Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Mobile Device Security.
~
Cormier, George A.
Linked to FindBook
Google Book
Amazon
博客來
Mobile Device Security.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Mobile Device Security./
Author:
Cormier, George A.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2020,
Description:
139 p.
Notes:
Source: Dissertations Abstracts International, Volume: 81-10, Section: A.
Contained By:
Dissertations Abstracts International81-10A.
Subject:
Information technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=27829949
ISBN:
9781658496056
Mobile Device Security.
Cormier, George A.
Mobile Device Security.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 139 p.
Source: Dissertations Abstracts International, Volume: 81-10, Section: A.
Thesis (D.B.A.)--Northcentral University, 2020.
This item must not be sold to any third party vendors.
Administrators of small colleges and major universities are eager to implement mobile device usage into their network infrastructure. The Internet's rapid growth is causing an abundance of security challenges organizations must overcome. Directly related to this growth is an increase in the number of data security breaches due to the lack of security procedures available to protect mobile devices. The focus of this qualitative case study is to discover how to better protect the sensitive data stored on mobile devices being used at for-profit schools and colleges. Utilizing the technology acceptance model (TAM) framework allowed the collection of real-time knowledge on the importance of securing mobile devices from the user's perspective. The TAM five constructs were used to examine end-user behaviors and perceptions that prevent data security. Those constructs are perceived usefulness (PU), perceived ease of use (PEOU), attitude toward usage (ATU), behavioral intended use (BIU), and actual use (AU). The data collection methods consisted of 10 individual interviews, a 7-member focus group, and 14 indirect observations. The 31 participants' sample size was equal to 27 % of Asher College's 115-member population. The results from these activities were discussed and recommendations provided. As demands to seek technological solutions to enhance our lives continue to surge, so too does the necessity to seek security solutions for mobile device protection. The significance of this study is underscored by the eagerness displayed by educational and business leaders who are considering or already have implemented mobile device usage within their network infrastructures. Finding a balanced approach when developing mobile device security policies and procedures provide the benefits derived from allowing such usage, as well as the protection of the data that passes through these devices, remains a challenge. This study offers Asher College and similar small for-profit schools several practical recommendations to enhance the security for mobile device usage.
ISBN: 9781658496056Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
Bring Your Own Device
Mobile Device Security.
LDR
:03347nmm a2200397 4500
001
2270031
005
20200921070017.5
008
220629s2020 ||||||||||||||||| ||eng d
020
$a
9781658496056
035
$a
(MiAaPQ)AAI27829949
035
$a
AAI27829949
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Cormier, George A.
$3
3547400
245
1 0
$a
Mobile Device Security.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
139 p.
500
$a
Source: Dissertations Abstracts International, Volume: 81-10, Section: A.
500
$a
Advisor: Beverley, Charles, Jr.
502
$a
Thesis (D.B.A.)--Northcentral University, 2020.
506
$a
This item must not be sold to any third party vendors.
506
$a
This item must not be added to any third party search indexes.
520
$a
Administrators of small colleges and major universities are eager to implement mobile device usage into their network infrastructure. The Internet's rapid growth is causing an abundance of security challenges organizations must overcome. Directly related to this growth is an increase in the number of data security breaches due to the lack of security procedures available to protect mobile devices. The focus of this qualitative case study is to discover how to better protect the sensitive data stored on mobile devices being used at for-profit schools and colleges. Utilizing the technology acceptance model (TAM) framework allowed the collection of real-time knowledge on the importance of securing mobile devices from the user's perspective. The TAM five constructs were used to examine end-user behaviors and perceptions that prevent data security. Those constructs are perceived usefulness (PU), perceived ease of use (PEOU), attitude toward usage (ATU), behavioral intended use (BIU), and actual use (AU). The data collection methods consisted of 10 individual interviews, a 7-member focus group, and 14 indirect observations. The 31 participants' sample size was equal to 27 % of Asher College's 115-member population. The results from these activities were discussed and recommendations provided. As demands to seek technological solutions to enhance our lives continue to surge, so too does the necessity to seek security solutions for mobile device protection. The significance of this study is underscored by the eagerness displayed by educational and business leaders who are considering or already have implemented mobile device usage within their network infrastructures. Finding a balanced approach when developing mobile device security policies and procedures provide the benefits derived from allowing such usage, as well as the protection of the data that passes through these devices, remains a challenge. This study offers Asher College and similar small for-profit schools several practical recommendations to enhance the security for mobile device usage.
590
$a
School code: 1443.
650
4
$a
Information technology.
$3
532993
650
4
$a
Adult education.
$3
543202
650
4
$a
Educational technology.
$3
517670
653
$a
Bring Your Own Device
653
$a
Internet of things
653
$a
Mobile devices
653
$a
Mobile security
653
$a
Secure device management
653
$a
Threats and vulnerabilities
690
$a
0489
690
$a
0516
690
$a
0710
710
2
$a
Northcentral University.
$b
School of Business and Technology Management.
$3
2099493
773
0
$t
Dissertations Abstracts International
$g
81-10A.
790
$a
1443
791
$a
D.B.A.
792
$a
2020
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=27829949
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9422265
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login