company IT systems are compromised.

###

Zayed, K. (2016) 'Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device', Int. J. Teaching and Case Studies, Vol. 7, Nos. 3/4, pp.271-288.

Media Contact

Albert Ang
[email protected]
@inderscience

http://www.inderscience.com

############

Story Source: Materials provided by Scienmag

Share12Tweet8Share2ShareShareShare2

Related Posts

Phage-Antibiotic Combo Beats Resistant Peritoneal Infection

February 7, 2026

Boosting Remote Healthcare: Stepped-Wedge Trial Insights

February 7, 2026

Barriers and Boosters of Seniors’ Physical Activity in Karachi

February 7, 2026

Evaluating Pediatric Emergency Care Quality in Ethiopia

February 7, 2026
Please login to join discussion

POPULAR NEWS

  • Robotic Ureteral Reconstruction: A Novel Approach

    Robotic Ureteral Reconstruction: A Novel Approach

    82 shares
    Share 33 Tweet 21
  • Digital Privacy: Health Data Control in Incarceration

    63 shares
    Share 25 Tweet 16
  • Study Reveals Lipid Accumulation in ME/CFS Cells

    57 shares
    Share 23 Tweet 14
  • Breakthrough in RNA Research Accelerates Medical Innovations Timeline

    53 shares
    Share 21 Tweet 13

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Phage-Antibiotic Combo Beats Resistant Peritoneal Infection

Boosting Remote Healthcare: Stepped-Wedge Trial Insights

Barriers and Boosters of Seniors’ Physical Activity in Karachi

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 73 other subscribers
  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.