The organization of Gigantic Corporation has been utilizing various policies in order to utilize it for the benefit of the company. However, with every implemented new policy, there also resides impending risks associated with it. It is required for every organization to realize the impending risk associated with an implemented strategy along for assessing the development of the organization in the long run (Cho & Ip, 2018). It could be very risky for an organization to implement a new technology or business strategy within the business process without analyzing the risks associated with it, which can have a potential to cause serious harm to the business. The most intelligent implementation in a business organization on account of business development is the introduction of ICT strategies. This also needs constant improvement and thorough monitoring and reporting to find out if any impending risks are found.
In addition to that, BYOD or Bring Your Own Device policy is a technique that requires employees in the organization to access the internal IT resources, like applications and databases through their own devices. These devices include the tablet computers, laptops, mobiles and other portable connecting devices. BYOD has found popularity in the latest times with a survey from Cisco done in the year 2012 revealing of about 95 per cent of organizations approving of using personally used smart devices and other personal connecting devices to access the resources and assets of the organizations (Garba et al., 2015). In addition to that, predictions have revealed that by the recent years all of the organizations implementing ICT technologies as a business strategy would include BYOD into the business framework. For Gigantic Corporation as well, BYOD has thus found importance to become an integral framework of strategy. It is predicted by the hierarchy of the organization that this will in fact increase the efficiency and convenience of work.
However, there are many factors working behind the implementation of BYOD in the organization, including the resources and assets of the organization being highly influenced by the newest technology. This means that the people in the organization will use the resources and business assets of the organization through their own devices (Zahadat et al., 2015). Nevertheless, the main reason behind the organization’s decision to implement this new business idea is to make sure that production be increased with lowest costs implemented. There are advantages to this technology when implemented within an organization, but it also has potential risks about the cost and security of the company. Before adopting the technology and introducing it to the organization, these potential risks should also be analyzed and taken into consideration. The most common misconception about BYOD is that, it created the initial idea that the company would save costs since the employees would use their own devices.
Thus, the potential risk behind the implementation of this BYOD technology will be assessed before Gigantic Corporation implements it in their business process. This will be analyzed through the overview of the technology used, roles and responsibilities in the organization, including the risks associated with the entire implementation process consisting of the threats, vulnerabilities and consequences of the risks. Further, the existing risks for the implementation process in the organization would be analyzed with the analysis of the key threat agents of the risks associated. Then, finally there would be recommendations of the risk mitigation process with the impacts on the system as well as a literature review done on the latest technology of BYOD through several peer reviewed journals.
As per the requirements of Gigantic Corporation, below is the list of the requirements for the effective implementation of the BYOD or Bring Your Own Device technology in the company process:
It is important that before implementing this technology into the system of the entire organization it must first understand the legal implications technicalities and business and governance departments of the entire functionality of the strategy. The entire Technology depends on employees bringing their own devices and using them to access the resources and requirements of the organization (Olalere et al., 2015). Thus, the only technology that would be used for this purpose would be the understanding of the machineries and devices that is being used by the employees to find out if they are compatible enough to access all the resources and assets that the organization uses. This would make sure that all the devices that employees are using to continue their work by bring their own devices are compatible with the system and technicalities that the organization uses traditionally.
The roles of every workforce member within the organization should be clearly specified and defined as per the company policy. Implementing a BYOD policy within the organizations process is a huge responsibility and an understanding of the user and security requirements shall be utilised to form the foundation of a basic protocol that would address the business policy. This role should be played by the higher executives of the organization (Brodin, 2015). They should also keep in mind about the legal liabilities of bringing personal devices into professional grounds. The roles of the employees in this regard are to follow the protocol and abide by the legal liabilities of the organization in effectively putting forward their efforts in their career and responsibility towards the organization.
The rules of every employee in the organization should be clearly specified since bringing your own device is a huge responsibility from the part of the employees in the organization. This is because by utilising personal devices in to accessing professional databases and Organization resources it needs to be kept in mind that devices we well compatible with the organizational structures (Eslahi et al., 2014). The role of the individual employees does not only remain with their personal devices while finding out the compatibility with the organization’s traditional systems but also this responsibility is to be perceived from the side of the organization as well. If the devices are not compatible with the organization’s traditional systems then it would be a huge problem for the employees to effectively carry on with their work within the organization. This has the potential to hamper time and money.
Every organization looks forward to implement new technologies in their business process system so that they could apply these techniques as an advantage which would intern reduce the involvement of cash and resource within a project and keep the organization ahead of their competitors. In the same way Gigantic Corporation also wanted the employees to bring their own devices so that this would cut down the company resources and the cost utilised within the business. However the technology that is being used is not out of the zone of bringing impending risks within the organization (Kiger & Herro, 2015). If these risks are not assessed and analysed to be sure of the severity of causing harm to the organization then it would cost the organization huge amount of resources asset and capital in recovering from the risks.
Therefore, the purpose of the task to assess the risks that are impending in the implementation of the latest technology of BYOD is necessary for the benefit of the organization to find if there are any risks within the implemented Technology (Keyes, 2016). The purpose of this task is to analyse the risks that has the potential to cause problems in the organization and provide a feasible solution for them to the authorities so that the organization can father look forward into mitigating these risks and then implementing the entire Technology within the process of the business organization.
The BYOD technology has various types of threats regarding the technology that can be established in this section. There are certain factors that increase the risk that occurred in the technology starting with the allowance of coexistence for the enterprise and personal data within a single device. This is a very problematic issue that feels to find any balance between a security control of strict nature for enterprise and personal data privacy (Tu, Adkins & Zhao, 2018). Particularly in this case where the device is used by every employee is not issued by corporate asset it can lead to data leakage when enterprise information is carried forward to personal contacts by mistake from the part of the employees. It can also form huge impact on the organization when these devices are connected to each other. Again the different versions of the operating systems in every device keep on changing with technological advancements and the previous version have a tendency to get outdated really fast. That’s for the IT Department it becomes a very difficult task to support these devices and their advancements with the organizational standards set as traditional.
The further analysed within the organization that has the potential to cause risks are as described in the table below:
Threat ID |
Threats |
Threat Agent |
TA Motivation |
TA Capacity (knowledge etc.) |
Comments |
Threat Assessment Value |
T1 |
Coexistence of Personal Data and Professional Data within the same device |
Employees, Cyber criminals, Hackers |
Medium |
Varies from low to high |
When enterprise data personal data seems to coexist within the same device family by an employee it becomes a problematic task to create balance between the strict security control of enterprise and the privacy of the personal data especially in a case where the device found is not listed under the issued asset of corporate sector |
4 |
T2 |
Data Leakage |
Corporate raiders, professional criminals, hackers, employees |
Medium |
4 |
This threat is a stepping stone to achieve next stage of sabotage or penetration. |
5 |
T3 |
Large-scale and/or inappropriate data mining and/or surveillance |
Marketing companies, online service providers, malicious attackers |
To collect large volume of potentially personal sensitive data for market analysis and profit making |
5 |
Data generated through the huge amount of device is being used by every single person in the organization would be much difficult to handle for the person responsible in managing the generated data in the organization every day. |
4 |
T4 |
Problem for the IT department |
Employees |
To capture data generated in the organization everyday and to keep track on the generated data and the devices used for them |
High |
It is very difficult for it departments to support different operating systems carried by various types of mobile tablet computers and the version and career combinations of each of them. These are always constantly changing with the Technical Advancement and get outdated really quick. Even in odd cases there is an extra portability available in mobile devices that pose even serious challenges to the security of the devices. |
3 |
Table 1: Threat Assessment
(Source: Created by Author)
The main vulnerability that exists within the proposed technology utilised in the organization of Gigantic Corporations is the leakage of data due to the mistakes of the employees made up on handling the business details along with the personal data utilising the same device (Timms, 2017). Also along with this all the devices are always on and connected and become a great vulnerability to the entire system within an organization since the malicious attackers find the way for increased attacks mean through the different communication channels.
Below is a vulnerability assessment described to meet up on the entire implementation plan and it predicts the vulnerabilities based upon the medium size of the entire organization:
No |
Vulnerability Description |
Exposure [Metric Values are 1-5] |
Severity [Metric Values are 1-5] |
Vulnerability Assessment Value |
Comments / Additional Info |
V1 |
Leakage of data due to the mistakes of the employees |
3 |
4 |
2.4 |
The mistakes of the employees made up on handling the business details along with the personal data utilising the same device causes data leakage. |
V2 |
Devices are always on and connected |
4 |
3 |
2.4 |
The malicious attackers find the way for increased attacks mean through the different communication channels |
Table 2: Vulnerability Assessment
(Source: Created by the Author)
It has been reported as per industrial service that almost 60 out of 100 companies utilising the ‘bring your own device’ technology are vulnerable to various risks and the consequences that rise from the occurrence of these risks are several in number. Normally the data generated within an organization is considered as confidential (Ortbach, 2015). The confidential data can include documents email, report, files, usernames, application, password banking, information certificates that are installed and web accounts. This can be accessible from a device if it is compromised or even if it is stolen or lost. Since the employees use their own devices for retrieving and utilising Organization resource data and cost it becomes quite accessible for a hacker to compromise the data if the device gets misplaced. In another case that can be a huge drop in the bandwidth and memory space wasting resources is the spam attack (Niesen et al., 2016). The information that has been received from knowing or unknown sources has a tendency to cause list resources such as bandwidth and memory space. According to reports it can be said that almost half of the organizations that have allowed the employee to use their own devices within the organization needs to connect into the company’s network. Normally these breaches have the ability to attract complaint liability with the expenditure of millions of dollar per year. Along with that, it also has the potential of resulting into degrees number of customers trust or complete loss of customers. While implementing this new technology it is to be notified that the increased work activities during holiday leaves as employees are asked to check their own email and other work latest information.
Thus there is a huge problem arising factor as a consequence when it is considered that the home Smartphone used by the employees can lead to increased what to life conflict creating a job stress as well as family conflicts.
The BYOD technology has various types of threats regarding the technology that can be established in this section. There are certain factors that increase the risk that occurred in the technology starting with the allowance of coexistence for the enterprise and personal data within a single device. This is a very problematic issue that feels to find any balance between a security control of strict nature for enterprise and personal data privacy (Russell, 2016). Particularly in this case where the device is used by every employee is not issued by corporate asset it can lead to data leakage when enterprise information is carried forward to personal contacts by mistake from the part of the employees. It can also form huge impact on the organization when these devices are connected to each other. Again the different versions of the operating systems in every device keep on changing with technological advancements and the previous version have a tendency to get outdated really fast. That is for the IT Department it becomes a very difficult task to support these devices and their advancements with the organizational standards set as traditional.
However, there are many factors working behind the implementation of BYOD in the organization, including the resources and assets of the organization being highly influenced by the newest technology. This means that the people in the organization will use the resources and business assets of the organization through their own devices (Tanimoto et al., 2016). Nevertheless, the main reason behind the organization’s decision to implement this new business idea is to make sure that production be increased with lowest costs implemented. There are advantages to this technology when implemented within an organization, but it also has potential risks about the cost and security of the company. Before adopting the technology and introducing it to the organization, these potential risks should also be analyzed and taken into consideration. The most common misconception about BYOD is that, it created the initial idea that the company would save costs since the employees would use their own devices.
The discussion over the different threat agents as identified with the help of the analysis made can be described as follows:
Security issues are the biggest challenge that can act as a key threat agent regarding the ‘bring your own device’ Technology implementation in Gigantic Corporation. Since the professional and personal devices have no segregation between them and all the data is processed analysed and stored in the devices which the employees take back home, there is no security regarding the information which forms the key asset of the organization (Ogie, 2016). The primary asset of the industry lies in the generated information since it is a medium sized Enterprise. The security issues regarding the handling of the generated information can pose as a major threat to the entire organization.
Handling of the IT devices also becomes very difficult to manage within the organization when it comes to implement the ‘bring your own device’ or BYOD Technology. This is because the mobile devices have been facing constant updates since every technological advancement phase and this make freeze mobile devices go through frequent updates regarding the operating systems and applications (Othman & Kadir, 2017). However in the business process the technological advancements may or may not influence the business operations. Therefore inconsistency within the IT devices used by the employees in the organization and the traditional business process is found. This hey threat makes it impossible for effective use of the technology within the organization making it very difficult for the technology to be introduced within the business process.
Different employees working within an organization have different intellects. Not everyone within the organization handling different kinds of Departments have the knowledge of Information Technology. Therefore it is at all noticeable fact that the usage of IT to its full potential may or may not happen within the organization (Agudelo et al., 2016). There for the people within the organization might not follow by the company policies that are applicable to the power BYOD Technology. Some of them might not even comply with the security threats only on account of ignorance about using the personal devices properly to benefit the organization and synchronise with the organizational techniques.
According to the analyse details the best defence mechanism and Technical Solutions that can be proposed to fight the litigation that arise from the impending threat of having a data breach within the organization is to demonstrate that the company has attempted to activate the mitigation of threads that have been inherent in the business model. Therefore the importance about the organization shifts to understanding the Technical Solutions and their limitations of the technology of bring your own device even before adopting it (Baillette & Barlette, 2018). The Technical Solutions do not have the potential to stand alone and that it needs to be combined with mini appropriate policies regarding the utilisation of personal devices in the organization. Thus the first and foremost solution that is to be presented as a result of the analysis is that the company of Gigantic Corporations should implement a policy of consideration for the entire workforce explaining the security reasons and the actual utilisation of personal devices into professional foreground (Zain, Othman & Kadir, 2017). The solution regarding implementing a BYOD policy within the organization can explain how people can use their mobile devices with utilising a software solution that has the potential to control and encrypt the info its policies on the personal devices. In addition to direct the security application and virtualizations of Desktop as well as applications must be thoroughly explained to the workforce.
With these solutions generated within the organization it is suppose it that Gigantic Corporations and feasibility implement the technology of BYOD into the organization.
Therefore the solutions that has been mentioned previously in this risk analysis report on the most commonly adopted technology of BYOD within the organization of gigantic solutions it can be said that the impact on the entire business system can be beneficial to the organization’s overall value. Without identifying the risk and implementing the technology then and there within the organization would have been beneficial to some extent but in the long run would only create problems within the organization which in turn would result into a repulsion of the technology and provide massive security threats and vulnerability attacks on the system. However this technology has been considered as one of the most globally adopted Technologies but it also comes with various cons that should be taken care of before implementing. The detection system of the threats and providing solutions to mitigate these threats would generate the organization to develop policies for the employees in the organization before using those personal devices for professional reasons (Magruder et al., 2015). This is also suggested after the risk assessment because with the utilisation of personal devices the employees are accessing the company’s resources and assets. One of these assets are also the information generated within the system which are at high risk because either the ignorance of the people handling the devices or there is no policy within the organization to provide mobile and personal device security. In regards to that it is a noticeable fact that just not the devices but also the organization’s in intricate data and valuable assets were also at stake. Thus, implementing these risk analysis solutions would provide the organization with feasible implementation of the newest technology providing benefits to the company and reducing risk of impending threats to its minimum.
Since BYOD Technology is one of the most commonly adopted Technologies that have been utilised by different organization within the business process, there has been many peer-reviewed journals regarding this technology. Taken in account of a few with relevant information regarding this topic have been reviewed for the literature. All these journals have been chosen on the basis of the amount of information they are able to provide and their proper structure of being a journal. The papers reviewed have been able to provide relevant information regarding the technology and the risks that are subjected to cause organizations severe harm. The risks associated with the technology have been thoroughly pointed out in this papers along with how the organization copes up with the threats once a company has been attacked.
According to author Gaff (2015), BYOD or Bring Your Own Device policy is a technique that requires employees in the organization to access the internal IT resources, like applications and databases through their own devices. These devices include the tablet computers, laptops, mobiles and other portable connecting devices. BYOD has found popularity in the latest times with a survey from Cisco done in the year 2012 revealing of about 95 per cent of organizations approving of using personally used smart devices and other personal connecting devices to access the resources and assets of the organizations. In addition to that, predictions have revealed that by the recent years all of the organizations implementing ICT technologies as a business strategy would include BYOD into the business framework. For Gigantic Corporation as well, BYOD has thus found importance to become an integral framework of strategy. It is predicted by the hierarchy of the organization that this will in fact increase the efficiency and convenience of work.
In another paper, the author has focused on the fact that, for an organization’s BYOD policy to be effective, it must be able to evolve as new issues come to light. To do so, a governance model is necessary, such as one that measures and monitors factors like costs, security breaches, lost phones and jailbreaks. An effective BYOD plan requires a strong model of governance. Without one, BYOD could become more of a problem than the solution it is meant to be (Dhingra, 2016). However, there are many factors working behind the implementation of BYOD in the organization, including the resources and assets of the organization being highly influenced by the newest technology. This means that the people in the organization will use the resources and business assets of the organization through their own devices. Nevertheless, the main reason behind the organization’s decision to implement this new business idea is to make sure that production be increased with lowest costs implemented. There are advantages to this technology when implemented within an organization, but it also has potential risks about the cost and security of the company. Before adopting the technology and introducing it to the organization, these potential risks should also be analyzed and taken into consideration. The most common misconception about BYOD is that, it created the initial idea that the company would save costs since the employees would use their own devices.
The identified threat instigators have been arising due to various factors and regarding these, the authors of the journals have stated that one of the main reasons are the misunderstanding of the employees regarding the BYOD policy altogether. Different employees working within an organization have different intellects. Not everyone within the organization handling different kinds of Departments have the knowledge of Information Technology. Therefore it is at all noticeable fact that the usage of IT to its full potential may or may not happen within the organization (Downer & Bhattacharya, 2015). There for the people within the organization might not follow by the company policies that are applicable to the power BYOD Technology. Some of them might not even comply with the security threats only on account of ignorance about using the personal devices properly to benefit the organization and synchronise with the organizational techniques. In addition to that, security threat also forms a major issue in this regard. Security issues are the biggest challenge that can act as a key threat agent regarding the ‘bring your own device’ or BYOD technology implementation in Gigantic Corporation. Since the professional and personal devices have no segregation between them and all the data is processed analysed and stored in the devices which the employees take back home, there is no security regarding the information which forms the key asset of the organization. The primary asset of the industry lies in the generated information since it is a medium sized Enterprise. The security issues regarding the handling of the generated information can pose as a major threat to the entire organization (Herrera, Ron & Rabadão, 2017). However, many journal articles have stated that there are still inconsistency in understanding of people about the BYOD technology and risks associated with it, since many organizations do not apply BYOD to the business process, but unknowingly employees have been using their personal devices to access the organizational resources and assets using their personal devices. May be these activities are not intentional, but also these form increased threats within the organization’s business process. This is a clear case of ignorance about the risk factors of the BYOD technology altogether.
However, these journal articles fall short about describing proper ways to make the people understand about the technology and provide them with a clear idea of how personal devices should be utilized within an organization to make sure no risk factors arise.
Conclusion
Thus, it can be stated that the new technology that Gigantic Corporation has been materializing to bring into the business process is found to be beneficiary for the organization in terms of saving cost and resources that are to be provided by the organization to the employees for utilizing the internal applications of the organization, but there has also been several risks noticed in the process, which has a potential to ruin the business process harming the business assets and resources in the process. This has been thoroughly identified by the analysis done on the entire business process before it has been implemented in the organization of Gigantic Corporation. The potential risk behind the implementation of this BYOD technology has been assessed for Gigantic Corporation implemented the technology in their business process to save them from being heavily influenced by the risks associated with the new technology.
The analysis has been done through the overview of the technology used, stating the roles and responsibilities of them in the organization; including the risks associated with the entire implementation process consisting of the threats, vulnerabilities and consequences of the risks. Further, the existing risks for the implementation process in the organization has been thoroughly analyzed with the scrutiny done about the key threat agents of the risks associated. Then, finally a recommendation has been made out of the risk mitigation process with the impacts of them on the system. The termination of the process of analyzing the risks in the technology is done with a literature review on the latest technology of BYOD through several peer reviewed journals. The entire analysis process has concluded the fact that there are several risks that made BYOD a risky process to be implemented within the organization.
The solutions that are proposed as a result of the analysis may or may not be clearly understood by the organization, since the organization has been implementing the new technology for providing the company with decreased expenditure on company costing and infrastructure. The risk assessment report as described above, points out the correct way to implement BYOD in the organization’s process by declaring the potential risks and remedies. It also explains how the organization can be at the safeguard about risking the company assets and resources by introducing several policies associated with the BYOD technology. The analysis also finds out several key points of threat consideration to successfully implement the remedying solutions. The privacy policy and the rules and regulations that need to be implemented within the organization before BYOD technology is implemented are also mentioned as per the analysis made. Since, Gigantic Corporation is an ME or Medium-sized Enterprise, the analysis is made based on that. There is also scope of future research on this subject so that in the long run the company can handle intricate situations that can cause risks after the implementation of the technology of BYOD. This concludes the entire risk assessment process done on the Medium-sized Enterprise of Gigantic Corporation for their business strategy of implementing the latest technology of BYOD or Bring Your Own Device to the organization in regards of benefitting the company.
References
Agudelo, C. A., Bosua, R., Ahmad, A., & Maynard, S. B. (2016). Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective. arXiv preprint arXiv:1606.01450.
Baillette, P., & Barlette, Y. (2018). BYOD-related innovations and organizational change for entrepreneurs and their employees in SMEs: The identification of a twofold security paradox. Journal of Organizational Change Management, 31(4), 839-851.
Brodin, M. (2015). Combining ISMS with strategic management: the case of BYOD. In 8th IADIS International Conference on Information Systems 2015, 14–16 March, Madeira, Portugal (pp. 161-168). IADIS Press.
Cho, V., & Ip, W. H. (2018). A Study of BYOD adoption from the lens of threat and coping appraisal of its security policy. Enterprise Information Systems, 12(6), 659-673.
Dhingra, M. (2016). Legal issues in secure implementation of bring your own device (BYOD). Procedia Computer Science, 78, 179-184.
Downer, K., & Bhattacharya, M. (2015, December). BYOD security: A new business challenge. In Smart City/SocialCom/SustainCom (SmartCity), 2015 IEEE International Conference on (pp. 1128-1133). IEEE.
Eslahi, M., Naseri, M. V., Hashim, H., Tahir, N. M., & Saad, E. H. M. (2014, April). BYOD: Current state and security challenges. In Computer Applications and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on (pp. 189-192). IEEE.
Gaff, B. M. (2015). Byod? omg!. Computer, 48(2), 10-11.
Garba, A. B., Armarego, J., Murray, D., & Kenworthy, W. (2015). Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments. Journal of Information privacy and security, 11(1), 38-54.
Herrera, A. V., Ron, M., & Rabadão, C. (2017, June). National cyber-security policies oriented to BYOD (bring your own device): Systematic review. In Information Systems and Technologies (CISTI), 2017 12th Iberian Conference on (pp. 1-4). IEEE.
Keyes, J. (2016). Bring your own devices (BYOD) survival guide. Auerbach Publications.
Kiger, D., & Herro, D. (2015). Bring your own device: Parental guidance (PG) suggested. TechTrends, 59(5), 51-61.
Magruder, J. S., Lewis, S. X., Burks, E. J., & Smolinski, C. (2015). Bring Your Own Device (BYOD)–Who Is Running Organizations?. Journal of Accounting & Finance (2158-3625), 15(1).
Niesen, T., Houy, C., Fettke, P., & Loos, P. (2016, January). Towards an integrative big data analysis framework for data-driven risk management in Industry 4.0. In System Sciences (HICSS), 2016 49th Hawaii International Conference on (pp. 5065-5074). IEEE.
Ogie, R. (2016). Bring your own device: an overview of risk assessment. IEEE Consumer Electronics Magazine, 5(1), 114-119.
Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A. (2015). A review of bring your own device on security issues. Sage Open, 5(2), 2158244015580372.
Ortbach, K. (2015, May). Unraveling the Effect of Personal Innovativeness on Bring-Your-Own-Device (BYOD) Intention-The Role of Perceptions Towards Enterprise-Provided and Privately-Owned Technologies. In ECIS.
Othman, S. H., & Kadir, R. (2017). Security-Based BYOD Risk Assessment Metamodelling Approach.
Russell, C. (2016). Assessing the risk of transformative technologies. Computer Fraud & Security, 2016(7), 15-19.
Tanimoto, S., Yamada, S., Iwashita, M., Kobayashi, T., Sato, H., & Kanai, A. (2016, October). Risk assessment of BYOD: Bring your own device. In Consumer Electronics, 2016 IEEE 5th Global Conference on (pp. 1-4). IEEE.
Timms, K. (2017). BYOD must be met with a wider appreciation of the cyber-security threat. Computer Fraud & Security, 2017(7), 5-8.
Tu, C. Z., Adkins, J., & Zhao, G. Y. (2018). Complying with BYOD Security Policies: A Moderation Model.
Zahadat, N., Blessner, P., Blackburn, T., & Olson, B. A. (2015). BYOD security engineering: A framework and its analysis. Computers & Security, 55, 81-99.
Zain, Z. M., Othman, S. H., & Kadir, R. (2017). Security-Based BYOD Risk Assessment Metamodelling Approach.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download