{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:21:36Z","timestamp":1730276496982,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/issa.2016.7802922","type":"proceedings-article","created":{"date-parts":[[2017,1,2]],"date-time":"2017-01-02T21:21:42Z","timestamp":1483392102000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["A framework towards governing \u201cBring Your Own Device in SMMEs\u201d"],"prefix":"10.1109","author":[{"given":"Noluvuyo","family":"Fani","sequence":"first","affiliation":[]},{"given":"Rossouw","family":"von Solms","sequence":"additional","affiliation":[]},{"given":"Mariana","family":"Gerber","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"63","article-title":"Focus Group: Reviews and Practices","volume":"2","author":"masadeh","year":"2012","journal-title":"Int J Appl Sci Technol"},{"article-title":"IT Security in SMEs: Necessary or Irrelevant?","year":"2014","author":"vanommen","key":"ref10"},{"journal-title":"National Small Business Amendment Act","year":"2004","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1108\/02635571211204263"},{"key":"ref13","article-title":"Bring-Your-Own-Device (BYOD) practices in SMEs in Developing Countries-The Case of Tanzania","author":"kabanda","year":"2014","journal-title":"The 25th Australasian Conference on Information Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.64"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.01.005"},{"key":"ref16","first-page":"1","article-title":"Acceptance of BYOD among Employees at Small to Medium-sized Organizations","author":"hensema","year":"2013","journal-title":"Proc 19th Twente Student Conference on IT"},{"key":"ref17","article-title":"The Need for BYOD Mobile Device Security Awareness and Training","author":"harris","year":"0","journal-title":"Proceedings of the Nineteenth Americas Conference on Information Systems 2013"},{"key":"ref18","first-page":"0","article-title":"Factors Influencing Future Employees Decision-Making to Participate in a BYOD Program: Does Risk Matter?","author":"weeger","year":"2014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(11)70112-9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.55"},{"key":"ref4","first-page":"82","article-title":"The Commercialization of Intangible Assets in the Information Society","volume":"27","author":"fakhrutdinova","year":"2013","journal-title":"World Appl Sci J"},{"article-title":"Management issues for Bring Your Own Device","year":"2015","author":"brodin","key":"ref27"},{"key":"ref3","article-title":"Information availability: Components, Threats and Protection mechanisms","volume":"2","author":"qadir mir","year":"2011","journal-title":"Journal of Global Research in Computer Science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2014.6950497"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10734-010-9387-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.011"},{"volume":"1","journal-title":"The Role of IS Assurance & Security Management","year":"2013","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2015.1010985"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/14691930010371636"},{"key":"ref9","first-page":"1","article-title":"Emergent BYOD Security Challenges and Mitigation Strategy Research Methodology","author":"dedeche","year":"2013"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2014.08.003"},{"key":"ref20","first-page":"189","article-title":"BYOD: Current State and Security Challenges","author":"meisam","year":"2014","journal-title":"IEEE Symp Comput Appl Ind Electron"},{"key":"ref22","first-page":"113","article-title":"AN ENHANCED FEAR APPEAL RHETORICAL FRAMEWORK: LEVERAGING THREATS TO THE HUMAN A SSET THROUGH SANCTIONING RHETORIC","volume":"39","author":"johnston","year":"2015"},{"article-title":"Managing Employee-Owned Technology in the Enterprise","year":"2011","author":"dulaney","key":"ref21"},{"article-title":"Combining ISMS with strategic management: the case of BYOD COMBINING ISMS WITH STRATEGIC MANAGEMENT: THE CASE OF BYOD","year":"2015","author":"brodin","key":"ref24"},{"key":"ref23","article-title":"Current Status, Issues, and Future of Bring Your Own Device (BYOD)","volume":"35","author":"french","year":"2014","journal-title":"Commun Assoc Inf Syst"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6866552"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2015.7231407"}],"event":{"name":"2016 Information Security for South Africa (ISSA)","start":{"date-parts":[[2016,8,17]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2016,8,18]]}},"container-title":["2016 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786562\/7802913\/07802922.pdf?arnumber=7802922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T11:46:29Z","timestamp":1484912789000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7802922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/issa.2016.7802922","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}