{"id":"https://openalex.org/W2750549214","doi":"https://doi.org/10.1108/ics-03-2016-0025","title":"A systematic approach to investigating how information security and privacy can be achieved in BYOD environments","display_name":"A systematic approach to investigating how information security and privacy can be achieved in BYOD environments","publication_year":2017,"publication_date":"2017-08-21","ids":{"openalex":"https://openalex.org/W2750549214","doi":"https://doi.org/10.1108/ics-03-2016-0025","mag":"2750549214"},"language":"en","primary_location":{"id":"doi:10.1108/ics-03-2016-0025","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-03-2016-0025","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053145701","display_name":"Abubakar Bello","orcid":"https://orcid.org/0000-0002-4778-2113"},"institutions":[{"id":"https://openalex.org/I176790772","display_name":"Murdoch University","ror":"https://ror.org/00r4sry34","country_code":"AU","type":"education","lineage":["https://openalex.org/I176790772"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Abubakar Garba Bello","raw_affiliation_strings":["Murdoch University, Murdoch, Australia"],"affiliations":[{"raw_affiliation_string":"Murdoch University, Murdoch, Australia","institution_ids":["https://openalex.org/I176790772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020096736","display_name":"David Murray","orcid":"https://orcid.org/0000-0001-6769-3583"},"institutions":[{"id":"https://openalex.org/I176790772","display_name":"Murdoch University","ror":"https://ror.org/00r4sry34","country_code":"AU","type":"education","lineage":["https://openalex.org/I176790772"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"David Murray","raw_affiliation_strings":["Murdoch University, Murdoch, Australia"],"affiliations":[{"raw_affiliation_string":"Murdoch University, Murdoch, Australia","institution_ids":["https://openalex.org/I176790772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091515197","display_name":"Jocelyn Armarego","orcid":null},"institutions":[{"id":"https://openalex.org/I176790772","display_name":"Murdoch University","ror":"https://ror.org/00r4sry34","country_code":"AU","type":"education","lineage":["https://openalex.org/I176790772"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jocelyn Armarego","raw_affiliation_strings":["Murdoch University, Murdoch, Australia"],"affiliations":[{"raw_affiliation_string":"Murdoch University, Murdoch, Australia","institution_ids":["https://openalex.org/I176790772"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053145701"],"corresponding_institution_ids":["https://openalex.org/I176790772"],"apc_list":null,"apc_paid":null,"fwci":8.218,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.97048949,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"25","issue":"4","first_page":"475","last_page":"492"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bring-your-own-device","display_name":"Bring your own device","score":0.8733190298080444},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.495931476354599},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.48674750328063965},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4669440984725952},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4469600021839142},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4272812008857727},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.42612943053245544},{"id":"https://openalex.org/keywords/best-practice","display_name":"Best practice","score":0.4148150384426117},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38169369101524353},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34151536226272583},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3359048366546631},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.09144967794418335}],"concepts":[{"id":"https://openalex.org/C2778282719","wikidata":"https://www.wikidata.org/wiki/Q917419","display_name":"Bring your own device","level":3,"score":0.8733190298080444},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.495931476354599},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48674750328063965},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4669440984725952},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4469600021839142},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4272812008857727},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.42612943053245544},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.4148150384426117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38169369101524353},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34151536226272583},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3359048366546631},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.09144967794418335},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1108/ics-03-2016-0025","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-03-2016-0025","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:researchrepository.murdoch.edu.au:38842","is_oa":false,"landing_page_url":"http://researchrepository.murdoch.edu.au/id/eprint/38842/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400274","display_name":"Murdoch Research Repository (Murdoch University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I176790772","host_organization_name":"Murdoch University","host_organization_lineage":["https://openalex.org/I176790772"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"  Bello, A.G., Murray, D. &lt;http://researchrepository.murdoch.edu.au/view/author/Murray, David.html&gt;, Armarego, J. &lt;http://researchrepository.murdoch.edu.au/view/author/Armarego, Jocelyn.html&gt; and Furnell, S.   (2017)  A systematic approach to investigating how information security and privacy can be achieved in BYOD environments.   Information and Computer Security .   In Press.  ","raw_type":"Journal Article"},{"id":"pmh:oai:pure.atira.dk:publications/9d2917fe-de41-4256-ab3b-7db08b27c5dd","is_oa":false,"landing_page_url":"https://research.edgehill.ac.uk/en/publications/9d2917fe-de41-4256-ab3b-7db08b27c5dd","pdf_url":null,"source":{"id":"https://openalex.org/S4306402462","display_name":"Edge Hill University Research Information Repository (Edge Hill University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I165525304","host_organization_name":"Edge Hill University","host_organization_lineage":["https://openalex.org/I165525304"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bello, A G, Murray, D & Armarego, J 2017, 'A systematic approach to investigating how information security and privacy can be achieved in BYOD environments', Information and Computer Security, vol. 25, no. 4, pp. 475-492. https://doi.org/10.1108/ICS-03-2016-0025","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W42179619","https://openalex.org/W72066489","https://openalex.org/W107509755","https://openalex.org/W119372056","https://openalex.org/W174456476","https://openalex.org/W1493449820","https://openalex.org/W1512370346","https://openalex.org/W1517229207","https://openalex.org/W1527311855","https://openalex.org/W1556808170","https://openalex.org/W1589399253","https://openalex.org/W1951008065","https://openalex.org/W1965516070","https://openalex.org/W1979973568","https://openalex.org/W1988506816","https://openalex.org/W2008225084","https://openalex.org/W2009067661","https://openalex.org/W2009398118","https://openalex.org/W2013946142","https://openalex.org/W2022520190","https://openalex.org/W2027320617","https://openalex.org/W2035982357","https://openalex.org/W2036389121","https://openalex.org/W2039107380","https://openalex.org/W2046071314","https://openalex.org/W2046490255","https://openalex.org/W2059311829","https://openalex.org/W2082758646","https://openalex.org/W2099367113","https://openalex.org/W2114206706","https://openalex.org/W2132443910","https://openalex.org/W2135492276","https://openalex.org/W2182377569","https://openalex.org/W2211447872","https://openalex.org/W2299713922","https://openalex.org/W2330204490","https://openalex.org/W2408477672","https://openalex.org/W2552061680","https://openalex.org/W2734327445","https://openalex.org/W2789825598","https://openalex.org/W3016485800"],"related_works":["https://openalex.org/W4383066556","https://openalex.org/W239562861","https://openalex.org/W2279664035","https://openalex.org/W2016462596","https://openalex.org/W2325135768","https://openalex.org/W3015517502","https://openalex.org/W4226389227","https://openalex.org/W68680640","https://openalex.org/W2185073329","https://openalex.org/W377587031"],"abstract_inverted_index":{"Purpose":[0],"This":[1,75,103,131,175,199],"paper\u2019s":[2],"purpose":[3],"is":[4,163],"to":[5,16,116,165,188,221,227],"provide":[6,46],"a":[7,107,210],"current":[8,211],"best":[9,212],"practice":[10,213],"approach":[11,115,214],"that":[12,32,181,215],"can":[13,45,95,216],"be":[14,53,96,217],"used":[15,106,218],"identify":[17],"and":[18,26,52,64,71,81,85,93,120,125,134,139,141,145,150,168,191,196,207,224,230],"manage":[19,228],"bring":[20],"your":[21],"own":[22],"device":[23],"(BYOD)":[24],"security":[25,63,92,229],"privacy":[27,65,94,231],"risks":[28,84,232],"faced":[29],"by":[30,219],"organisations":[31,171,187,220],"use":[33],"mobile":[34],"devices":[35],"as":[36],"part":[37],"of":[38,160,186],"their":[39],"business":[40],"strategy.":[41],"While":[42],"BYOD":[43,79,100,128,136,194,205,234],"deployment":[44],"work":[47],"flexibility,":[48],"boost":[49],"employees\u2019":[50],"productivity":[51],"cost":[54],"cutting":[55],"for":[56,147],"organisations,":[57],"there":[58],"are":[59],"also":[60,177,208],"many":[61],"information":[62,91,152],"issues,":[66],"with":[67],"some":[68],"widely":[69],"recognised,":[70],"others":[72],"less":[73],"understood.":[74],"paper":[76,105,132,162,176,200],"focuses":[77],"on":[78],"adoption,":[80],"its":[82],"associated":[83],"mitigation":[86],"strategies,":[87],"investigating":[88,204],"how":[89,226],"both":[90,118],"effectively":[97],"achieved":[98],"in":[99,127,154,173,233],"environments.":[101,129,235],"Design/methodology/approach":[102],"research":[104,109,203],"qualitative":[108],"methodology,":[110],"applying":[111],"the":[112,166,184],"case":[113],"study":[114],"understand":[117,225],"organisational":[119,149],"employee":[121],"views,":[122],"thoughts,":[123],"opinions":[124],"actions":[126],"Findings":[130],"identifies":[133],"understands":[135],"risks,":[137],"threats":[138],"influences,":[140],"determines":[142],"effective":[143],"controls":[144],"procedures":[146],"managing":[148],"personal":[151],"resources":[153],"BYOD.":[155],"Research":[156],"limitations/implications":[157],"The":[158],"scope":[159],"this":[161],"limited":[164],"inquiry":[167],"findings":[169],"from":[170],"operating":[172],"Australia.":[174],"suggests":[178],"key":[179],"implications":[180],"lie":[182],"within":[183],"ability":[185],"adequately":[189],"develop":[190],"deploy":[192],"successful":[193],"management":[195],"practices.":[197],"Originality/value":[198],"expands":[201],"previous":[202],"practices,":[206],"provides":[209],"systematically":[222],"investigate":[223]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
