{"id":"https://openalex.org/W2564422852","doi":"https://doi.org/10.1109/issa.2016.7802922","title":"A framework towards governing \u201cBring Your Own Device in SMMEs\u201d","display_name":"A framework towards governing \u201cBring Your Own Device in SMMEs\u201d","publication_year":2016,"publication_date":"2016-08-01","ids":{"openalex":"https://openalex.org/W2564422852","doi":"https://doi.org/10.1109/issa.2016.7802922","mag":"2564422852"},"language":"en","primary_location":{"id":"doi:10.1109/issa.2016.7802922","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2016.7802922","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084286513","display_name":"Noluvuyo Fani","orcid":null},"institutions":[{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Noluvuyo Fani","raw_affiliation_strings":["NMMU NMMU, Center for Research in Information and Cyber Security, Port Elizabeth, South Africa"],"affiliations":[{"raw_affiliation_string":"NMMU NMMU, Center for Research in Information and Cyber Security, Port Elizabeth, South Africa","institution_ids":["https://openalex.org/I99712911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020056259","display_name":"Rossouw von Solms","orcid":"https://orcid.org/0000-0002-9860-2346"},"institutions":[{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Rossouw von Solms","raw_affiliation_strings":["NMMU NMMU, Center for Research in Information and Cyber Security, Port Elizabeth, South Africa"],"affiliations":[{"raw_affiliation_string":"NMMU NMMU, Center for Research in Information and Cyber Security, Port Elizabeth, South Africa","institution_ids":["https://openalex.org/I99712911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004681136","display_name":"Mariana Gerber","orcid":null},"institutions":[{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Mariana Gerber","raw_affiliation_strings":["NMMU NMMU, Center for Research in Information and Cyber Security, Port Elizabeth, South Africa"],"affiliations":[{"raw_affiliation_string":"NMMU NMMU, Center for Research in Information and Cyber Security, Port Elizabeth, South Africa","institution_ids":["https://openalex.org/I99712911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084286513"],"corresponding_institution_ids":["https://openalex.org/I99712911"],"apc_list":null,"apc_paid":null,"fwci":4.4313,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.95173551,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9564999938011169,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9469000101089478,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bring-your-own-device","display_name":"Bring your own device","score":0.9531477093696594},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.7033055424690247},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.6806704998016357},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6009336709976196},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4957917630672455},{"id":"https://openalex.org/keywords/information-technology","display_name":"Information technology","score":0.483750581741333},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.45646536350250244},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4485991895198822},{"id":"https://openalex.org/keywords/phenomenon","display_name":"Phenomenon","score":0.43499985337257385},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.42591673135757446},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38971075415611267},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3260742425918579},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17191702127456665}],"concepts":[{"id":"https://openalex.org/C2778282719","wikidata":"https://www.wikidata.org/wiki/Q917419","display_name":"Bring your own device","level":3,"score":0.9531477093696594},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.7033055424690247},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.6806704998016357},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6009336709976196},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4957917630672455},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.483750581741333},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.45646536350250244},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4485991895198822},{"id":"https://openalex.org/C50335755","wikidata":"https://www.wikidata.org/wiki/Q483247","display_name":"Phenomenon","level":2,"score":0.43499985337257385},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.42591673135757446},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38971075415611267},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3260742425918579},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17191702127456665},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/issa.2016.7802922","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2016.7802922","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W161757532","https://openalex.org/W174456476","https://openalex.org/W588857028","https://openalex.org/W1511753515","https://openalex.org/W1521288521","https://openalex.org/W1580081957","https://openalex.org/W1907074128","https://openalex.org/W1965238479","https://openalex.org/W1973908698","https://openalex.org/W1982283195","https://openalex.org/W1982641627","https://openalex.org/W1984894608","https://openalex.org/W2008225084","https://openalex.org/W2013500271","https://openalex.org/W2035573810","https://openalex.org/W2039107380","https://openalex.org/W2099367113","https://openalex.org/W2145112629","https://openalex.org/W2159611455","https://openalex.org/W2299804167","https://openalex.org/W2403067178","https://openalex.org/W2994506763","https://openalex.org/W4285719527","https://openalex.org/W6606645257","https://openalex.org/W6607052058","https://openalex.org/W6634737577","https://openalex.org/W6639809046","https://openalex.org/W6674582328","https://openalex.org/W6713397611"],"related_works":["https://openalex.org/W2593687413","https://openalex.org/W2279664035","https://openalex.org/W3151031619","https://openalex.org/W1574627737","https://openalex.org/W4285331858","https://openalex.org/W4285816488","https://openalex.org/W3015517502","https://openalex.org/W2564422852","https://openalex.org/W1918459692","https://openalex.org/W2067091602"],"abstract_inverted_index":{"Information":[0],"is":[1,49,52,105,227],"a":[2,37,95,106,173,235],"critically":[3],"important":[4],"asset":[5],"that":[6,23,78,108,218],"has":[7,93],"been":[8],"used":[9],"for":[10,196,203],"decades":[11],"within":[12,229],"organizations.":[13],"Like":[14],"any":[15],"asset,":[16],"there":[17,74,142,170],"are":[18,75,143],"threats":[19],"to":[20,32,43,54,61,80,111,118,130,150],"the":[21,40,44,47,58,62,138,157,164,187,199,214,225,230],"information":[22,48,56,85],"impact":[24],"processes":[25],"such":[26],"as;":[27],"email":[28],"retrieval":[29],"and":[30,57,82,133,145,160,191,211],"access":[31],"organizational":[33,84,120],"system":[34],"services.":[35],"As":[36,67],"consequence":[38],"of":[39,46,91,124,140,166,224],"threats,":[41],"attention":[42],"security":[45],"important.":[50],"Technology":[51],"utilized":[53],"secure":[55,83],"cost":[59],"affiliated":[60],"technology":[63,68,92],"can":[64,178],"be":[65,172,209],"dire.":[66],"evolves":[69],"with":[70],"each":[71],"transitory":[72],"decade,":[73],"different":[76],"phenomenon's":[77],"attempt":[79],"process":[81,223],"whilst":[86],"reducing":[87],"costs.":[88],"The":[89,122,221],"evolution":[90],"developed":[94],"new":[96],"phenomenon":[97,107],"called":[98],"\u201cBring":[99],"Your":[100],"Own":[101],"Device\u201d":[102],"(BYOD).":[103],"BYOD":[104,125,141,180,189,201,216],"allows":[109],"employees":[110],"use":[112],"their":[113],"own":[114],"personal":[115],"mobile":[116],"device":[117],"complete":[119],"tasks.":[121],"adoption":[123,139],"expands":[126],"from":[127],"large":[128],"organizations":[129,177],"small,":[131],"medium":[132],"micro":[134],"enterprises":[135],"(SMMEs).":[136],"With":[137],"benefits":[144],"more":[146],"significantly":[147],"risks":[148],"associated":[149],"BYOD.":[151,167],"Therefore,":[152],"this":[153],"paper":[154],"will":[155,171,207],"discuss":[156],"SMME":[158,183,205],"context":[159,184,206],"its":[161],"challenges":[162],"towards":[163],"governance":[165],"In":[168],"addition,":[169],"discussion":[174],"on":[175],"how":[176],"govern":[179],"in":[181],"an":[182,193,204],"by":[185],"considering":[186],"existing":[188,215],"approaches":[190,217],"provide":[192],"approach":[194,202],"suitable":[195,200],"SMMEs.":[197],"Furthermore,":[198],"further":[208],"evaluated":[210],"compared":[212],"against":[213],"were":[219],"identified.":[220],"research":[222,232],"study":[226],"conducted":[228],"design-oriented":[231],"paradigm":[233],"utilizing":[234],"cyclic":[236],"approach.":[237]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
