Skip to content

Commit

Permalink
Adding new section about BYOD in the company. References #5
Browse files Browse the repository at this point in the history
  • Loading branch information
unintendedbear committed Jun 21, 2017
1 parent c57673b commit fe83c1e
Showing 1 changed file with 13 additions and 0 deletions.
13 changes: 13 additions & 0 deletions Chapters/02-byodSotA.tex
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,19 @@ \section{Preliminary concepts and background about enterprise security}
It is interesting to mention that previous works are mainly focused in separating into hands-off vs hand-on devices, or static analysis techniques. However, neither of the papers found in bibliography establishes a taxonomy. In addition, the tools described in the reviewed works, do not implement any security policies adaptation methods, as the system that we present in this paper.
ols for companies, as well as for devices, have adopted the BYOD have been released in the past four years. This way, and more focused on the enterprise, there are some tools which offer the CSO ways to control the devices which enter into the system, for instance, and also to protect the employees' data by means of data encryption and data protection by requiring the use of strong and secure passwords. Other tools for managing a BYOD situation add to their features guidelines for the CSOs to develop good ISPs, like Good's BYOD solution (see Section \ref{subsec:othertools}). On the other hand, many solutions have been presented which are more focused on the device side, although they implement also the server side. This is the case, for instance, of Android for Work (see Section \ref{subsec:androidwork}). Some of those tools have influenced the development of the MUSES system itself (Section \ref{sec:muses}), which can complement them, as adds other features that go beyond the state of the art.

\section{Adoption of BYOD}
\label{sec:byodadoption}

\subsection{BYOD in the enterprise}
\label{subsec:byodcompany}

\subsection{Other fields that have adopted BYOD}
\label{subsec:byodother}

These advantages have made BYOD policies gain traction in the education sector with an increasing number of schools around the world choosing to implement their own BYOD policies. In such environment, BYOD (also called Bring Your Own Technology) refers to a technology model that allows students to bring their own devices to school for learning in the classroom [\cite{sangani2013byod, song2014bring}]. The adoption of BYOD in schools is supported by the fact that technology plays a leading role in
pupils/students' everyday lives and should, therefore, be an integral part of their learning. However, for most schools it is financially unsustainable to provide every student with the most appropriate up-to-date device. BYOD is therefore considered an attractive, cost-effective alternative, provided that many students usually own
devices that are superior and more up-to-date than those available in schools. BYOD at schools has several benefits as well such as personalising learning experiences, encouraging students' independent learning, and promoting anytime, anywhere learning opportunities.

\section{Tools for corporate mobile security}
\label{sec:toolsreview}

Expand Down

0 comments on commit fe83c1e

Please sign in to comment.