語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Barriers to securing data on Bluetoo...
~
ProQuest Information and Learning Co.
Barriers to securing data on BluetoothRTM--enabled mobile devices : = A phenomenological study.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Barriers to securing data on BluetoothRTM--enabled mobile devices :/
其他題名:
A phenomenological study.
作者:
Hines, Natasha.
面頁冊數:
1 online resource (162 pages)
附註:
Source: Dissertation Abstracts International, Volume: 77-07(E), Section: B.
Contained By:
Dissertation Abstracts International77-07B(E).
標題:
Information technology. -
電子資源:
click for full text (PQDT)
ISBN:
9781339475202
Barriers to securing data on BluetoothRTM--enabled mobile devices : = A phenomenological study.
Hines, Natasha.
Barriers to securing data on BluetoothRTM--enabled mobile devices :
A phenomenological study. - 1 online resource (162 pages)
Source: Dissertation Abstracts International, Volume: 77-07(E), Section: B.
Thesis (D.M.)
Includes bibliographical references
Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated with using mobile, BluetoothRTM-enabled devices. The purpose of this qualitative, phenomenological research study is to assess the barriers, perceived by security leaders in financial services organizations, to minimizing vulnerabilities associated with BluetoothRTM-enabled mobile devices. A transcendental phenomenology design allowed commonalities to emerge from the experiences of six information security leaders to reveal such barriers. The study drew on in-depth interviews conducted via phone and email. Interpretation of the results revealed four themes. This study suggests that it could require combined effort from users, financial services organizations, and manufacturers to solve the proposed problem. Thus, information from this study could lead to improvements in identifying, understanding, and thus addressing solutions to the barriers that information security leaders face in securing data on BluetoothRTM-enabled mobile devices. The Mobile Device Behavioral Awareness (MDBA) model was a result of the study. The model offers a method for evaluating any feature or vulnerability associated with mobile device usage by applying continuous feedback and communication. The study further contributes by adding to the limited body of scholarly literature in the information technology field specifically information security.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781339475202Subjects--Topical Terms:
559429
Information technology.
Index Terms--Genre/Form:
554714
Electronic books.
Barriers to securing data on BluetoothRTM--enabled mobile devices : = A phenomenological study.
LDR
:03007ntm a2200361Ki 4500
001
909393
005
20180426100009.5
006
m o u
007
cr mn||||a|a||
008
190606s2015 xx obm 000 0 eng d
020
$a
9781339475202
035
$a
(MiAaPQ)AAI10012368
035
$a
(MiAaPQ)phoenix:10108
035
$a
AAI10012368
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Hines, Natasha.
$3
1180164
245
1 0
$a
Barriers to securing data on BluetoothRTM--enabled mobile devices :
$b
A phenomenological study.
264
0
$c
2015
300
$a
1 online resource (162 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 77-07(E), Section: B.
500
$a
Adviser: Stuart Gold.
502
$a
Thesis (D.M.)
$c
University of Phoenix
$d
2015.
504
$a
Includes bibliographical references
520
$a
Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated with using mobile, BluetoothRTM-enabled devices. The purpose of this qualitative, phenomenological research study is to assess the barriers, perceived by security leaders in financial services organizations, to minimizing vulnerabilities associated with BluetoothRTM-enabled mobile devices. A transcendental phenomenology design allowed commonalities to emerge from the experiences of six information security leaders to reveal such barriers. The study drew on in-depth interviews conducted via phone and email. Interpretation of the results revealed four themes. This study suggests that it could require combined effort from users, financial services organizations, and manufacturers to solve the proposed problem. Thus, information from this study could lead to improvements in identifying, understanding, and thus addressing solutions to the barriers that information security leaders face in securing data on BluetoothRTM-enabled mobile devices. The Mobile Device Behavioral Awareness (MDBA) model was a result of the study. The model offers a method for evaluating any feature or vulnerability associated with mobile device usage by applying continuous feedback and communication. The study further contributes by adding to the limited body of scholarly literature in the information technology field specifically information security.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
559429
650
4
$a
Management.
$3
558618
650
4
$a
Information science.
$3
561178
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0489
690
$a
0454
690
$a
0723
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
University of Phoenix.
$b
School of Advanced Studies.
$3
1179324
773
0
$t
Dissertation Abstracts International
$g
77-07B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10012368
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入