Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Mobile Device Management, Security, ...
~
Horster, Alexander K.
Mobile Device Management, Security, and Workload : = A Quantitative Correlational Study.
Record Type:
Language materials, manuscript : Monograph/item
Title/Author:
Mobile Device Management, Security, and Workload :/
Reminder of title:
A Quantitative Correlational Study.
Author:
Horster, Alexander K.
Description:
1 online resource (127 pages)
Notes:
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: A.
Subject:
Management. -
Online resource:
click for full text (PQDT)
ISBN:
9780355545470
Mobile Device Management, Security, and Workload : = A Quantitative Correlational Study.
Horster, Alexander K.
Mobile Device Management, Security, and Workload :
A Quantitative Correlational Study. - 1 online resource (127 pages)
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: A.
Thesis (DM/IST)--University of Phoenix, 2017.
Includes bibliographical references
Mobile computing devices including cell phones, tablets, and laptops are small and easily brought into the workplace where they can be used to access sensitive files, record private meetings, and take pictures of controlled company data, such as prototype drawings and specifications. The rapid proliferation of these devices at home and work has brought about new management challenges as well as personal challenges to using the technology productively and securely. Failing to manage the use of personal computing devices can compromise network security and increase IT management workload. The research used the quantitative method and a correlational design to examine whether relationships exist among BYOD policy, network security, and IT workload in United States based small businesses. The analysis did not reveal significant associations among the BYOD management approach, network security, and IT workload. There was a significant correlation between the number of network intrusions and IT workload. More research is needed to determine the causes for the low number of intrusions reported by small companies and for the seeming lack of significant differences in intrusions and IT workload based on BYOD policy. Small companies may not be expending the resources to adequately identify and counter the threats that are increasingly targeting the small business community.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355545470Subjects--Topical Terms:
558618
Management.
Index Terms--Genre/Form:
554714
Electronic books.
Mobile Device Management, Security, and Workload : = A Quantitative Correlational Study.
LDR
:02552ntm a2200325K 4500
001
915019
005
20180727091503.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355545470
035
$a
(MiAaPQ)AAI10688690
035
$a
(MiAaPQ)phoenix:10652
035
$a
AAI10688690
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Horster, Alexander K.
$3
1148670
245
1 0
$a
Mobile Device Management, Security, and Workload :
$b
A Quantitative Correlational Study.
264
0
$c
2017
300
$a
1 online resource (127 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: A.
500
$a
Adviser: Julia Bao.
502
$a
Thesis (DM/IST)--University of Phoenix, 2017.
504
$a
Includes bibliographical references
520
$a
Mobile computing devices including cell phones, tablets, and laptops are small and easily brought into the workplace where they can be used to access sensitive files, record private meetings, and take pictures of controlled company data, such as prototype drawings and specifications. The rapid proliferation of these devices at home and work has brought about new management challenges as well as personal challenges to using the technology productively and securely. Failing to manage the use of personal computing devices can compromise network security and increase IT management workload. The research used the quantitative method and a correlational design to examine whether relationships exist among BYOD policy, network security, and IT workload in United States based small businesses. The analysis did not reveal significant associations among the BYOD management approach, network security, and IT workload. There was a significant correlation between the number of network intrusions and IT workload. More research is needed to determine the causes for the low number of intrusions reported by small companies and for the seeming lack of significant differences in intrusions and IT workload based on BYOD policy. Small companies may not be expending the resources to adequately identify and counter the threats that are increasingly targeting the small business community.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Management.
$3
558618
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0454
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
University of Phoenix.
$b
Advanced Studies.
$3
1148671
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10688690
$z
click for full text (PQDT)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login