1 |
PbD, BYOD: (Bring Your Own Device) Is Your Organization Ready?, 2013.
|
2 |
N. Moon, S. Yong, J. Oh, and T. Cho, “A Study on Privacy for the Services in Digital Convergence,” Journal of Korea Multimedia Society, Vol. 10, No. 4, pp. 24-32, 2006.
|
3 |
NIA, Personal Information Protection Level Guide, 2013.
|
4 |
7 Foundational Principles, http://www.privacybydesign.ca (accessed Jan., 30, 2015.)
|
5 |
J. Shim, D. Mittleman, R. Welke, A. French, and J. Guo, “Bring Your Own Device (BYOD): Current Status, Issues, and Future Directions,” Proceeding of the Nineteenth Americas Conference on Information Systems, pp. 1-20, 2013.
|
6 |
N. Fernando, S. Loke, and W. Rahayu, "Mobile Cloud Computing: A Survey," Future Generation Computer Systems, Vol. 29, No. 1, pp. 84-106, 2013.
DOI
ScienceOn
|
7 |
H. Dinh, C. Lee, D. Niyato, and P. Wang, "A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches," Wireless Communications and Mobile Computing, Vol. 13, No. 18, pp. 1587-1611, 2013.
DOI
|
8 |
R. Ballagas, M. Rohs, J. Sheridan, and J. Borchers, “Byod: Bring Your Own Device,” Proceeding of the Workshop on Ubiquitous Display Environments at International Conference on Ubiquitous Computing, pp. 6-13, 2004.
|
9 |
A. Scarfo, “New Security Perspectives around BYOD,” Proceeding of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 446-451, 2012.
|
10 |
S. Park and J. Lee, “Propulsion Systems and Practices for Smart Work,” Information & Communications Magazine, The Korean Institute of Communications and Information Sciences, Vol. 29, No. 12, pp. 3-9, 2012.
|
11 |
Gartner, Gartner Identifies the Top 10 Strategic Technology Trends for 2015, http://www.gartner.com/newsroom/id/2867917 (accessed Dec., 10, 2014)
|
12 |
KISA, Information Security Guide for Mobile Office, 2013.
|
13 |
KISA, Information Manual for Introduction and Operation of Secure Mobile Office, 2012.
|
14 |
Wikipedia, Network Access Control, http://en.wikipedia.org/wiki/Network_Access_Control (accessed Dec., 13, 2014)
|
15 |
L. Orans and M. Nicolett, “Gartner’s Network Access Control Model,“ Gartner IT Security Summit, 2005.
|
16 |
K. Rhee, W. Jeon, and D. Won, “Security Requirements of a Mobile Device Management System”, International Journal of Security and Its Applications, Vol. 6, No. 2, pp. 353-358, 2012.
|
17 |
The Kyunghyang Shinmun, POSCO, Outsourcing Employees 'Cyber Inspectors' Controversy, 2013.
|
18 |
MSIP, Wireless Communication Services Statistics, 2014.
|