Works matching Bring your own device policies
1
- Journal of Corporation Law, 2018, v. 44, n. 1, p. 151
- Article
2
- Journal of Organizational & End User Computing, 2019, v. 31, n. 2, p. 65, doi. 10.4018/JOEUC.2019040104
- Lixuan Zhang Zhang;
- Mouritsen, Matthew;
- Miller, Jeffrey R.
- Article
3
- International Journal of Information Security, 2015, v. 14, n. 2, p. 123, doi. 10.1007/s10207-014-0252-y
- Armando, Alessandro;
- Costa, Gabriele;
- Merlo, Alessio;
- Verderame, Luca
- Article
4
- Information & Security, 2024, v. 55, n. 3, p. 245, doi. 10.11610/isij.5522
- Tikanmäki, Ilkka;
- Ruoslahti, Harri
- Article
5
- ComputerWorld Hong Kong, 2015, p. 44
- Article
6
- ComputerWorld Hong Kong, 2012, p. 7
- Article
7
- Journal of Information Systems, 2017, v. 31, n. 2, p. 49, doi. 10.2308/isys-51623
- Crossler, Robert E.;
- Long, James H.;
- Loraas, Tina M.;
- Trinkle, Brad S.
- Article
8
- Journal of Information Systems, 2014, v. 28, n. 1, p. 209, doi. 10.2308/isys-50704
- Crossler, Robert E.;
- Long, James H.;
- Loraas, Tina M.;
- Trinkle, Brad S.
- Article
10
- Our Schools / Our Selves, 2012, v. 21, n. 2, p. 57
- CANTALINI-WILLIAMS, MARIA;
- VITALE, JOHN L.
- Article
11
- Journal of Health Care Compliance, 2013, v. 15, n. 6, p. 41
- Article
13
- English in Aotearoa, 2016, n. 89, p. 60
- Article
14
- Organization & Management Quarterly / Organizacja i Zarządzanie : Kwartalnik Naukowy, 2018, v. 43, n. 3, p. 131, doi. 10.29119/1899-6116.2018.42.10
- Article
15
- CPA Journal, 2013, v. 83, n. 11, p. 63
- Article
16
- Journal of Applied Learning Technology, 2014, v. 4, n. 1, p. 24
- Cristol, Dean;
- Gimbert, Belinda
- Article
17
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 2, p. 5
- Article
18
- Issues in Information Systems, 2015, v. 16, n. 3, p. 238
- Pinchot, Jamie;
- Paullet, Karen
- Article
19
- Issues in Information Systems, 2014, v. 15, n. 2, p. 141
- Benham, Harry;
- Carvalho, Gerard;
- Cassens, Michelle
- Article
20
- Issues in Information Systems, 2013, v. 14, n. 2, p. 329
- Heinrichs, Lynn R.;
- Jones, Beth H.
- Article
21
- Issues in Information Systems, 2013, v. 14, n. 2, p. 329
- Heinrichs, Lynn R.;
- Jones, Beth H.
- Article
22
- ABA Journal of Labor & Employment Law, 2014, v. 30, n. 1, p. 47
- Article
23
- ABA Journal of Labor & Employment Law, 2014, v. 30, n. 1, p. 27
- Totten, Julie A.;
- Hammock, Melissa C.
- Article
24
- ABA Journal of Labor & Employment Law, 2014, v. 30, n. 1, p. v
- Befort, Professor Stephen F.;
- Cooper, Professor Laura J.
- Article
25
- 2016
- Faulds, M. C.;
- Bauchmuller, K.;
- Miller, D.;
- Rosser, J. H.;
- Shuker, K.;
- Wrench, I.;
- Wilson, P.;
- Mills, G. H.;
- South Yorkshire Hospitals Audit and Research Collaboration (SHARC)
- journal article
26
- Education, 2019, v. 140, n. 2, p. 87
- HUFFMAN, STEPHANIE;
- SHAW, ERIN;
- LOYLESS, STACEY
- Article
28
- Access (10300155), 2013, v. 27, n. 4, p. 2
- Article
29
- Japan Association for Language Teaching Computer Assisted Language Learning Journal (JALT CALL Journal), 2020, v. 16, n. 1, p. 29, doi. 10.29140/jaltcall.v16n1.208
- Article
30
- International Journal of Information & Communication Technology Education, 2016, v. 12, n. 4, p. 51, doi. 10.4018/IJICTE.2016100105
- Santos, Ieda M.;
- Bocheco, Otávio
- Article
31
- ITNOW, 2014, v. 56, n. 3, p. 56, doi. 10.1093/itnow/bwu083
- Article
32
- TechTrends: Linking Research & Practice to Improve Learning, 2015, v. 59, n. 6, p. 13, doi. 10.1007/s11528-015-0898-y
- Stork, Michele;
- Rose, Amanda;
- Wang, Charles
- Article
34
- TechTrends: Linking Research & Practice to Improve Learning, 2012, v. 56, n. 4, p. 42, doi. 10.1007/s11528-012-0586-0
- Article
35
- Government Technology, 2014, v. 27, n. 6, p. 22
- Article
37
- Government Technology, 2013, v. 26, n. 5, p. 34
- Article
38
- Government Technology, 2012, v. 25, n. 12, p. 17
- Article
39
- 2012
- Yorty, Tim;
- Smith, John;
- Up, Fred;
- Myers, Michael
- Letter
40
- Personal & Ubiquitous Computing, 2016, v. 20, n. 2, p. 195, doi. 10.1007/s00779-016-0905-0
- Wójtowicz, Adam;
- Joachimiak, Krzysztof
- Article
41
- New Perspectives on Healthcare Risk Management, Control & Governance, 2017, v. 36, n. 2, p. 11
- Article
43
- mETAphor, 2019, n. 3, p. 49
- Article
44
- Journal of Organizational Computing & Electronic Commerce, 2019, v. 29, n. 4, p. 274, doi. 10.1080/10919392.2019.1639913
- Yang, Xue;
- Wang, Xinwei;
- Yue, Wei Thoo;
- Sia, Choon Ling;
- Luo, Xin (Robert)
- Article
45
- IT Professional, 2014, v. 16, n. 5, p. 9, doi. 10.1109/MITP.2014.76
- Chang, J. Morris;
- Ho, Pao-Chung;
- Chang, Teng-Chang
- Article
46
- IT Professional, 2014, v. 16, n. 5, p. 12, doi. 10.1109/MITP.2014.74
- Andriole, Stephen J.;
- Bojanova, Irena
- Article
47
- IT Professional, 2014, v. 16, n. 5, p. 16, doi. 10.1109/MITP.2014.69
- Earley, Seth;
- Harmon, Robert;
- Lee, Maria R.;
- Mithas, Sunil
- Article
49
- IT Professional, 2014, v. 16, n. 5, p. 20, doi. 10.1109/MITP.2014.66
- Article
50
- IT Professional, 2012, v. 14, n. 5, p. 53, doi. 10.1109/MITP.2012.93
- Miller, Keith W.;
- Voas, Jeffrey;
- Hurlburt, George F.
- Article