語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Mobile Device Management, Security, ...
~
Horster, Alexander K.
Mobile Device Management, Security, and Workload : = A Quantitative Correlational Study.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Mobile Device Management, Security, and Workload :/
其他題名:
A Quantitative Correlational Study.
作者:
Horster, Alexander K.
面頁冊數:
1 online resource (127 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: A.
標題:
Management. -
電子資源:
click for full text (PQDT)
ISBN:
9780355545470
Mobile Device Management, Security, and Workload : = A Quantitative Correlational Study.
Horster, Alexander K.
Mobile Device Management, Security, and Workload :
A Quantitative Correlational Study. - 1 online resource (127 pages)
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: A.
Thesis (DM/IST)--University of Phoenix, 2017.
Includes bibliographical references
Mobile computing devices including cell phones, tablets, and laptops are small and easily brought into the workplace where they can be used to access sensitive files, record private meetings, and take pictures of controlled company data, such as prototype drawings and specifications. The rapid proliferation of these devices at home and work has brought about new management challenges as well as personal challenges to using the technology productively and securely. Failing to manage the use of personal computing devices can compromise network security and increase IT management workload. The research used the quantitative method and a correlational design to examine whether relationships exist among BYOD policy, network security, and IT workload in United States based small businesses. The analysis did not reveal significant associations among the BYOD management approach, network security, and IT workload. There was a significant correlation between the number of network intrusions and IT workload. More research is needed to determine the causes for the low number of intrusions reported by small companies and for the seeming lack of significant differences in intrusions and IT workload based on BYOD policy. Small companies may not be expending the resources to adequately identify and counter the threats that are increasingly targeting the small business community.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355545470Subjects--Topical Terms:
558618
Management.
Index Terms--Genre/Form:
554714
Electronic books.
Mobile Device Management, Security, and Workload : = A Quantitative Correlational Study.
LDR
:02552ntm a2200325K 4500
001
915019
005
20180727091503.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355545470
035
$a
(MiAaPQ)AAI10688690
035
$a
(MiAaPQ)phoenix:10652
035
$a
AAI10688690
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Horster, Alexander K.
$3
1148670
245
1 0
$a
Mobile Device Management, Security, and Workload :
$b
A Quantitative Correlational Study.
264
0
$c
2017
300
$a
1 online resource (127 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: A.
500
$a
Adviser: Julia Bao.
502
$a
Thesis (DM/IST)--University of Phoenix, 2017.
504
$a
Includes bibliographical references
520
$a
Mobile computing devices including cell phones, tablets, and laptops are small and easily brought into the workplace where they can be used to access sensitive files, record private meetings, and take pictures of controlled company data, such as prototype drawings and specifications. The rapid proliferation of these devices at home and work has brought about new management challenges as well as personal challenges to using the technology productively and securely. Failing to manage the use of personal computing devices can compromise network security and increase IT management workload. The research used the quantitative method and a correlational design to examine whether relationships exist among BYOD policy, network security, and IT workload in United States based small businesses. The analysis did not reveal significant associations among the BYOD management approach, network security, and IT workload. There was a significant correlation between the number of network intrusions and IT workload. More research is needed to determine the causes for the low number of intrusions reported by small companies and for the seeming lack of significant differences in intrusions and IT workload based on BYOD policy. Small companies may not be expending the resources to adequately identify and counter the threats that are increasingly targeting the small business community.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Management.
$3
558618
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0454
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
University of Phoenix.
$b
Advanced Studies.
$3
1148671
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10688690
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入