Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Development and analysis of a model ...
~
Schmidt, Mark Bradley.
Linked to FindBook
Google Book
Amazon
博客來
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks./
Author:
Schmidt, Mark Bradley.
Description:
250 p.
Notes:
Adviser: Kirk P. Arnett.
Contained By:
Dissertation Abstracts International67-10A.
Subject:
Business Administration, Management. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3238942
ISBN:
9780542934889
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks.
Schmidt, Mark Bradley.
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks.
- 250 p.
Adviser: Kirk P. Arnett.
Thesis (Ph.D.)--Mississippi State University, 2006.
This dissertation employed a two prong approach, whereby the survey and case study methods were used to investigate security issues regarding wireless networks. The survey portion draws together two previously unrelated research streams. Given the recent increased concern for security in the computing milieu, Innovation Diffusion Theory and security factor constructs were merged and synthesized to form a new instrument. This instrument is useful in an effort to understand what role security concerns play in the adoption and diffusion of technology.
ISBN: 9780542934889Subjects--Topical Terms:
626628
Business Administration, Management.
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks.
LDR
:03398nam 2200313 a 45
001
965486
005
20110906
008
110906s2006 eng d
020
$a
9780542934889
035
$a
(UMI)AAI3238942
035
$a
AAI3238942
040
$a
UMI
$c
UMI
100
1
$a
Schmidt, Mark Bradley.
$3
1288260
245
1 0
$a
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks.
300
$a
250 p.
500
$a
Adviser: Kirk P. Arnett.
500
$a
Source: Dissertation Abstracts International, Volume: 67-10, Section: A, page: 3895.
502
$a
Thesis (Ph.D.)--Mississippi State University, 2006.
520
$a
This dissertation employed a two prong approach, whereby the survey and case study methods were used to investigate security issues regarding wireless networks. The survey portion draws together two previously unrelated research streams. Given the recent increased concern for security in the computing milieu, Innovation Diffusion Theory and security factor constructs were merged and synthesized to form a new instrument. This instrument is useful in an effort to understand what role security concerns play in the adoption and diffusion of technology.
520
$a
In development of the new instrument, 481 usable surveys were collected and analyzed. Factor analysis revealed favorable factor loadings in the data. Further analysis was then conducted utilizing multiple regression analysis. This analysis led to the discovery that the constructs of Susceptibility and Severity of Threat, Improvement Potential, and Visibility are significant predictors in regard to level of concern when using wireless networks.
520
$a
Case studies were conducted with a goal to gain a deep knowledge of IT professionals' concerns, attitudes, and best practices toward wireless security. To this end, seven IT professionals were personally interviewed regarding their perceptions and attitudes toward wireless security. In an effort to compare IT professional and end user opinions, 30 IT professionals also completed a paper based survey regarding their perceptions about security. Findings indicate that security professionals are very optimistic for the future of wireless computing. However, that optimism is tempered by a realization that there are a myriad of potential threats that might exploit weakness in wireless security.
520
$a
To determine differences and similarities between users' perspectives and managers' perspectives regarding wireless network security, the results from the survey and case study were synthesized. Most IT professionals (76.19%) reported that, all factors considered, they prefer to use wired networks as opposed to wireless networks; whereas, substantially fewer (44.86%) of the end user respondents reported that they preferred wired over wireless networks. Overall, results suggest that IT professionals are more concerned about security than are end users. However, a challenge remains to make administrators and users aware of the full effect of security threats present in the wireless computing paradigm.
590
$a
School code: 0132.
650
4
$a
Business Administration, Management.
$3
626628
650
4
$a
Engineering, System Science.
$3
1018128
690
$a
0454
690
$a
0790
710
2 0
$a
Mississippi State University.
$3
1017550
773
0
$t
Dissertation Abstracts International
$g
67-10A.
790
$a
0132
790
1 0
$a
Arnett, Kirk P.,
$e
advisor
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3238942
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9125087
電子資源
11.線上閱覽_V
電子書
EB W9125087
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login