Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Bring your own disclosure : analysing BYOD threats to corporate information

Tools
- Tools
+ Tools

Flores Armas, Denys, Qazi, Farrukh and Jhumka, Arshad (2016) Bring your own disclosure : analysing BYOD threats to corporate information. In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23-26 Aug 2016. Published in: 2016 IEEE Trustcom/BigDataSE/I​SPA pp. 1008-1015. ISBN 9781509032051. ISSN 2324-9013. doi:10.1109/TrustCom.2016.0169

[img]
Preview
PDF
WRAP-Bring-disclosure-corporate-Flores-2017.pdf - Accepted Version - Requires a PDF viewer.

Download (518Kb) | Preview
Official URL: http://dx.doi.org/10.1109/TrustCom.2016.0169

Request Changes to record.

Abstract

Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisational context, allowing employees to work using their personal devices. However, as personal mobile devices are perceived as less secure than those provided by the organisation, BYOD has risen security concerns about corporate information being accessed by mobile devices from inside and outside the corporate perimeter. Moreover, this uncontrolled mobile device activity makes it difficult to differentiate external (outsider) malicious activity from reckless/naive employee (insider) behaviour, preventing effective correlation of unauthorised actions with the perpetrators. In this paper, a STRIDE-based BYOD Threat Model is proposed to analyse BYOD Threat Interactions from inside and outside the corporate perimeter. Our research contributes to a better understanding and awareness about the influence of BYOD Threats on disclosure and contamination of corporate information, encouraging future work in the field of BYOD security and digital forensics in order to protect information and manage an increasing number of evidence sources.

Item Type: Conference Item (Paper)
Subjects: H Social Sciences > HD Industries. Land use. Labor
Divisions: Faculty of Science > Computer Science
Library of Congress Subject Headings (LCSH): Confidential business information, Smartphones, Employees -- Security measures
Journal or Publication Title: 2016 IEEE Trustcom/BigDataSE/I​SPA
Publisher: IEEE
ISBN: 9781509032051
ISSN: 2324-9013
Book Title: 2016 IEEE Trustcom/BigDataSE/ISPA
Official Date: 9 February 2016
Dates:
DateEvent
9 February 2016Published
5 June 2016Accepted
Date of first compliant deposit: 5 May 2017
Page Range: pp. 1008-1015
DOI: 10.1109/TrustCom.2016.0169
Status: Peer Reviewed
Publication Status: Published
Funder: Ecuador Secretaría Nacional de Educación Superior, Ciencia, Tecnología e Innovación [Ecuadorian secretariat of higher education, science, technology and innovation] (SENESCYT)
Conference Paper Type: Paper
Title of Event: 2016 IEEE Trustcom/BigDataSE/ISPA
Type of Event: Conference
Location of Event: Tianjin, China
Date(s) of Event: 23-26 Aug 2016

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us