Keywords: Access control; Context awareness; BYOD; Security; Mobility; Biometric; Authentication; Reliability; Proximity;
مقالات ISI (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: Mobile learning; Mobile devices; BYOD; Portuguese Higher Education;
Keywords: Workforce control; LBS; Behavior-based HR control; BYOD; Consumerization
Keywords: BYOD; Mobile cloud computing; Mobile security; Information management
Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users
Keywords: Reversed IT adoption logic; BYOD; CEOs; Security paradoxes; Personal Mobile tools;
A pragmatic approach to managing enterprise IT infrastructures in the era of consumerization and individualization of IT
Keywords: IT infrastructure; Social media; IT consumerization; Personal computing; IT individualization; BYOD; Digital natives;
This is my device! Why should I follow your rules? Employees' compliance with BYOD security policy
Keywords: Information security policy; BYOD; Mobile virtualization; Organizational justice; Reactance theory; Freedom threat;
Corporate security solutions for BYOD: A novel user-centric and self-adaptive system
Keywords: Corporate mobile security; User-centric systems; Self-adaptation; Multi-platform; BYOD
An experience of personalized learning hub initiative embedding BYOD for reflective engagement in higher education
Keywords: BYOD; Flipped classroom; Higher education; Personalized learning hub; Reflective engagement;
What's the difference? Learning collaboratively using iPads in conventional classrooms
Keywords: iPad; Collaboration; Google Docs; Learner; BYOD
Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach
Keywords: Malware; Information security behaviour; Protection Motivation Theory; BYOD; Bayesian structural equation modelling
“Bring Your Own Device (BYOD)” for seamless science inquiry in a primary school
Keywords: BYOD; Seamless inquiry-based learning; Content knowledge