[1] Adibi, S., “Comparative Mobile Platforms Security Solutions,” 2014 IEEE 27th Canadian Conference of Electrical and Computer Engineering (CCECE), pp. 1-6, 2014.
[2] BSI, “Information Technology-Security Techniques-Code of Practice for Information Security Management,” ISO/IEC 27002:2005, 2005.
[3] BSI, “Information Technology-Security Techniques-Information Security Management Systems-Requirements,” ISO/IEC 27001:2013, 2013.
[4] Certified Ethical Hacker., “Hacking Mobile Platforms,” Ethical Hacking and Countermeasures, Exam 312-50, Module 16.
[5] Chang, J. M., Ho, P. C., &; Chang, T. C., “Securing BYOD,” IEEE IT Professional, Vol. 16, No. 5, pp. 9-11, 2014.
[6] Cloud Security Alliance, “Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,”
https://cloudsecurityalliance.org/csaguide.pdf, Accessed on Jun 2015.
[7] Ding, J. H., Chien, R., Hung, S. H., Lin, Y. L., Kuo, C. Y., Hsu, C. H., &; Chung, Y. C., “A Framework of Cloud-based Virtual Phones for Secure Intelligent Information Management,” International Journal of Information Management, Vol. 34, No. 3, pp. 329-335, 2014.
[8] Eslahi, M., Naseri, M. V., Hashim, H., Tahir, N. M., &; Saad, E. H. M., “BYOD: Current State and Security Challenges,” IEEE Symposium on Computer Applications &; Industrial Electronics (ISCAIE), pp. 189-192, 2014.
[9] Han, D., Zhang, C., Fan, X., Hindle, A., Wong, K., &; Stroulia, E., “Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs,” 2012 19th IEEE Working Conference on Reverse Engineering (WCRE), pp. 83-92, 2012.
[10] Hess, K., “How to Evaluate Mobile Management Solutions,” Tom’s IT PRO,
http://www.tomsitpro.com/articles/evaluating-mobile-management-solutions,2-708-2.html, Accessed on Jun 2014.
[11] ISO, “Information Processing Systems-Open Systems Interconnection-Basic Reference Model -Part 2: Security Architecture,” ISO 7498-2:1989, 1989.
[12] John, M., "Information Systems Security: A Comprehensive Model," Proceedings of the 14th National Computer Security Conference, 1991.
[13] Juniper Networks Global Threat Center, “2014 malicious mobile threats report,”
http://www.juniper.net/us/en/local/pdf/additional-resources/jnpr-2011-mobile-threats-report.pdf, Accessed on Jun 2014.
[14] Juniper Networks, “2012 Mobile Threats Report,” 2013.
[15] Kim, K. J., &; Hong, S. P., “Study on Enhancing Vulnerability Evaluations for BYOD Security,” International Journal of Security and Its Applications, Vol. 8, No. 4, pp. 229-238, 2014.
[16] Microsoft Library, “MDM System Overview,”
http://technet.microsoft.com/en-us/library/cc135589(TechNet.10).aspx
,2008, Accessed on Jun 2014.
[17] Miller, K. W., Voas, J., &; Hurlburt, G. F., “BYOD: Security and Privacy Considerations,” IT Professional, Vol. 14, No. 5, pp. 53-55, 2012.
[18] Morrow, B., “BYOD Security Challenges: Control and Protect your Most Sensitive Data,” Network Security, Vol. 2012, No. 12, pp. 5-8, 2012.
[19] Park, W. H., Kim, D. H., Kim, M. S., &; Park, N., “A Study on Trend and Detection Technology for Cyber Threats in Mobile Environment,” 2013 International Conference on IT Convergence and Security (ICITCS), pp. 1-4, 2013.
[20] Pilz, H., &; Schindler, S., “Are Free Android Virus Scanners Any Good,” AV-TEST Report, 2011.
[21] Romer, H., “Best Practices for BYOD Security,” Computer Fraud &; Security, Vol. 2014, No. 1, pp. 13-15, 2014.
[22] Samaras, V., Daskapan, S., Ahmad, R., &; Ray, S. K. “An Enterprise Security Architecture for Accessing SaaS Cloud Services with BYOD,” Australasian Telecommunication Networks and Applications Conference, pp. 129-134,2015.
[23] Scarfo, A., “New Security Perspectives Around BYOD,” Proceedings of the 2012 7th International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 446-451, 2012.
[24] Symantec, “2011 Internet Security Threat Report,” www.symantec.com/threatreport , 2012, Accessed Nov 2012.
[25] Titze, D., Stephanow, P., &; Schutte, J., “A Configurable and Extensible Security Service Architecture for Smartphones,” 2013 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 1056-1062, 2013.
[26] Tse, D. W. K., “A New Smartphone Privacy Protection Scheme based on Anti-theft Technology,”Computer Audit Association, No. 30 ,2014
[27] Wagenseil, P., “Half of Used Cellphones Still Hold Personal Data,” NBC News, 2011.
[28] Wang, Y., Wei, J., &; Vangury, K., “Bring Your Own Device Security issues and challenges,” IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 80-85, 2014.
[29] Wikipedia, “Consumerization,”
http://en.wikipedia.org/wiki/Consumerization , Accessed on Oct 2014.
[30] Zhou, Y., &; Jiang, X., “Dissecting Android Malware: Characterization and Evolution,” 2012 IEEE Symposium on Security and Privacy (SP), pp.95-109, 2012.
[31] IThome,「TLS加密協定竟然也不安全!企業須審慎內部漏洞」,http://www.ithome.com.tw/promotion/93094,民國103年。
[32] IThome,「推動BYOD的三大安全控管做法」,http://www.ithome.com.tw/node/73587,民國101年。
[33] 互動百科,「MAM」,http://www.baike.com/wiki/MAM,於民國104年1月檢索。
[34] 企業網D1net,「BYOD安全選什麼?MDM還是MAM」,http://www.d1net.com/byod/mdm/249039.html,民國102年。
[35] 洪羿漣(2014),Net Admin網管人,「涵蓋裝置、應用與內容管理行動安全兼顧隱私」,http://www.netadmin.com.tw/article_content.aspx?sn=1403050002,民國103年。
[36] 陳朝麟,「適用於雲端運算環境下之安全模型」,長庚大學資訊管理學系碩士論文,民國100年。[37] 張文瀞,「ISO27001:2013和ISO27001:2005的主要差異」, http://www.cc.ntu.edu.tw/chinese/epaper/0030/20140920_3003.html,於民國104年6月檢索。
[38] 黃金月,「ISO 27001資訊安全簡介」,http://wiki.cc.ncu.edu.tw/mediawiki/images/4/4a/ISO_27001資訊安全簡介_991111.pdf,於民國104年6月檢索。
[39] 戴智啟,「行政機關國會聯絡人工作績效評估指標建構之研究」,。國立政治大學學校行政碩士在職專班碩士論文,民國97年。