Focuses on the risks introduced by the user, not by external attackers
Enforces corporate security policies
Informs users of the risk situation
Preserves users’ privacy
Allows taking advantage of opportunities
Usable persuasive security
Risk, trust and opportunity
Security in mobile work environments
Reduction in user-motivated security incidents and their associated cost.
Mitigating the arguments against the adoption of BYOD and Corporate-Owned, Personally Enabled programs.
Increased understanding of legal issues with reference to the control of users’ behavior in corporate networks.
We derive requirements and guidelines for app developers on how to contribute to the protection of their users’ data
We blend our private and professional lives due to the flexibility to work at any time from different locations
Computational Intelligence techniques are used in order to endow the system with a self-adaptation ability
The Bring-YourOwn-Device trend is a fact and it is the reason we survey in this paper how computational trust and risk metrics may help mitigating those new risks in a more dynamic way than in the past.