語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Mobile Device Security.
~
Cormier, George A.
FindBook
Google Book
Amazon
博客來
Mobile Device Security.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Mobile Device Security./
作者:
Cormier, George A.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2020,
面頁冊數:
139 p.
附註:
Source: Dissertations Abstracts International, Volume: 81-10, Section: A.
Contained By:
Dissertations Abstracts International81-10A.
標題:
Information technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=27829949
ISBN:
9781658496056
Mobile Device Security.
Cormier, George A.
Mobile Device Security.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 139 p.
Source: Dissertations Abstracts International, Volume: 81-10, Section: A.
Thesis (D.B.A.)--Northcentral University, 2020.
This item must not be sold to any third party vendors.
Administrators of small colleges and major universities are eager to implement mobile device usage into their network infrastructure. The Internet's rapid growth is causing an abundance of security challenges organizations must overcome. Directly related to this growth is an increase in the number of data security breaches due to the lack of security procedures available to protect mobile devices. The focus of this qualitative case study is to discover how to better protect the sensitive data stored on mobile devices being used at for-profit schools and colleges. Utilizing the technology acceptance model (TAM) framework allowed the collection of real-time knowledge on the importance of securing mobile devices from the user's perspective. The TAM five constructs were used to examine end-user behaviors and perceptions that prevent data security. Those constructs are perceived usefulness (PU), perceived ease of use (PEOU), attitude toward usage (ATU), behavioral intended use (BIU), and actual use (AU). The data collection methods consisted of 10 individual interviews, a 7-member focus group, and 14 indirect observations. The 31 participants' sample size was equal to 27 % of Asher College's 115-member population. The results from these activities were discussed and recommendations provided. As demands to seek technological solutions to enhance our lives continue to surge, so too does the necessity to seek security solutions for mobile device protection. The significance of this study is underscored by the eagerness displayed by educational and business leaders who are considering or already have implemented mobile device usage within their network infrastructures. Finding a balanced approach when developing mobile device security policies and procedures provide the benefits derived from allowing such usage, as well as the protection of the data that passes through these devices, remains a challenge. This study offers Asher College and similar small for-profit schools several practical recommendations to enhance the security for mobile device usage.
ISBN: 9781658496056Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
Bring Your Own Device
Mobile Device Security.
LDR
:03347nmm a2200397 4500
001
2270031
005
20200921070017.5
008
220629s2020 ||||||||||||||||| ||eng d
020
$a
9781658496056
035
$a
(MiAaPQ)AAI27829949
035
$a
AAI27829949
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Cormier, George A.
$3
3547400
245
1 0
$a
Mobile Device Security.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
139 p.
500
$a
Source: Dissertations Abstracts International, Volume: 81-10, Section: A.
500
$a
Advisor: Beverley, Charles, Jr.
502
$a
Thesis (D.B.A.)--Northcentral University, 2020.
506
$a
This item must not be sold to any third party vendors.
506
$a
This item must not be added to any third party search indexes.
520
$a
Administrators of small colleges and major universities are eager to implement mobile device usage into their network infrastructure. The Internet's rapid growth is causing an abundance of security challenges organizations must overcome. Directly related to this growth is an increase in the number of data security breaches due to the lack of security procedures available to protect mobile devices. The focus of this qualitative case study is to discover how to better protect the sensitive data stored on mobile devices being used at for-profit schools and colleges. Utilizing the technology acceptance model (TAM) framework allowed the collection of real-time knowledge on the importance of securing mobile devices from the user's perspective. The TAM five constructs were used to examine end-user behaviors and perceptions that prevent data security. Those constructs are perceived usefulness (PU), perceived ease of use (PEOU), attitude toward usage (ATU), behavioral intended use (BIU), and actual use (AU). The data collection methods consisted of 10 individual interviews, a 7-member focus group, and 14 indirect observations. The 31 participants' sample size was equal to 27 % of Asher College's 115-member population. The results from these activities were discussed and recommendations provided. As demands to seek technological solutions to enhance our lives continue to surge, so too does the necessity to seek security solutions for mobile device protection. The significance of this study is underscored by the eagerness displayed by educational and business leaders who are considering or already have implemented mobile device usage within their network infrastructures. Finding a balanced approach when developing mobile device security policies and procedures provide the benefits derived from allowing such usage, as well as the protection of the data that passes through these devices, remains a challenge. This study offers Asher College and similar small for-profit schools several practical recommendations to enhance the security for mobile device usage.
590
$a
School code: 1443.
650
4
$a
Information technology.
$3
532993
650
4
$a
Adult education.
$3
543202
650
4
$a
Educational technology.
$3
517670
653
$a
Bring Your Own Device
653
$a
Internet of things
653
$a
Mobile devices
653
$a
Mobile security
653
$a
Secure device management
653
$a
Threats and vulnerabilities
690
$a
0489
690
$a
0516
690
$a
0710
710
2
$a
Northcentral University.
$b
School of Business and Technology Management.
$3
2099493
773
0
$t
Dissertations Abstracts International
$g
81-10A.
790
$a
1443
791
$a
D.B.A.
792
$a
2020
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=27829949
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9422265
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入