ANNOTATED BIBLIOGRAPHY1Annotated bibliographyNameInstitution affiliatedANNOTATED BIBLIOGRAPHY2Annotated bibliographyAlotaibi, B., & Almagwashi, H. (2018, April). A review of BYOD security challenges, solutions,and policy best practices. In 2018 1st International Conference on Computer Applications& Information Security (ICCAIS) (pp. 1-6). IEEE.In this article, the authors talk about bring your own device (BYOD) policies, includingthe security issues that it brings, solutions, and best practices. The authors note that BYODallows employees to access organization network, applications, and other informationresources, and this exposes an organizations IT infrastructure to many risks (p 1). In the lightof these challenges, the researchers recommend some management approaches, procedures, andtechniques (p 3) that companies must consider before adopting a BYOD system. Some of theseinclude the network approach, mobile device management approach, the enterprise mobilitymanagement approach, and the portable information management approach. The article presentsinformation in the simplest forms, and it suggests BYOD approaches that are easy to follow. Iwill use the source to inform some of the benefits and issues related to the use of iPhones in theworkplace. I will also use the study to contemplate the best approaches to implementing BYODin the workplace.Jewell, S. (2014). Productivity via mobile phones: Using smartphones in smart ways. Journa ...
To Order an Original Plagiarism Free Paper on the Same Topic Click Here











Other samples, services and questions:
When you use PaperHelp, you save one valuable — TIME
You can spend it for more important things than paper writing.