Find an article on BYOD policies for AIS

Find an article on BYOD policies for AIS. Articles should address current technologies and/or emerging trends. Discussions should focus on the security of the data and internal controls, not the efficiency of operations. Do not merely summarize the article. Instead, offer your own opinion on whether you think the risks can be controlled effectively. Include the web link for your researched article at the end of your first post. Use your own original words – do not quote from the source material (there should be no direct quotes in your posts). Write in complete, professional sentences. Do not use bullet points or numbered lists. Do not cut, paste, or copy from any source. Do not use Wikipedia, any textbook site, or information posted by other students on the internet. Do not plagiarize.