{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:46Z","timestamp":1750221106462,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,29]]},"DOI":"10.1145\/3290688.3290729","type":"proceedings-article","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T13:15:25Z","timestamp":1547471725000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["BYOD in Hospitals-Security Issues and Mitigation Strategies"],"prefix":"10.1145","author":[{"given":"Tafheem Ahmad","family":"Wani","sequence":"first","affiliation":[{"name":"School of Computing and Information Systems, The University of Melbourne, Victoria, Australia"}]},{"given":"Antonette","family":"Mendoza","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, The University of Melbourne, Victoria, Australia"}]},{"given":"Kathleen","family":"Gray","sequence":"additional","affiliation":[{"name":"Health and Biomedical Informatics Centre, The University of Melbourne, Victoria, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","article-title":"Byod Issues and Strategies in Organizations","volume":"14","author":"Astani M.","year":"2013","unstructured":"M. Astani , K. Ready , and M. Tessema . 2013 . Byod Issues and Strategies in Organizations . Issues in Information Systems. 14 , 2 (Dec. 2013), 195. M. Astani, K. Ready, and M. Tessema. 2013. Byod Issues and Strategies in Organizations. Issues in Information Systems. 14, 2 (Dec. 2013), 195.","journal-title":"Issues in Information Systems."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. BYOD & Enterprise Mobility Market by Software & Security - 2021. Markets and Markets.  2017. BYOD & Enterprise Mobility Market by Software & Security - 2021. Markets and Markets."},{"key":"e_1_3_2_1_3_1","volume-title":"et al","author":"Kameda-Smith M.M.","year":"2018","unstructured":"M.M. Kameda-Smith . et al . 2018 . Smartphone Usage Patterns by Canadian Neurosurgery Residents: A National Cross-Sectional Survey. World Neurosurgery . 111, (Mar. 2018), e465-e470. M.M. Kameda-Smith. et al. 2018. Smartphone Usage Patterns by Canadian Neurosurgery Residents: A National Cross-Sectional Survey. World Neurosurgery. 111, (Mar. 2018), e465-e470."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2345\/0899-8205-48.5.327"},{"key":"e_1_3_2_1_6_1","unstructured":"2017. SPOK'S FIFTH ANNUAL MOBILITY STRATEGIES IN HEALTHCARE SURVEY: RESULTS REVEALED. SPOK.  2017. SPOK'S FIFTH ANNUAL MOBILITY STRATEGIES IN HEALTHCARE SURVEY: RESULTS REVEALED. SPOK."},{"key":"e_1_3_2_1_7_1","unstructured":"2016. Black Book Market Research.  2016. Black Book Market Research."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/43315.10.5.20011101\/31719.6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2016.7522357"},{"volume-title":"as reports skyrocket under mandatory notification scheme","year":"2018","key":"e_1_3_2_1_10_1","unstructured":"Healthcare suffers almost a quarter of data breaches , as reports skyrocket under mandatory notification scheme : 2018 . https:\/\/www.healthcareit.com.au\/article\/healthcare-suffers-almost-quarter-data-breaches-reports-skyrocket-under-mandatory. Healthcare suffers almost a quarter of data breaches, as reports skyrocket under mandatory notification scheme: 2018. https:\/\/www.healthcareit.com.au\/article\/healthcare-suffers-almost-quarter-data-breaches-reports-skyrocket-under-mandatory."},{"key":"e_1_3_2_1_11_1","unstructured":"2016. Mobile Security Trends in Healthcare. Skycure.  2016. Mobile Security Trends in Healthcare. Skycure."},{"key":"e_1_3_2_1_12_1","unstructured":"The 4 biggest healthcare IT headaches: 2017. https:\/\/www.cio.com\/article\/3197698\/healthcare\/the-4-biggest-healthcare-it-headaches.html.  The 4 biggest healthcare IT headaches: 2017. https:\/\/www.cio.com\/article\/3197698\/healthcare\/the-4-biggest-healthcare-it-headaches.html."},{"key":"e_1_3_2_1_13_1","unstructured":"K. Sansurooh and P. Williams. 2014. BYOD in ehealth: Herding cats and stable doors or a catastrophe waiting to happen? Australian eHealth Informatics and Security Conference. (Dec. 2014).  K. Sansurooh and P. Williams. 2014. BYOD in ehealth: Herding cats and stable doors or a catastrophe waiting to happen? Australian eHealth Informatics and Security Conference. (Dec. 2014)."},{"key":"e_1_3_2_1_14_1","unstructured":"D. Arregui S.M. Maynard and A.Ahmad. 2015. Mitigating BYOD information security risks.  D. Arregui S.M. Maynard and A.Ahmad. 2015. Mitigating BYOD information security risks."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.011"},{"key":"e_1_3_2_1_16_1","volume-title":"e. Moyer","author":"J.","year":"2013","unstructured":"J. e. Moyer . 2013 . Managing Mobile Devices in Hospitals : A Literature Review of BYOD Policies and Usage. JOURNAL OF HOSPITAL LIBRARIAN SHIP. J. e. Moyer. 2013. Managing Mobile Devices in Hospitals: A Literature Review of BYOD Policies and Usage. JOURNAL OF HOSPITAL LIBRARIAN SHIP."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"G. Martin P. Janardhanan T. Withers and S. Gupta. 2016. Mobile revolution: a requiem for bleeps? Postgraduate Medical Journal; London. 92 1091 (Sep. 2016)  G. Martin P. Janardhanan T. Withers and S. Gupta. 2016. Mobile revolution: a requiem for bleeps? Postgraduate Medical Journal; London. 92 1091 (Sep. 2016)","DOI":"10.1136\/postgradmedj-2015-133722"},{"key":"e_1_3_2_1_18_1","first-page":"2","article-title":"A Mobile App Development Guideline for Hospital Settings: Maximizing the Use of and Minimizing the Security Risks of \"Bring Your Own Devices","volume":"4","author":"Al Ayubi S.U.","year":"2016","unstructured":"S.U. Al Ayubi , A. Pelletier , G. Sunthara , N. Gujral , V. Mittal and F.C. Bourgeois . 2016 . A Mobile App Development Guideline for Hospital Settings: Maximizing the Use of and Minimizing the Security Risks of \"Bring Your Own Devices \" Policies. JMIR mHealth and uHealth. 4 , 2 (May 2016). S.U. Al Ayubi, A. Pelletier, G. Sunthara, N. Gujral, V. Mittal and F.C. Bourgeois. 2016. A Mobile App Development Guideline for Hospital Settings: Maximizing the Use of and Minimizing the Security Risks of \"Bring Your Own Devices\" Policies. JMIR mHealth and uHealth. 4, 2 (May 2016).","journal-title":"Policies. JMIR mHealth and uHealth."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2015.13"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.23919\/ISTAFRICA.2017.8102384"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"M.H. Mobasheri D. King M. Johnston S. Gautama S. Purkayastha and A. Darzi . 2015. The ownership and clinical use of smartphones by doctors and nurses in the UK: a multicentre survey study. BMJ Innovations. (Oct. 2015)  M.H. Mobasheri D. King M. Johnston S. Gautama S. Purkayastha and A. Darzi . 2015. The ownership and clinical use of smartphones by doctors and nurses in the UK: a multicentre survey study. BMJ Innovations. (Oct. 2015)","DOI":"10.1136\/bmjinnov-2015-000062"},{"key":"e_1_3_2_1_22_1","volume-title":"Winter (Jan.","author":"Hewitt B.","year":"2017","unstructured":"B. Hewitt , D. Dolezel and A. McLeod . 2017. Mobile Device Security: Perspectives of Future Healthcare Workers. Perspectives in Health Information Management. 14 , Winter (Jan. 2017 ). B. Hewitt, D. Dolezel and A. McLeod. 2017. Mobile Device Security: Perspectives of Future Healthcare Workers. Perspectives in Health Information Management. 14, Winter (Jan. 2017)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2016.20"},{"key":"e_1_3_2_1_24_1","volume-title":"An Audit Guideline for Vulnerability Analysis. 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC) (Jun.","author":"Hasan R.","year":"2016","unstructured":"R. Hasan , S. Zawoad , S. Noor , M.M. Haque and D. Burke . 2016. How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis. 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC) (Jun. 2016 ), 417--422. R. Hasan, S. Zawoad, S. Noor, M.M. Haque and D. Burke. 2016. How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis. 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC) (Jun. 2016), 417--422."},{"key":"e_1_3_2_1_25_1","volume-title":"An IT CEO talks about the BYOD trend. Biomedical Instrumentation & Technology. (Mar","author":"Johnson K.","year":"2014","unstructured":"K. Johnson . 2014. An IT CEO talks about the BYOD trend. Biomedical Instrumentation & Technology. (Mar . 2014 ), 54--56. K. Johnson. 2014. An IT CEO talks about the BYOD trend. Biomedical Instrumentation & Technology. (Mar. 2014), 54--56."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2015.01.010"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"A. Nermmathan A. Harrison M. Phelps K.M. Scott and S. Alexander. 2017. Doctors' use of mobile devices in the clinical setting: a mixed methods study. INTERNAL MEDICINE JOURNAL.  A. Nermmathan A. Harrison M. Phelps K.M. Scott and S. Alexander. 2017. Doctors' use of mobile devices in the clinical setting: a mixed methods study. INTERNAL MEDICINE JOURNAL.","DOI":"10.1111\/imj.13349"},{"key":"e_1_3_2_1_28_1","first-page":"2","article-title":"Personal Mobile Device Use in Healthcare: Address effective BYOD strategies","volume":"36","author":"Moret J.","year":"2017","unstructured":"J. Moret . 2017 . Personal Mobile Device Use in Healthcare: Address effective BYOD strategies . New Perspectives on Healthcare Risk Management, Control & Governance. 36 , 2 (Summer 2017), 11. J. Moret. 2017. Personal Mobile Device Use in Healthcare: Address effective BYOD strategies. New Perspectives on Healthcare Risk Management, Control & Governance. 36, 2 (Summer 2017), 11.","journal-title":"New Perspectives on Healthcare Risk Management, Control & Governance."},{"key":"e_1_3_2_1_29_1","volume-title":"IT Consumenzation: A Case Study of BYOD in a Healthcare Setting. Technology Innovation Management Review. (Mar","author":"Marshall S.","year":"2014","unstructured":"S. Marshall . 2014. IT Consumenzation: A Case Study of BYOD in a Healthcare Setting. Technology Innovation Management Review. (Mar . 2014 ), 14. S. Marshall. 2014. IT Consumenzation: A Case Study of BYOD in a Healthcare Setting. Technology Innovation Management Review. (Mar. 2014), 14."},{"key":"e_1_3_2_1_30_1","first-page":"2","article-title":"Mobile device management software: the answer to BYOD","volume":"21","author":"Goedert J.","year":"2013","unstructured":"J. Goedert . 2013 . Mobile device management software: the answer to BYOD ? Health Data Management. 21 , 2 (Feb. 2013), 32, 34, 36 passim. J. Goedert. 2013. Mobile device management software: the answer to BYOD? Health Data Management. 21, 2 (Feb. 2013), 32, 34, 36 passim.","journal-title":"Health Data Management."},{"key":"e_1_3_2_1_31_1","first-page":"4","article-title":"Bring your own device or bring your own disruption? How to handle the mulitude of challenges","volume":"36","author":"Hughes J.","year":"2015","unstructured":"J. Hughes . 2015 . Bring your own device or bring your own disruption? How to handle the mulitude of challenges . Health Management Technology. 36 , 4 (Apr. 2015) J. Hughes. 2015. Bring your own device or bring your own disruption? How to handle the mulitude of challenges. Health Management Technology. 36, 4 (Apr. 2015)","journal-title":"Health Management Technology."},{"key":"e_1_3_2_1_32_1","first-page":"2","article-title":"Challenges and benefits in a mobile medical world: Institutions should create a set of BYOD guidelines that foster mobile device usage","volume":"34","author":"Meneghetti A.","year":"2013","unstructured":"A. Meneghetti . 2013 . Challenges and benefits in a mobile medical world: Institutions should create a set of BYOD guidelines that foster mobile device usage . Health Management Technology. 34 , 2 (Feb. 2013), 6--7. A. Meneghetti. 2013. Challenges and benefits in a mobile medical world: Institutions should create a set of BYOD guidelines that foster mobile device usage. Health Management Technology. 34, 2 (Feb. 2013), 6--7.","journal-title":"Health Management Technology."},{"key":"e_1_3_2_1_33_1","first-page":"6","article-title":"Technological Transformation -- Implications for Compliance from Big Data to BYOD","volume":"15","author":"Munroe F.","year":"2013","unstructured":"F. Munroe . 2013 . Technological Transformation -- Implications for Compliance from Big Data to BYOD . Journal of Health Care Compliance. 15 , 6 (Dec. 2013). F. Munroe. 2013. Technological Transformation -- Implications for Compliance from Big Data to BYOD. Journal of Health Care Compliance. 15, 6 (Dec. 2013).","journal-title":"Journal of Health Care Compliance."}],"event":{"name":"ACSW 2019: Australasian Computer Science Week 2019","sponsor":["CORE - Computing Research and Education","Macquarie University-Sydney"],"location":"Sydney NSW Australia","acronym":"ACSW 2019"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290729","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290688.3290729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:52Z","timestamp":1750208512000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":32,"alternative-id":["10.1145\/3290688.3290729","10.1145\/3290688"],"URL":"https:\/\/doi.org\/10.1145\/3290688.3290729","relation":{},"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"2019-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}