For full functionality, including active links, we recommend downloading the PDF. Certain interactive features may not operate within the embedded viewer.
Download this PDF file

 

Crossref Citations

1. Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance
Alex Koohang, Jeretta Horn Nord, Zoroayka V. Sandoval, Joanna Paliszkiewicz
Journal of Computer Information Systems  vol: 61  issue: 2  first page: 99  year: 2021  
doi: 10.1080/08874417.2020.1779151

2. BYOD security issues: a systematic literature review
Melva Ratchford, Omar El-Gayar, Cherie Noteboom, Yong Wang
Information Security Journal: A Global Perspective  vol: 31  issue: 3  first page: 253  year: 2022  
doi: 10.1080/19393555.2021.1923873

3. Extending unified theory of acceptance and use of technology with ISO/IEC 27001 security standard to investigate factors influencing Bring Your Own Device adoption in South Africa
Thembekile Mayayise
SA Journal of Information Management  vol: 23  issue: 1  year: 2021  
doi: 10.4102/sajim.v23i1.1376

4. Exploring information systems security implications posed by BYOD for a financial services firm
Joel Chigada, Naailah Daniels
Business Information Review  vol: 38  issue: 3  first page: 115  year: 2021  
doi: 10.1177/02663821211036400