Works matching DE "BRING your own device policies"


Results: 159
    1

    ICT International.

    Published in:
    TechTrends: Linking Research & Practice to Improve Learning, 2015, v. 59, n. 6, p. 13, doi. 10.1007/s11528-015-0898-y
    By:
    • Stork, Michele;
    • Rose, Amanda;
    • Wang, Charles
    Publication type:
    Article
    2

    Editors' Notes.

    Published in:
    2015
    By:
    • Hodges, Charles
    Publication type:
    Editorial
    3

    The Tech-Savvy Triangle.

    Published in:
    TechTrends: Linking Research & Practice to Improve Learning, 2012, v. 56, n. 4, p. 42, doi. 10.1007/s11528-012-0586-0
    By:
    • Walling, Donovan
    Publication type:
    Article
    4

    BARRIERS TO BYOD.

    Published in:
    Government Technology, 2014, v. 27, n. 6, p. 22
    By:
    • Stone, Adam
    Publication type:
    Article
    5

    Ron Baldwin.

    Published in:
    2014
    By:
    • Towns, Steve
    Publication type:
    Interview
    6

    Tablet Tipping Point.

    Published in:
    Government Technology, 2013, v. 26, n. 5, p. 34
    Publication type:
    Article
    7
    8

    reader/comments:.

    Published in:
    2012
    By:
    • Yorty, Tim;
    • Smith, John;
    • Up, Fred;
    • Myers, Michael
    Publication type:
    Letter
    9
    10
    11
    12
    13
    14

    BYOD for English.

    Published in:
    mETAphor, 2019, n. 3, p. 49
    By:
    • Matas, Hayley
    Publication type:
    Article
    15

    Securing BYOD.

    Published in:
    IT Professional, 2014, v. 16, n. 5, p. 9, doi. 10.1109/MITP.2014.76
    By:
    • Chang, J. Morris;
    • Ho, Pao-Chung;
    • Chang, Teng-Chang
    Publication type:
    Article
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31

    Phone Time.

    Published in:
    Marketing Health Services, 2014, v. 34, n. 2, p. 5
    Publication type:
    Article
    32
    33
    34
    35
    36
    37

    BlackBerries in the Classroom.

    Published in:
    Our Schools / Our Selves, 2012, v. 21, n. 2, p. 57
    By:
    • CANTALINI-WILLIAMS, MARIA;
    • VITALE, JOHN L.
    Publication type:
    Article
    38
    39

    EE INDUSTRY UPDATE.

    Published in:
    EE: Evaluation Engineering, 2013, v. 52, n. 8, p. 6
    Publication type:
    Article
    40
    41
    43
    44
    45
    46

    CYBER SECURITY FOR AIRPORTS.

    Published in:
    International Journal for Traffic & Transport Engineering, 2013, v. 3, n. 4, p. 365, doi. 10.7708/ijtte.2013.3(4).02
    By:
    • Gopalakrishnan, Kasthurirangan;
    • Govindarasu, Manimaran;
    • Jacobson, Doug W.;
    • Phares, Brent M.
    Publication type:
    Article
    47
    48
    49
    50

    Cyberloafing Seriousness Meter (CSM).

    Published in:
    Global Business & Management Research, 2018, v. 10, n. 3, p. 1164
    By:
    • Fadhilah Abdul Ghani;
    • Noor Awanis Muslim;
    • Maizatul Akmar Mohd Rasli
    Publication type:
    Article