語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
An Exploratory Study of the Approach...
~
Santee, Coleen D.
FindBook
Google Book
Amazon
博客來
An Exploratory Study of the Approach to Bring Your Own Device (BYOD) in Assuring Information Security.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
An Exploratory Study of the Approach to Bring Your Own Device (BYOD) in Assuring Information Security./
作者:
Santee, Coleen D.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2017,
面頁冊數:
118 p.
附註:
Source: Dissertations Abstracts International, Volume: 78-12, Section: B.
Contained By:
Dissertations Abstracts International78-12B.
標題:
Information Technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10282007
ISBN:
9781369815023
An Exploratory Study of the Approach to Bring Your Own Device (BYOD) in Assuring Information Security.
Santee, Coleen D.
An Exploratory Study of the Approach to Bring Your Own Device (BYOD) in Assuring Information Security.
- Ann Arbor : ProQuest Dissertations & Theses, 2017 - 118 p.
Source: Dissertations Abstracts International, Volume: 78-12, Section: B.
Thesis (Ph.D.)--Nova Southeastern University, 2017.
This item must not be sold to any third party vendors.
The availability of smart device capabilities, easy to use apps, and collaborative capabilities has increased the expectations for the technology experience of employees. In addition, enterprises are adopting SaaS cloud-based systems that employees can access anytime, anywhere using their personal, mobile device. BYOD could drive an IT evolution for powerful device capabilities and easy to use apps, but only if the information security concerns can be addressed. This research proposed to determine the acceptance rate of BYOD in organizations, the decision making approach, and significant factors that led to the successful adoption of BYOD using the expertise of experienced internal control professionals. The approach and factors leading to the decision to permit the use of BYOD was identified through survey responses, which was distributed to approximately 5,000 members of the Institute for Internal Controls (IIC). The survey participation request was opened by 1,688 potential respondents, and 663 total responses were received for a response rate of 39%. Internal control professionals were targeted by this study to ensure a diverse population of organizations that have implemented or considered implementation of a BYOD program were included. This study provided an understanding of how widely the use of BYOD was permitted in organizations and identified effective approaches that were used in making the decision. In addition, the research identified the factors that were influential in the decision making process. This study also explored the new information security risks introduced by BYOD. The research argued that there were several new risks in the areas of access, compliance, compromise, data protection, and control that affect a company's willingness to support BYOD. This study identified new information security concerns and risks associated with BYOD and suggested new elements of governance, risk management, and control systems that were necessary to ensure a secure BYOD program. Based on the initial research findings, future research areas were suggested.
ISBN: 9781369815023Subjects--Topical Terms:
1030799
Information Technology.
An Exploratory Study of the Approach to Bring Your Own Device (BYOD) in Assuring Information Security.
LDR
:03180nmm a2200313 4500
001
2207475
005
20190920131233.5
008
201008s2017 ||||||||||||||||| ||eng d
020
$a
9781369815023
035
$a
(MiAaPQ)AAI10282007
035
$a
(MiAaPQ)scisnova:10470
035
$a
AAI10282007
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Santee, Coleen D.
$3
3434463
245
1 3
$a
An Exploratory Study of the Approach to Bring Your Own Device (BYOD) in Assuring Information Security.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2017
300
$a
118 p.
500
$a
Source: Dissertations Abstracts International, Volume: 78-12, Section: B.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Advisor: Nasuti, Frank.
502
$a
Thesis (Ph.D.)--Nova Southeastern University, 2017.
506
$a
This item must not be sold to any third party vendors.
520
$a
The availability of smart device capabilities, easy to use apps, and collaborative capabilities has increased the expectations for the technology experience of employees. In addition, enterprises are adopting SaaS cloud-based systems that employees can access anytime, anywhere using their personal, mobile device. BYOD could drive an IT evolution for powerful device capabilities and easy to use apps, but only if the information security concerns can be addressed. This research proposed to determine the acceptance rate of BYOD in organizations, the decision making approach, and significant factors that led to the successful adoption of BYOD using the expertise of experienced internal control professionals. The approach and factors leading to the decision to permit the use of BYOD was identified through survey responses, which was distributed to approximately 5,000 members of the Institute for Internal Controls (IIC). The survey participation request was opened by 1,688 potential respondents, and 663 total responses were received for a response rate of 39%. Internal control professionals were targeted by this study to ensure a diverse population of organizations that have implemented or considered implementation of a BYOD program were included. This study provided an understanding of how widely the use of BYOD was permitted in organizations and identified effective approaches that were used in making the decision. In addition, the research identified the factors that were influential in the decision making process. This study also explored the new information security risks introduced by BYOD. The research argued that there were several new risks in the areas of access, compliance, compromise, data protection, and control that affect a company's willingness to support BYOD. This study identified new information security concerns and risks associated with BYOD and suggested new elements of governance, risk management, and control systems that were necessary to ensure a secure BYOD program. Based on the initial research findings, future research areas were suggested.
590
$a
School code: 1191.
650
4
$a
Information Technology.
$3
1030799
690
$a
0489
710
2
$a
Nova Southeastern University.
$b
Information Systems (DISS).
$3
1023901
773
0
$t
Dissertations Abstracts International
$g
78-12B.
790
$a
1191
791
$a
Ph.D.
792
$a
2017
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10282007
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9384024
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入