{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:36:42Z","timestamp":1759091802442,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/issa.2016.7802925","type":"proceedings-article","created":{"date-parts":[[2017,1,2]],"date-time":"2017-01-02T16:21:42Z","timestamp":1483374102000},"page":"27-34","source":"Crossref","is-referenced-by-count":12,"title":["Mobile device usage in higher education institutions in South Africa"],"prefix":"10.1109","author":[{"given":"Ryan","family":"De Kock","sequence":"first","affiliation":[]},{"given":"Lynn A.","family":"Futcher","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"233","article-title":"Bring Your Own Device (BYOD) in Higher Education: Opportunities and Challenges","author":"afreen","year":"2014","journal-title":"International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)"},{"journal-title":"Higher Education Open and Secure?","year":"2014","author":"marchany","key":"ref11"},{"journal-title":"Iowa State IT staff discover unauthorized access to servers","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5465\/AMJ.2007.24160888"},{"journal-title":"Higher Education Act 101 of 2003","article-title":"Republic of South Africa","year":"2003","key":"ref14"},{"key":"ref15","first-page":"1","article-title":"Emergent BYOD Security Challenges and Mitigation Strategy","author":"dedeche","year":"2013","journal-title":"The University of Melbourne"},{"key":"ref16","first-page":"353","article-title":"Security requirements of a mobile device management system","volume":"6","author":"jeon","year":"2012","journal-title":"International Journal of Security and its Applications"},{"journal-title":"BYOD Why Mobile Device Management Isn't Enough","year":"0","author":"davis","key":"ref17"},{"key":"ref18","first-page":"1","article-title":"BYOD in the Enterprise-A Holistic Approach","author":"baranwal","year":"2013","journal-title":"ISACA Journal"},{"key":"ref19","first-page":"60","article-title":"The policy of BYOD: Considerations for higher education","author":"difilipo","year":"2013","journal-title":"EDUCAUSE Review"},{"journal-title":"Case Study Research Design and Methods 5th Edition","year":"2013","author":"yin","key":"ref4"},{"article-title":"A Study on Security Threats and Dynamic Access Control Technology for BYOD, Smart-work Environment","year":"0","author":"koh","key":"ref27"},{"key":"ref3","first-page":"72","article-title":"BYOD-an educational revolution?","author":"probert","year":"2012","journal-title":"Educational Technology"},{"journal-title":"The impact of BYOD in education","year":"0","key":"ref6"},{"key":"ref5","first-page":"165","author":"sliep","year":"2013","journal-title":"Bring Your Own Device and Information Technology Service Delivery A Higher Education Intitution Case Study"},{"key":"ref8","article-title":"What's Next for the LMS?","author":"brown","year":"2015","journal-title":"EDUCAUSE Review"},{"key":"ref7","article-title":"ECAR Study of Undergraduate Students and Information Technology, 2014","author":"bichsel","year":"2014","journal-title":"Educause Louisville"},{"journal-title":"BYOD Get Ahead of the Risk","year":"0","author":"roman","key":"ref2"},{"key":"ref9","article-title":"Bring your own device (BKOD) in schools","author":"stavert","year":"2013","journal-title":"NSW Department of Education and Communities"},{"journal-title":"Gartner Predicts by 2017 Half of Employers Will Require Employees to Supply Their Own Device for Work Purposes","year":"0","author":"inc","key":"ref1"},{"journal-title":"BYOD Planning and Implementation Framework","year":"0","key":"ref20"},{"key":"ref22","first-page":"35","article-title":"Five Components to Consider for BYOT\/BYOD","author":"ackerman","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1409908.1409933"},{"key":"ref24","first-page":"44","article-title":"Tech-savvy teaching BYOD Technology Matters","volume":"21","author":"hockly","year":"2012","journal-title":"Modern English Teacher"},{"key":"ref23","first-page":"97","article-title":"Mobile devices and corporate data security","author":"bernik","year":"2012","journal-title":"International Journal of Education and Information Technologies"},{"key":"ref26","first-page":"1","author":"dixon","year":"2012","journal-title":"Bring Your Own Device To School"},{"key":"ref25","first-page":"1","article-title":"Factors for Consideration when Developing a Bring Your Own Device (BYOD) Strategy in Higher Education","author":"emery","year":"2012","journal-title":"University of Oregon"}],"event":{"name":"2016 Information Security for South Africa (ISSA)","start":{"date-parts":[[2016,8,17]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2016,8,18]]}},"container-title":["2016 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786562\/7802913\/07802925.pdf?arnumber=7802925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T19:29:30Z","timestamp":1484076570000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7802925\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/issa.2016.7802925","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}