{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:56:45Z","timestamp":1773932205630,"version":"3.50.1"},"reference-count":90,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995955","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"01-08","source":"Crossref","is-referenced-by-count":4,"title":["Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017\u20132022)"],"prefix":"10.1109","author":[{"given":"Odai Ali","family":"Ali Sharfadeen AL-Azazi","sequence":"first","affiliation":[{"name":"Faculty of Comput. Sci. Inf. Syst. University of Malaya,Kuala Lumpur,Malaysia"}]},{"given":"Azah","family":"Anir Norman","sequence":"additional","affiliation":[{"name":"Faculty of Comput. Sci. Inf. Syst. University of Malaya,Dept of Inf Syst,Kuala Lumpur,Malaysia"}]},{"given":"Norjihan","family":"Binti Abdul Ghani","sequence":"additional","affiliation":[{"name":"Faculty of Comput. Sci. Inf. Syst. University of Malaya,Dept of Inf Syst,Kuala Lumpur,Malaysia"}]}],"member":"263","reference":[{"issue":"2","key":"ref1","first-page":"144","article-title":"A Proposed Framework for Access Control in the Cloud and BYOD Environment","volume":"18","author":"Almarhabi","year":"2018","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur"},{"key":"ref2","article-title":"Bring Your Own Device","author":"Bitglass","year":"2020","journal-title":"Bitglass 2020 Personal Device Report. San Francisco, CA: Bitglass"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2015.7132981"},{"key":"ref4","article-title":"PALE: partially asynchronous agile leader election","author":"Sidik","year":"2018","journal-title":"arXiv preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2016-0025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijsu.2021.105906"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106531"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3462766.3462770"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/app11083383"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101998"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10272-018-0711-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-8545-0.ch030"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54978-1_27"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.106184"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2022.018468"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102309"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/AFRICON46755.2019.9133764"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-09-2019-0458"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394083"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.28945\/3722"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i2.29.14008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.01.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.007"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1373012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102744"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.01.103"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2018.8479178"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-12-2012-0147"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101594"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102212"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/s40359-017-0182-3"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2022.102520"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2022.2028530"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12173"},{"key":"ref38","author":"Williams","year":"2019","journal-title":"An Empirical Investigation into the Relationship between Motivational Factors and Threats Consciousness among some Malaysian Postgraduate Students"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2017.1368421"},{"issue":"17","key":"ref40","article-title":"Dimensions of protection behaviors: a systematic literature review","volume":"98","author":"AL-Harthy","year":"2020","journal-title":"Journal of theoretical and applied information technology"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/sym12091544"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2021.105595"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1683781"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2018.05.011"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/15117"},{"issue":"1","key":"ref46","volume-title":"The analysis of the relations among normative beliefs, self-efficacy and intention to comply within the frame of information security policies","volume":"22","author":"Kaymaz","year":"2020"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2021.104282"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-09-2019-0452"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.024"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1653992"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.4102\/sajhrm.v17i0.1058"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102568"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.103212"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.106184"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.08.001"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.12785\/ijcds\/080407"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2019.1643956"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2020.1791966"},{"key":"ref60","author":"Al-Omari","year":"2012","journal-title":"Information security policy compliance: The role of information security awareness"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.006"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1258679"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.pec.2020.11.011"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10113-z"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ProComm.2019.00014"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-11-2016-0084"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.003"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.06.007"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-11-2016-0089"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102309"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12202"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-09-2016-0073"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-08-2012-0045"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.07.002"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2016-0054"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-019-09956-4"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-09-2017-0066"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2018.1543001"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04735"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.17762\/ijcnis.v13i2.4951"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1504\/IJEB.2018.094862"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23547-5_1"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.2196\/17604"},{"key":"ref85","author":"Arregui","year":"2016","journal-title":"Mitigating BYOD information security risks"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1177\/0266382118760143"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23851"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.52731\/ijskm.v6.i1.678"},{"issue":"1","key":"ref89","first-page":"1","article-title":"Development of Bring-Your-Own-Device Risk Management Model: A Case Study From a South African Organisation","volume":"22","author":"Veljkovic","year":"2019","journal-title":"Electronic Journal of Information Systems Evaluation"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.4102\/jef.v11i1.169"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2022,10,6]]},"end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995955.pdf?arnumber=9995955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T11:22:32Z","timestamp":1709378552000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995955\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":90,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995955","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}