語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Development and analysis of a model ...
~
Schmidt, Mark Bradley.
FindBook
Google Book
Amazon
博客來
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks./
作者:
Schmidt, Mark Bradley.
面頁冊數:
250 p.
附註:
Adviser: Kirk P. Arnett.
Contained By:
Dissertation Abstracts International67-10A.
標題:
Business Administration, Management. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3238942
ISBN:
9780542934889
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks.
Schmidt, Mark Bradley.
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks.
- 250 p.
Adviser: Kirk P. Arnett.
Thesis (Ph.D.)--Mississippi State University, 2006.
This dissertation employed a two prong approach, whereby the survey and case study methods were used to investigate security issues regarding wireless networks. The survey portion draws together two previously unrelated research streams. Given the recent increased concern for security in the computing milieu, Innovation Diffusion Theory and security factor constructs were merged and synthesized to form a new instrument. This instrument is useful in an effort to understand what role security concerns play in the adoption and diffusion of technology.
ISBN: 9780542934889Subjects--Topical Terms:
626628
Business Administration, Management.
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks.
LDR
:03398nam 2200313 a 45
001
965486
005
20110906
008
110906s2006 eng d
020
$a
9780542934889
035
$a
(UMI)AAI3238942
035
$a
AAI3238942
040
$a
UMI
$c
UMI
100
1
$a
Schmidt, Mark Bradley.
$3
1288260
245
1 0
$a
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks.
300
$a
250 p.
500
$a
Adviser: Kirk P. Arnett.
500
$a
Source: Dissertation Abstracts International, Volume: 67-10, Section: A, page: 3895.
502
$a
Thesis (Ph.D.)--Mississippi State University, 2006.
520
$a
This dissertation employed a two prong approach, whereby the survey and case study methods were used to investigate security issues regarding wireless networks. The survey portion draws together two previously unrelated research streams. Given the recent increased concern for security in the computing milieu, Innovation Diffusion Theory and security factor constructs were merged and synthesized to form a new instrument. This instrument is useful in an effort to understand what role security concerns play in the adoption and diffusion of technology.
520
$a
In development of the new instrument, 481 usable surveys were collected and analyzed. Factor analysis revealed favorable factor loadings in the data. Further analysis was then conducted utilizing multiple regression analysis. This analysis led to the discovery that the constructs of Susceptibility and Severity of Threat, Improvement Potential, and Visibility are significant predictors in regard to level of concern when using wireless networks.
520
$a
Case studies were conducted with a goal to gain a deep knowledge of IT professionals' concerns, attitudes, and best practices toward wireless security. To this end, seven IT professionals were personally interviewed regarding their perceptions and attitudes toward wireless security. In an effort to compare IT professional and end user opinions, 30 IT professionals also completed a paper based survey regarding their perceptions about security. Findings indicate that security professionals are very optimistic for the future of wireless computing. However, that optimism is tempered by a realization that there are a myriad of potential threats that might exploit weakness in wireless security.
520
$a
To determine differences and similarities between users' perspectives and managers' perspectives regarding wireless network security, the results from the survey and case study were synthesized. Most IT professionals (76.19%) reported that, all factors considered, they prefer to use wired networks as opposed to wireless networks; whereas, substantially fewer (44.86%) of the end user respondents reported that they preferred wired over wireless networks. Overall, results suggest that IT professionals are more concerned about security than are end users. However, a challenge remains to make administrators and users aware of the full effect of security threats present in the wireless computing paradigm.
590
$a
School code: 0132.
650
4
$a
Business Administration, Management.
$3
626628
650
4
$a
Engineering, System Science.
$3
1018128
690
$a
0454
690
$a
0790
710
2 0
$a
Mississippi State University.
$3
1017550
773
0
$t
Dissertation Abstracts International
$g
67-10A.
790
$a
0132
790
1 0
$a
Arnett, Kirk P.,
$e
advisor
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3238942
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9125087
電子資源
11.線上閱覽_V
電子書
EB W9125087
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入