語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Mobile Device Management, Security, ...
~
Horster, Alexander K.
Mobile Device Management, Security, and Workload: A Quantitative Correlational Study.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Mobile Device Management, Security, and Workload: A Quantitative Correlational Study./
作者:
Horster, Alexander K.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2017,
面頁冊數:
127 p.
附註:
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: A.
Contained By:
Dissertation Abstracts International79-04A(E).
標題:
Management. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10688690
ISBN:
9780355545470
Mobile Device Management, Security, and Workload: A Quantitative Correlational Study.
Horster, Alexander K.
Mobile Device Management, Security, and Workload: A Quantitative Correlational Study.
- Ann Arbor : ProQuest Dissertations & Theses, 2017 - 127 p.
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: A.
Thesis (DM/IST)--University of Phoenix, 2017.
Mobile computing devices including cell phones, tablets, and laptops are small and easily brought into the workplace where they can be used to access sensitive files, record private meetings, and take pictures of controlled company data, such as prototype drawings and specifications. The rapid proliferation of these devices at home and work has brought about new management challenges as well as personal challenges to using the technology productively and securely. Failing to manage the use of personal computing devices can compromise network security and increase IT management workload. The research used the quantitative method and a correlational design to examine whether relationships exist among BYOD policy, network security, and IT workload in United States based small businesses. The analysis did not reveal significant associations among the BYOD management approach, network security, and IT workload. There was a significant correlation between the number of network intrusions and IT workload. More research is needed to determine the causes for the low number of intrusions reported by small companies and for the seeming lack of significant differences in intrusions and IT workload based on BYOD policy. Small companies may not be expending the resources to adequately identify and counter the threats that are increasingly targeting the small business community.
ISBN: 9780355545470Subjects--Topical Terms:
558618
Management.
Mobile Device Management, Security, and Workload: A Quantitative Correlational Study.
LDR
:02338nam a2200301 4500
001
890767
005
20180727091503.5
008
180907s2017 ||||||||||||||||| ||eng d
020
$a
9780355545470
035
$a
(MiAaPQ)AAI10688690
035
$a
(MiAaPQ)phoenix:10652
035
$a
AAI10688690
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Horster, Alexander K.
$3
1148670
245
1 0
$a
Mobile Device Management, Security, and Workload: A Quantitative Correlational Study.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2017
300
$a
127 p.
500
$a
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: A.
500
$a
Adviser: Julia Bao.
502
$a
Thesis (DM/IST)--University of Phoenix, 2017.
520
$a
Mobile computing devices including cell phones, tablets, and laptops are small and easily brought into the workplace where they can be used to access sensitive files, record private meetings, and take pictures of controlled company data, such as prototype drawings and specifications. The rapid proliferation of these devices at home and work has brought about new management challenges as well as personal challenges to using the technology productively and securely. Failing to manage the use of personal computing devices can compromise network security and increase IT management workload. The research used the quantitative method and a correlational design to examine whether relationships exist among BYOD policy, network security, and IT workload in United States based small businesses. The analysis did not reveal significant associations among the BYOD management approach, network security, and IT workload. There was a significant correlation between the number of network intrusions and IT workload. More research is needed to determine the causes for the low number of intrusions reported by small companies and for the seeming lack of significant differences in intrusions and IT workload based on BYOD policy. Small companies may not be expending the resources to adequately identify and counter the threats that are increasingly targeting the small business community.
590
$a
School code: 0850.
650
4
$a
Management.
$3
558618
650
4
$a
Information technology.
$3
559429
690
$a
0454
690
$a
0489
710
2
$a
University of Phoenix.
$b
Advanced Studies.
$3
1148671
773
0
$t
Dissertation Abstracts International
$g
79-04A(E).
790
$a
0850
791
$a
DM/IST
792
$a
2017
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10688690
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入