• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Tuesday, September 2, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Bring your own (security) disaster

Bioengineer by Bioengineer
December 14, 2016
in Science News
Reading Time: 2 mins read
0
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

Bring your own device (BYOD) to work is common practice these days. Almost everyone has a smart or a tablet and in many office and other jobs, using the device makes workers more effective and more efficient in their work (games and personal social media aside, perhaps). A new study in the International Journal of Teaching and Case Studies suggests, however, that most company IT security managers would prefer employees not to BYOD.

Khaled Zayed of the International School of Management in New York, USA and also Paris, France, reiterates the security and safety concerns that surround BYOD and has carried out a qualitative case study of information technology security managers to determine the industry perspective on BYOD.

"IT is critical in our modern world for doing business and communicating with others," explains Zayed, "Businesses, governments, and individuals rely on internet-enabled technology to achieve this, using mobile devices, e-mails, and social media, and companies around the world conduct business using local and wide area networks and virtual private networks." The social networking servers, process virtualization, and cloud computing present both opportunities for rapid innovation as well as risks to proprietary information, trade secrets and intellectual property, especially when those workers with access to sensitive data use their own devices.

There are security concerns for any networked data and system, viruses and other malware, phishing and hacking attacks, identity theft, data leaks, corporate espionage, denial of service attacks, and of course social engineering and confidence tricks. It has been said many times before that companies must establish strict policies to address the risks, as employees using IT at work and in particular in the context of BYOD are wholly unaware of the risks. If they are aware of the risks they are not necessarily aware of ways to mitigate those risks or how to address problems that arise if their or the company IT systems are compromised.

###

Zayed, K. (2016) 'Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device', Int. J. Teaching and Case Studies, Vol. 7, Nos. 3/4, pp.271-288.

Media Contact

Albert Ang
[email protected]
@inderscience

http://www.inderscience.com

############

Story Source: Materials provided by Scienmag

Share12Tweet8Share2ShareShareShare2

Related Posts

Autism Proteins Maintain Striatal Asymmetry in Mice

September 2, 2025

Discrimination in Healthcare: Insights for Older Adults

September 2, 2025

Dydrogesterone vs. Vaginal Progesterone in IVF Support

September 2, 2025

Nursing Home Residents: Reducing Unnecessary ER Visits

September 2, 2025
Please login to join discussion

POPULAR NEWS

  • blank

    Breakthrough in Computer Hardware Advances Solves Complex Optimization Challenges

    154 shares
    Share 62 Tweet 39
  • Molecules in Focus: Capturing the Timeless Dance of Particles

    143 shares
    Share 57 Tweet 36
  • New Drug Formulation Transforms Intravenous Treatments into Rapid Injections

    117 shares
    Share 47 Tweet 29
  • Do people and monkeys see colors the same way?

    112 shares
    Share 45 Tweet 28

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Autism Proteins Maintain Striatal Asymmetry in Mice

Discrimination in Healthcare: Insights for Older Adults

Dydrogesterone vs. Vaginal Progesterone in IVF Support

  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.