{"id":"https://openalex.org/W2610548286","doi":"https://doi.org/10.1007/978-3-319-58469-0_21","title":"Capturing Policies for BYOD","display_name":"Capturing Policies for BYOD","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2610548286","doi":"https://doi.org/10.1007/978-3-319-58469-0_21","mag":"2610548286"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-58469-0_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-58469-0_21","pdf_url":null,"source":{"id":"https://openalex.org/S4210185096","display_name":"IFIP advances in information and communication technology","issn_l":"1868-422X","issn":["1868-422X","1868-4238"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://www.research.ed.ac.uk/portal/en/publications/capturing-policies-for-byod(5031579b-0c4b-47cc-a313-c12481e5a800).html","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015643745","display_name":"Joseph Hallett","orcid":"https://orcid.org/0000-0002-6146-9852"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Joseph Hallett","raw_affiliation_strings":["School of Informatics, University of Edinburgh, Edinburgh, Scotland"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Edinburgh, Edinburgh, Scotland","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013254098","display_name":"David Aspinall","orcid":"https://orcid.org/0000-0002-6073-9013"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"David Aspinall","raw_affiliation_strings":["School of Informatics, University of Edinburgh, Edinburgh, Scotland"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Edinburgh, Edinburgh, Scotland","institution_ids":["https://openalex.org/I98677209"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5015643745"],"corresponding_institution_ids":["https://openalex.org/I98677209"],"apc_list":null,"apc_paid":null,"fwci":0.334,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.46750232,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"310","last_page":"323"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/acknowledgement","display_name":"Acknowledgement","score":0.9003085494041443},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.8342074155807495},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.6990285515785217},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5809133052825928},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5767761468887329},{"id":"https://openalex.org/keywords/bring-your-own-device","display_name":"Bring your own device","score":0.5248651504516602},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3917772173881531},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.21876895427703857},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20888376235961914},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.14419427514076233},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06389385461807251},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.054034024477005005}],"concepts":[{"id":"https://openalex.org/C2777880217","wikidata":"https://www.wikidata.org/wiki/Q4674282","display_name":"Acknowledgement","level":2,"score":0.9003085494041443},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.8342074155807495},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.6990285515785217},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5809133052825928},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5767761468887329},{"id":"https://openalex.org/C2778282719","wikidata":"https://www.wikidata.org/wiki/Q917419","display_name":"Bring your own device","level":3,"score":0.5248651504516602},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3917772173881531},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.21876895427703857},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20888376235961914},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.14419427514076233},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06389385461807251},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.054034024477005005}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/978-3-319-58469-0_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-58469-0_21","pdf_url":null,"source":{"id":"https://openalex.org/S4210185096","display_name":"IFIP advances in information and communication technology","issn_l":"1868-422X","issn":["1868-422X","1868-4238"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},{"id":"pmh:oai:pure.ed.ac.uk:publications/5031579b-0c4b-47cc-a313-c12481e5a800","is_oa":true,"landing_page_url":null,"pdf_url":"https://www.research.ed.ac.uk/portal/en/publications/capturing-policies-for-byod(5031579b-0c4b-47cc-a313-c12481e5a800).html","source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:pure.ed.ac.uk:publications/5031579b-0c4b-47cc-a313-c12481e5a800","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/5031579b-0c4b-47cc-a313-c12481e5a800","pdf_url":"https://www.research.ed.ac.uk/portal/en/publications/capturing-policies-for-byod(5031579b-0c4b-47cc-a313-c12481e5a800).html","source":{"id":"https://openalex.org/S4306400321","display_name":"Edinburgh Research Explorer (University of Edinburgh)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98677209","host_organization_name":"University of Edinburgh","host_organization_lineage":["https://openalex.org/I98677209"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hallett, J & Aspinall, D 2017, Capturing Policies for BYOD. in S De Capitani di Vimercati & F Martinelli (eds), ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology, vol. 502, Cham, pp. 310-323, 32nd International Conference on ICT Systems Security and Privacy Protection, Rome, Italy, 29/05/17. https://doi.org/10.1007/978-3-319-58469-0_21","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:HAL:hal-01649006v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01649006","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.310-323, &#x27E8;10.1007/978-3-319-58469-0_21&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/d23c821d-d4d6-49e4-94a7-88a8b22526fe","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/d23c821d-d4d6-49e4-94a7-88a8b22526fe","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hallett, J & Aspinall, D 2017, Capturing Policies for BYOD. in IFIP Information Security Conference Privacy Conference.","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:pure.ed.ac.uk:publications/5031579b-0c4b-47cc-a313-c12481e5a800","is_oa":true,"landing_page_url":null,"pdf_url":"https://www.research.ed.ac.uk/portal/en/publications/capturing-policies-for-byod(5031579b-0c4b-47cc-a313-c12481e5a800).html","source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3829497515","display_name":null,"funder_award_id":"EP/J001058/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7355715574","display_name":null,"funder_award_id":"EP/K032666/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7966722919","display_name":"App Guarden: Resilient Application Stores","funder_award_id":"EP/K032666/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2610548286.pdf","grobid_xml":"https://content.openalex.org/works/W2610548286.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W135733646","https://openalex.org/W1495881195","https://openalex.org/W1522939654","https://openalex.org/W1963971515","https://openalex.org/W1965986943","https://openalex.org/W1972784453","https://openalex.org/W2022520190","https://openalex.org/W2025786340","https://openalex.org/W2041659077","https://openalex.org/W2043777221","https://openalex.org/W2046071314","https://openalex.org/W2055126077","https://openalex.org/W2060692877","https://openalex.org/W2104880669","https://openalex.org/W2126242334","https://openalex.org/W2141935522","https://openalex.org/W2167122335","https://openalex.org/W2170912560","https://openalex.org/W2424870015","https://openalex.org/W2465547342","https://openalex.org/W2504883367","https://openalex.org/W2618408182"],"related_works":["https://openalex.org/W1504381137","https://openalex.org/W4283656061","https://openalex.org/W2620413320","https://openalex.org/W3102611879","https://openalex.org/W4385757279","https://openalex.org/W2067129656","https://openalex.org/W1974563604","https://openalex.org/W2211012933","https://openalex.org/W1002241103","https://openalex.org/W2356873024"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
