:::

詳目顯示

回上一頁
題名:BYOD導入企業之關鍵管理因素:組織資訊安全管理觀點
書刊名:資訊管理學報
作者:陳志誠 引用關係林淑瓊 引用關係劉用貴趙乃青
作者(外文):Chen, Patrick ShichengLin, Shu-chiungLiu, Yong-kueiChao, Nai-ching
出版日期:2018
卷期:25:1
頁次:頁89-119
主題關鍵詞:攜帶自有行動設備行動資訊管理行動裝置管理資料防護BYODBring your own deviceMobile information managementMobile device managementData protection
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:9
期刊論文
1.Hsu, P. F.、Chiang, H. Y.、Wang, C. M.(2011)。Optimal selection of international exhibition agency by using the Delphi method and AHP。Journal of Information & Optimization Sciences,32(6),1353-1369。  new window
2.Okoli, C.、Pawlowski, S. D.(2004)。The Delphi method as a research tool: an example, design considerations and applications。Information and Management,42(1),15-29。  new window
3.Khorramshahgol, R.、Moustakis. V. S.(1988)。Delphi hierarchy process (DHP): A method for priority setting derived from the delphi method and analytic hierarchy process。European Journal of Operational Research,37(3),347-354。  new window
4.Brooks, K. W.(1979)。Delphi technique: Expanding applications。North Central Association Quarterly,53(3),377-385。  new window
5.Miller, K. W.、Voas, J. M.、Hurlburt, G. F.(2012)。BYOD: Security and Privacy Considerations。IT Professional,14(5),53-55。  new window
6.Morrow, B.(2012)。BYOD security challenges: control and protect your most sensitive data。Network Security,2012(12),5-8。  new window
7.Song, Y.(2014)。"Bring Your Own Device (BYOD)" for seamless science inquiry in a primary school。Computers & Education,74,50-60。  new window
8.Bello Garba, A.、Armarego, J.、Murray, D.(2015)。Bring your own device organizational information security and privacy。ARPN Journal of Engineering and Applied Sciences,10(3),1279-1287。  new window
9.Chen, P. S.、Yen, D. C.、Lin, S. C.(2015)。The classification of information assets and risk assessment: an exploratory study using the case of C-Bank。Journal of Global Information Management,23(4),26-54。  new window
10.de Meyrick, J.(2003)。The Delphi method and health research。Health Education,103(1),7-16。  new window
11.Gessner, D.、Girao, J.、Karame, G.、Li, W.(2013)。Towards a user-friendly security-enhancing BYOD solution。NEC Technical Journal,7(3),113。  new window
12.Di Zio, S.、Maretti, M.(2014)。Acceptability of energy sources using an integration of the Delphi method and the analytic hierarchy process。Quality & Quantity,48(6),2973-2991。  new window
13.Hsu, P. F.、Tsai, C. W.、Chen, K. C.(2014)。Optimizing the host of a travel program for commercial tv stations by using the AHP and sensitivity analysis。International Journal of Decision Support System Technology,6(3),30-42。  new window
14.Ghosh, A.、Gajar, P. K.、Rai, S.(2013)。Bring your own device (BYOD): security risks and mitigating strategies。Journal of Global Research in Computer Science,4(4),62-70。  new window
15.Kumar, R.、Singh, H.(2015)。A proactive procedure to mitigate the BYOD risks on the security of an information system。ACM SIGSOFT Software Engineering Notes,40(1),1-4。  new window
16.Kim, T. E.、Gausdal, A. H.(2017)。Leading for safety: a weighted safety leadership model in shipping。Reliability Engineering & System Safety,165,458-466。  new window
17.Jaramillo, D.、Katz, N.、Bodin, B.、Tworek, W.、Smart, R.、Cook, T.(2013)。Cooperative solutions for bring your own device (BYOD)。IBM Journal of Research and Development,57(6),(5)1-(5)11。  new window
18.Leavitt, N.(2013)。Today's mobile security requires a new approach。Computer,46(11),16-19。  new window
19.Lin, S. C.、Chen, P. C.、Chang, C.(2014)。A novel method of mining network flow to detect P2P botnets。Peer-to-Peer Networking and Applications,7(4),645-654。  new window
20.Marshall, S.(2014)。IT consumerization: A case study of BYOD in a healthcare setting。Technology Innovation Management Review,4(3)。  new window
21.Mansfield Devine, S.(2012)。Interview: BYOD and the enterprise network。Computer fraud & security,2012(4),14-17。  new window
22.Mooney, J. L.、Parham, A. G.、Cairney, T. D.(2014)。Mobile risks demand c-suite action!。Journal of Corporate Accounting & Finance,25(5),13-24。  new window
23.Min, J. C. H.(2016)。Guiding the guides: developing indicators of tour guides' service quality。Total Quality Management & Business Excellence,27(9/10),1043-1062。  new window
24.Romer, H.(2014)。Best practices for BYOD security。Computer Fraud & Security,2014(1),13-15。  new window
25.Singh, N.(2012)。BYOD Genie is Out of the Bottle: 'Devil or Angel'。Journal of Business Management & Social Sciences Research,1(3),1-12。  new window
26.Song, M.、Lee, K.(2014)。Proposal of MDM management framework for BYOD use of large companies。International Journal of Smart Home,8(1),123-128。  new window
27.Ullman, E.(2011)。BYOD and security。Technology & Learning,31(8),32-36。  new window
28.Tokuyoshi, B.(2013)。The security implications of BYOD。Network Security,2013(4),12-13。  new window
29.Thomson, G.(2012)。BYOD: enabling the chaos。Network Security,2012(2),5-8。  new window
30.Green, B.、Jones, M.、Hughes, D.、Williams, A.(1999)。Applying the Delphi technique in a study of GPs' information requirements。Health and Social Care in the Community,7(3),198-205。  new window
31.Murry, John W. Jr.、Hammons, James O.(1995)。Delphi: A Versatile Methodology for Conducting Qualitative Research。The Review of Higher Education,18(4),423-436。  new window
32.Dalkey, Norman C.、Helmer, Olaf(1963)。An Experimental Application of the Delphi Method to the Use of Experts。Management Science,9(3),458-467。  new window
33.Holden, Michael C.、Wedman, John F.(1993)。Future issues of computer-mediated communication: The results of a Delphi study。Educational Technology Research and Development,41(4),5-24。  new window
會議論文
1.Loose, M.、Weeger, A.、Gewald, H.(2013)。BYOD: The Next Big Thing in Recruiting? Examining the Determinants of BYOD Service Adoption Behavior from the Perspective of Future Employees。19th Americas Conference on Information Systems--Hyperconnected world: anything, anywhere, anytime,(會議日期: 15-17 August, 2013)。Chicago, Illinois。634-645。  new window
2.Bisdikian, C.、Mitschang, B.、Pedreschi, D.、Tseng, V. S.、Bettini, C.(2011)。Challenges for mobile data management in the era of cloud and social computing。The 2011 12th IEEE International Conference on Mobile Data Management,6。  new window
3.Copeland, R.、Crespi, N.(2012)。Establishing enterprise business context (eBC) for service policy decision in mobile broadband networks。2012 21st International Conference on the Computer Communications and Networks。  new window
4.Copeland, R.、Crespi, N.(2012)。Analyzing consumerization: Should enterprise business context determine session policy?。2012 16th International Conference on the Intelligence in Next Generation Networks。  new window
5.Eslahi, M.、Naseri, M. V.、Hashim, H.、Tahir, N. M.、Saad, E. H. M.(2014)。BYOD: current state and security challenges。2014 IEEE Symposium on Computer Applications and Industrial Electronics,(會議日期: 7-8 April, 2014)。Penang。  new window
6.Marques, P.、Simoes, P.、Silva, L.、Boavida, F.、Silva, J.(2001)。Providing applications with mobile agent technology。OPENARCH 2001,(會議日期: 2001/04/27-04/28)。  new window
7.Pogarcic, I.、Gligora Markovic, M.、Davidovic, V.(2013)。BYOD: a challenge for the future digital generation。2013 36th International Convention on the Information & Communication Technology Electronics & Microelectronics,(會議日期: May 20-24, 2013)。Opatija。  new window
8.Scarfo, A.(2012)。New security perspectives around BYOD。The 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications,(會議日期: Nov 12-14, 2012)。Victoria:IEEE Computer Society。446-451。  new window
研究報告
1.Redman, P.、Girard, J.、Wallin, L.-O.(2011)。Magic quadrant for mobile device management software。  new window
2.Ponemon Institute LLC(2014)。The cost of insecure mobile devices in the workplace。  new window
圖書
1.Tornatzky, L. G.、Fleischer, M.(1990)。The Process of Technological Innovation。Lexington, MA:Lexington Books。  new window
2.Laudon, K. C.、Laudon, J. P.(2000)。Management Information Systems: Organization and Technology in the Networked Enterprise。Prentice Hall。  new window
3.Ackerman, A. S.、Krupp, M. L.(2012)。Five components to consider for BYOT/BYOD。International Association for Development of the Information Society。  new window
4.Mallick, M.、Long, C.(2003)。Mobile and wireless design essentials。Robert Ipsen。  new window
5.Stoneburner, G.、Goguen, A.、Feringa, A.(2001)。Risk management guide for information technology systems。National Institute of Standards and Technology。  new window
6.Standard and Poor's(2007)。Public Finance Criteria。New York:Standard & Poor's。  new window
7.Skipper, H. D.(1998)。International risk and insurance: an environmental-managerial approach。Chicago, IL:Irwin/McGraw-Hill。  new window
8.Dalkey, Norman C.(1969)。The Delphi Method: An Experimental Study of Group Opinion。Rand Corporation。  new window
9.Likert, Rensis(1932)。A Technique for the Measurement of Attitudes。  new window
10.Delbecq, Andre L.、Van de Ven, Andrew H.、Gustafson, David H.(1975)。Group Techniques for Program Planning: A Guide to Nominal Groups and Delphi Process。Scott Foresman & Company。  new window
11.Saaty, Thomas L.(1980)。The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation。McGraw-Hill。  new window
其他
1.InformationWeek(2012)。2012 State of mobile security,http://reports.informationweek.com/abstract/18/8792/Mobility-Wireless/research-2012-state-of-mobile-security.html?cid=rpt_cync。  new window
2.Madden, B.(2012)。What is MDM, MAM, and MIM? (And what's the difference?),http://www.brianmadden.com/blogs/brianmadden/archive/2012/05/29/whatis-mdm-mam-and-mim-and-what-s-the-difFerence.aspx。  new window
3.Security for Business Innovation Council(2012)。Security for business innovation council report paper presented at the RSA conference EUROPE LONDON 2012,http://www.emc.com/about/news/press/2012/20121009-02.htm, 。  new window
圖書論文
1.Parente, F.、Anderson-Parente, J.(1987)。Delphi inquiry systems。Judgmental Forecasting。New York:John Wiley and Sons。  new window
2.Cao, P.、Tang, G. C.、Zhang, Y.、Luo, Z. Q.(2014)。Qualitative evaluation of software reliability considering many uncertain factors。Ecosystem Assessment and Fuzzy Systems Management。Springer International Publishing。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top