{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:58:06Z","timestamp":1764403086686},"reference-count":78,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2022,5,4]]},"DOI":"10.1080\/19393555.2021.1923873","type":"journal-article","created":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T14:08:01Z","timestamp":1626962881000},"page":"253-273","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":17,"title":["BYOD security issues: a systematic literature review"],"prefix":"10.1080","volume":"31","author":[{"given":"Melva","family":"Ratchford","sequence":"first","affiliation":[{"name":"Dakota State University, Madison, United States"}]},{"given":"Omar","family":"El-Gayar","sequence":"additional","affiliation":[{"name":"Dakota State University, Madison, United States"}]},{"given":"Cherie","family":"Noteboom","sequence":"additional","affiliation":[{"name":"Dakota State University, Madison, United States"}]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"Dakota State University, Madison, United States"}]}],"member":"301","published-online":{"date-parts":[[2021,7,22]]},"reference":[{"key":"cit0001","unstructured":"27001Academy. (2017a).Clause-by-clause explanation of ISO 27001."},{"key":"cit0002","unstructured":"27001Academy. (2017b).Diagram of ISO 27001 risk assessment and treatment process. https:\/\/cdn2.hubspot.net\/hubfs\/1983423\/27001Academy\/27001Academy_FreeDownloads\/Diagram_of_ISO_27001_risk_assessment_and_treatment_process_EN.pdf?utm_campaign=free-resources-27001&utm_source=hs_automation&utm_medium=email&utm_content=50020281&_hsenc=p2ANqtz-9usCc12nPeBCl58pNYfIh5gx18Bg9LW8KEbJ1DA14CtobtaTzfDCg1LZTt8iwF2p89dad7iJSIqK4J7gNi4JzA_SWxvYVFUwAM1wolyYaoaIRt-gE&_hsmi=50020281"},{"key":"cit0003","first-page":"3","volume":"234","author":"Absalom R.","year":"2012","journal-title":"Ovum Consulting, IT006"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2016-0025"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSCE.2013.6719923"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1109\/CIACS.2015.7395567"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2018.8441967"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1145\/3134383.3134394"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.07.007"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.12.113"},{"issue":"3","key":"cit0013","first-page":"1279","volume":"10","author":"Bello Garba A.","year":"2015","journal-title":"ARPN Journal of Engineering and Applied Sciences"},{"key":"cit0014","unstructured":"CCMB- 2012-09-001. (2012).Common criteria for information technology."},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2017.1404132"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1109\/BioMedCom.2012.26"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50704"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.07.019"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2013.42011"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2013.42011"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCity.2015.221"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAFRICA.2016.7530586"},{"issue":"2","key":"cit0023","first-page":"189","volume":"4","author":"Garba A. B.","year":"2015","journal-title":"International Journal of Emerging Trends & Technology in Computer Science"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2015.1010985"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"cit0026","unstructured":"Gimenez, S., Ramamurthy, B. & Wang, Y. (2015).A survey on extending the organization\u2019s network using the Bring Your Own Device (BYOD) environment. Technical Report, University of Nebraska-Lincoln."},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2018.8479178"},{"key":"cit0028","unstructured":"Grundshutz. (2004).Grundshutz IT manual elementary threats."},{"key":"cit0029","unstructured":"Grundshutz, G. I.German IT Grundshutz Suplement overview excerpts"},{"volume-title":"Sp 800-12","year":"1995","author":"Guttman B.","key":"cit0030"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2016.7818717"},{"issue":"5","key":"cit0032","volume":"3","author":"Hernandez A.","year":"2014","journal-title":"International Journal of Computer and Information Technology"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI.2017.7975953"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.06.007"},{"key":"cit0035","unstructured":"ISACA. (2016).IS Audit\/Assurance program for BYOD. www.isaca.org"},{"key":"cit0036","unstructured":"ISACA. (2019a).ISACA cybersecurity fundamentals glossary. https:\/\/www.isaca.org\/Knowledge-Center\/Documents\/Glossary\/Cybersecurity_Fundamentals_glossary.pdf"},{"key":"cit0037","unstructured":"ISACA. (2019b).ISACA glossary. https:\/\/www.isaca.org\/Knowledge-Center\/Documents\/Glossary\/glossary.pdf"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2018.8479230"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2015.7132981"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.167"},{"volume-title":"Paper presented at the 2012 5th Romania Tier 2 Federation Grid, Cloud & High Performance Computing Science (RQLCG)","year":"2012","author":"Lennon R. G.","key":"cit0041"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2014.6911814"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pmed.1000100"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1201\/9780203490426"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.93"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70111-3"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1080\/15323269.2013.798768"},{"issue":"1","key":"cit0048","doi-asserted-by":"crossref","DOI":"10.4102\/sajim.v20i1.980","volume":"20","author":"Musarurwa A.","year":"2018","journal-title":"South African Journal of Information Management"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.006"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069314"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2015.2484858"},{"key":"cit0052","doi-asserted-by":"crossref","unstructured":"Oktavia, T., Yanti, H., Prabowo, H. & Meyliana, H. (2016).Security and privacy challenge in Bring Your Own Device environment: A systematic literature review. In (pp. 194\u2013199).","DOI":"10.1109\/ICIMTech.2016.7930328"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2018.00032"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.1109\/MOBISECSERV.2019.8686551"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(14)70007-7"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.54"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2014.7020886"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2012.79"},{"key":"cit0059","doi-asserted-by":"crossref","unstructured":"Scarfone, K. A., Souppaya, M. P. & Hoffman, P. (2011).Sp 800\u2013125. guide to security for full virtualization technologies.","DOI":"10.6028\/NIST.SP.800-125"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2828"},{"key":"cit0061","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.11.009"},{"issue":"1","key":"cit0062","author":"Souppaya M.","year":"2013","journal-title":"Gaithersburg, USA: National Institute of Standards and Technology"},{"key":"cit0063","unstructured":"Souppaya, M. & Scarfone, K. (2016a).NIST 800\u201346 rev 2 guide to enterprise telework, remote access, and Bring Your Own Device (BYOD) security. http:\/\/csrc.nist.gov\/publications\/drafts\/800-46r2\/sp800_46r2_draft.pdf"},{"key":"cit0064","unstructured":"Souppaya, M. & Scarfone, K. (2016b).NIST 800\u2013114 rev 1 user\u2019s guide to telework and Bring Your Own Device (BYOD) security. http:\/\/csrc.nist.gov\/publications\/drafts\/800-114r1\/sp800_114r1_draft.pdf"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2016.2569858"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(13)70091-6"},{"issue":"2","key":"cit0067","volume":"2012","author":"Thompson G.","year":"2012","journal-title":"Network Security"},{"key":"cit0068","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(13)70050-3"},{"key":"cit0069","unstructured":"United-Kingdom. (2012).Businesses failing to communicate bring your own device best practice to employees.MENA Report,http:\/\/www.ezproxy.dsu.edu:2048\/login?url=https:\/\/www.ezproxy.dsu.edu:2206\/docview\/1080987877?accountid=27073"},{"issue":"2","key":"cit0070","first-page":"55","volume":"10","author":"Utter C.","year":"2015","journal-title":"Journal of Digital Forensics, Security & Law, V"},{"key":"cit0071","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.023"},{"key":"cit0072","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.004"},{"key":"cit0073","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6866552"},{"key":"cit0074","first-page":"xiii","author":"Webster J.","year":"2002","journal-title":"MIS Quarterly"},{"volume-title":"Paper presented at the 2013 IEEE Conference on Communications and Network Security (CNS)","year":"2013","author":"Wei P.","key":"cit0075"},{"key":"cit0076","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.64"},{"key":"cit0077","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.011"},{"key":"cit0078","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326074"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2021.1923873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:07:31Z","timestamp":1725484051000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2021.1923873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,22]]},"references-count":78,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,5,4]]}},"alternative-id":["10.1080\/19393555.2021.1923873"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2021.1923873","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2021,7,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-07-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}