{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T23:10:47Z","timestamp":1769641847615,"version":"3.49.0"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Consumer Electron. Mag."],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/mce.2015.2484858","type":"journal-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T19:04:54Z","timestamp":1449860694000},"page":"114-119","source":"Crossref","is-referenced-by-count":12,"title":["Bring Your Own Device: An overview of risk assessment"],"prefix":"10.1109","volume":"5","author":[{"given":"Robert","family":"Ogie","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484316"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/itnow\/bws142"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2013.2279640"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"14","DOI":"10.22215\/timreview\/771","article-title":"IT consumerization: A case study of BYOD in a healthcare setting","volume":"4","author":"marshall","year":"2014","journal-title":"Technology Innovation Management Review"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6866552"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-03-2013-0019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.164"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/UKSim.2014.29"},{"key":"ref15","first-page":"1","article-title":"B.Y.O.D. genie is out of the bottle&#x2014;&#x2018;Devil Or Angel&#x2019;","volume":"1","author":"singh","year":"2012","journal-title":"Journal of Business Management and Social Science Research"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(13)70050-3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(14)70090-X"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2014.98"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70111-3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627410"},{"key":"ref4","first-page":"191","article-title":"Current status, issues, and future of bring your own device","volume":"35","author":"french","year":"2014","journal-title":"Commun Assoc Inform Syst"},{"key":"ref27","first-page":"154","article-title":"An approach to implement bring your own device (BYOD) securely","volume":"2","author":"gupta","year":"2013","journal-title":"International Journal of Engineering Research & Innovation"},{"key":"ref3","first-page":"62","article-title":"Bring your own device (byod): Security risks and mitigating strategies","volume":"4","author":"gajar","year":"2013","journal-title":"J Global Res Comput Sci"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.19030\/rbis.v17i2.7846"},{"key":"ref29","first-page":"1852","article-title":"Bring your own device","author":"armando","year":"0","journal-title":"Proc 28th ACM Symp Applied Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.93"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2013.6947734"},{"key":"ref7","article-title":"Security management of bring-your-owndevices","author":"gallotto","year":"0","journal-title":"Proc Int'l Conf Security and Management (SAM)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2012.79"},{"key":"ref9","first-page":"612","article-title":"A study on abnormal behavior detection in BYOD environment","volume":"7","author":"kang","year":"2013","journal-title":"Int J Env Ecol Geol Geophys Eng"},{"key":"ref1","article-title":"A study on security threats and dynamic access control technology for BYOD, Smart-work environment","volume":"ii","author":"koh","year":"0","journal-title":"Proc Int MultiConf"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MITP.2012.72","article-title":"Addressing security and privacy risks in mobile","author":"jain","year":"2012","journal-title":"IT Pro"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.4.20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2617848.2617850"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2014.6950497"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50704"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2014.7010235"},{"key":"ref25","first-page":"117","article-title":"BYOD (Bring Your Own Device)","volume":"10","author":"caldwell","year":"2012","journal-title":"Competition Forum"}],"container-title":["IEEE Consumer Electronics Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962380\/7353250\/07353260.pdf?arnumber=7353260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:57:08Z","timestamp":1642003028000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7353260\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":32,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/mce.2015.2484858","relation":{},"ISSN":["2162-2248","2162-2256"],"issn-type":[{"value":"2162-2248","type":"print"},{"value":"2162-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1]]}}}