SlideShare a Scribd company logo
1 of 3
RESEARCH PROJECT
Select a topic of your choosing in the area of Access Control
and write a research paper as part of a group project. Make this
a paper appropriate for journal publication. That is you must
endeavor to meet all the requirements of such a project. Hence,
your paper should include all or most of the following:
1. Appropriate figures and tables
2. The research method(s)
3. The results
4. The discussion
5. Clear conclusion
6. A compelling introduction
7. An abstract
8. A well concise and descriptive title
9. Acknowledgements
10. References
Deliverables: a) Research proposal approval
b) Research paper presentation
c) Final paper submission
Milestones
1) Submission of Proposal
Due Date: June 14, 2019
2) Presentation of the data files
Due Date: June 15, 2019
3) Final Project Paper
Due Date: June 23, 2019
Lack of security in personal devices over devices provided by
an organization
Research proposal Overview
The current trends show increase in use of personal devices for
professional work, but the risks involved with this practice is
very high due to lack of control over such devices. Some of the
common security issues that arise due to devices that are
brought for work related activities are insecure network
connections, lost or stolen device, malware targeting these
devices, intervention of third-party applications. When coming
to the devices at work the access is restricted and standard
security procedures are laid on these devices. It will be difficult
for hackers to intervene these devices with a strict layer of
firewalls around them.
This research classified the issues of access control using
personal devices into three main categories. First, a trust which
refers to how much access does an organization provides to
their employees connecting to applications from a remote
location even with an unknown device. Second, a protection
which refers to preserving data even when devices are lost or
stolen. Third, a control which refers to how an organization
enforce compliance with corporate guidelines when the user is
on the move (Tokuyoshi, 2013). We will try to investigate on
the issues related to access control using the personal devices
by dividing them into five main categories.
1. Mobile device security issues
2. Lack of access control enforcement
3. Lack of data and policy protection
4. Platform dependent
5. Unaware of procedures and rights
The main aim of this research is to investigate the most recent
trends touching on the access control issues in using personal
devices concerning information security and also to analyze the
essential and comprehensive requirements needed to develop an
access control framework in the future.
References
B. Tokuyoshi, "The security implications of BYOD," Network
Security, vol. 2013, pp. 12-13, 2013.
J. Pinchot and K. Paullet, "BRING YOUR OWN DEVICE TO
WORK: BENEFITS, SECURITY RISKS, AND GOVERNANCE
ISSUES," Issues in Information Systems, vol. 16, 2015.

More Related Content

Similar to RESEARCH PROJECTSelect a topic of your choosing in the area of.docx

Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
Alexander Deucalion
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
CSCJournals
 
Grading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxGrading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docx
whittemorelucilla
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
IJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IJMIT JOURNAL
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
cowinhelen
 
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxAPA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
justine1simpson78276
 

Similar to RESEARCH PROJECTSelect a topic of your choosing in the area of.docx (20)

Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Grading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxGrading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docx
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
I018145157
I018145157I018145157
I018145157
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
 
76 s201913
76 s20191376 s201913
76 s201913
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxAPA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
Enhancing Mobile Learning Security
Enhancing Mobile Learning SecurityEnhancing Mobile Learning Security
Enhancing Mobile Learning Security
 

More from gholly1

Research Review Forms – Student NameResearch Review Forms Template.docx
Research Review Forms – Student NameResearch Review Forms Template.docxResearch Review Forms – Student NameResearch Review Forms Template.docx
Research Review Forms – Student NameResearch Review Forms Template.docx
gholly1
 
Research Request Agreement Report A. BackgroundThe Western Con.docx
Research Request Agreement Report A. BackgroundThe Western Con.docxResearch Request Agreement Report A. BackgroundThe Western Con.docx
Research Request Agreement Report A. BackgroundThe Western Con.docx
gholly1
 
Research ReportsCorporate research is an important but often o.docx
Research ReportsCorporate research is an important but often o.docxResearch ReportsCorporate research is an important but often o.docx
Research ReportsCorporate research is an important but often o.docx
gholly1
 
Research ReportEthical perspective on quality of care the.docx
Research ReportEthical perspective on quality of care the.docxResearch ReportEthical perspective on quality of care the.docx
Research ReportEthical perspective on quality of care the.docx
gholly1
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docx
gholly1
 
Research Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docxResearch Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docx
gholly1
 
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docxResearch QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
gholly1
 
Research Report Cardiac Conditions ProjectStudent Name.docx
Research Report  Cardiac Conditions ProjectStudent Name.docxResearch Report  Cardiac Conditions ProjectStudent Name.docx
Research Report Cardiac Conditions ProjectStudent Name.docx
gholly1
 
Research questionsIt was not known how criminal offenders percei.docx
Research questionsIt was not known how criminal offenders percei.docxResearch questionsIt was not known how criminal offenders percei.docx
Research questionsIt was not known how criminal offenders percei.docx
gholly1
 
Research Question What is the research questions What type .docx
Research Question What is the research questions What type .docxResearch Question What is the research questions What type .docx
Research Question What is the research questions What type .docx
gholly1
 

More from gholly1 (20)

Research Review Forms – Student NameResearch Review Forms Template.docx
Research Review Forms – Student NameResearch Review Forms Template.docxResearch Review Forms – Student NameResearch Review Forms Template.docx
Research Review Forms – Student NameResearch Review Forms Template.docx
 
Research Request Agreement Report A. BackgroundThe Western Con.docx
Research Request Agreement Report A. BackgroundThe Western Con.docxResearch Request Agreement Report A. BackgroundThe Western Con.docx
Research Request Agreement Report A. BackgroundThe Western Con.docx
 
Research ReportsCorporate research is an important but often o.docx
Research ReportsCorporate research is an important but often o.docxResearch ReportsCorporate research is an important but often o.docx
Research ReportsCorporate research is an important but often o.docx
 
Research ReportEthical perspective on quality of care the.docx
Research ReportEthical perspective on quality of care the.docxResearch ReportEthical perspective on quality of care the.docx
Research ReportEthical perspective on quality of care the.docx
 
Research Report Topic Security of Social NetworksReport m.docx
Research Report Topic Security of Social NetworksReport m.docxResearch Report Topic Security of Social NetworksReport m.docx
Research Report Topic Security of Social NetworksReport m.docx
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docx
 
Research Proposal DraftBy the due date assigned, write a 2 page .docx
Research Proposal DraftBy the due date assigned, write a 2 page .docxResearch Proposal DraftBy the due date assigned, write a 2 page .docx
Research Proposal DraftBy the due date assigned, write a 2 page .docx
 
Research Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docxResearch Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docx
 
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docxResearch QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
 
Research Report Cardiac Conditions ProjectStudent Name.docx
Research Report  Cardiac Conditions ProjectStudent Name.docxResearch Report  Cardiac Conditions ProjectStudent Name.docx
Research Report Cardiac Conditions ProjectStudent Name.docx
 
Research Question· AccuratelyClearly   states group’s Resea.docx
Research Question· AccuratelyClearly   states group’s Resea.docxResearch Question· AccuratelyClearly   states group’s Resea.docx
Research Question· AccuratelyClearly   states group’s Resea.docx
 
Research question Option 1 What effect does logistics ma.docx
Research question Option 1 What effect does logistics ma.docxResearch question Option 1 What effect does logistics ma.docx
Research question Option 1 What effect does logistics ma.docx
 
Research questionsIt was not known how criminal offenders percei.docx
Research questionsIt was not known how criminal offenders percei.docxResearch questionsIt was not known how criminal offenders percei.docx
Research questionsIt was not known how criminal offenders percei.docx
 
Research Question How has Greek Life ChangedImpacted the life of c.docx
Research Question How has Greek Life ChangedImpacted the life of c.docxResearch Question How has Greek Life ChangedImpacted the life of c.docx
Research Question How has Greek Life ChangedImpacted the life of c.docx
 
research question is how Liziqis video express chiese traditional t.docx
research question is how Liziqis video express chiese traditional t.docxresearch question is how Liziqis video express chiese traditional t.docx
research question is how Liziqis video express chiese traditional t.docx
 
Research Question How does social media effect the perception of be.docx
Research Question How does social media effect the perception of be.docxResearch Question How does social media effect the perception of be.docx
Research Question How does social media effect the perception of be.docx
 
Research Question What is the research questions What type .docx
Research Question What is the research questions What type .docxResearch Question What is the research questions What type .docx
Research Question What is the research questions What type .docx
 
Research public health issues on the Climate Change or Topic.docx
Research public health issues on the Climate Change or Topic.docxResearch public health issues on the Climate Change or Topic.docx
Research public health issues on the Climate Change or Topic.docx
 
Research Quantitative vs QualitativeBackground Quantitative da.docx
Research Quantitative vs QualitativeBackground Quantitative da.docxResearch Quantitative vs QualitativeBackground Quantitative da.docx
Research Quantitative vs QualitativeBackground Quantitative da.docx
 
Research Quantitative vs QualitativeBackground Quantitativ.docx
Research Quantitative vs QualitativeBackground Quantitativ.docxResearch Quantitative vs QualitativeBackground Quantitativ.docx
Research Quantitative vs QualitativeBackground Quantitativ.docx
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

RESEARCH PROJECTSelect a topic of your choosing in the area of.docx

  • 1. RESEARCH PROJECT Select a topic of your choosing in the area of Access Control and write a research paper as part of a group project. Make this a paper appropriate for journal publication. That is you must endeavor to meet all the requirements of such a project. Hence, your paper should include all or most of the following: 1. Appropriate figures and tables 2. The research method(s) 3. The results 4. The discussion 5. Clear conclusion 6. A compelling introduction 7. An abstract 8. A well concise and descriptive title 9. Acknowledgements 10. References Deliverables: a) Research proposal approval b) Research paper presentation c) Final paper submission Milestones 1) Submission of Proposal Due Date: June 14, 2019 2) Presentation of the data files Due Date: June 15, 2019 3) Final Project Paper Due Date: June 23, 2019
  • 2. Lack of security in personal devices over devices provided by an organization Research proposal Overview The current trends show increase in use of personal devices for professional work, but the risks involved with this practice is very high due to lack of control over such devices. Some of the common security issues that arise due to devices that are brought for work related activities are insecure network connections, lost or stolen device, malware targeting these devices, intervention of third-party applications. When coming to the devices at work the access is restricted and standard security procedures are laid on these devices. It will be difficult for hackers to intervene these devices with a strict layer of firewalls around them. This research classified the issues of access control using personal devices into three main categories. First, a trust which refers to how much access does an organization provides to their employees connecting to applications from a remote location even with an unknown device. Second, a protection which refers to preserving data even when devices are lost or stolen. Third, a control which refers to how an organization enforce compliance with corporate guidelines when the user is on the move (Tokuyoshi, 2013). We will try to investigate on the issues related to access control using the personal devices by dividing them into five main categories. 1. Mobile device security issues 2. Lack of access control enforcement 3. Lack of data and policy protection 4. Platform dependent 5. Unaware of procedures and rights The main aim of this research is to investigate the most recent trends touching on the access control issues in using personal devices concerning information security and also to analyze the essential and comprehensive requirements needed to develop an access control framework in the future.
  • 3. References B. Tokuyoshi, "The security implications of BYOD," Network Security, vol. 2013, pp. 12-13, 2013. J. Pinchot and K. Paullet, "BRING YOUR OWN DEVICE TO WORK: BENEFITS, SECURITY RISKS, AND GOVERNANCE ISSUES," Issues in Information Systems, vol. 16, 2015.