| 期刊論文1. | Hsu, P. F.、Chiang, H. Y.、Wang, C. M.(2011)。Optimal selection of international exhibition agency by using the Delphi method and AHP。Journal of Information & Optimization Sciences,32(6),1353-1369。 | 2. | Okoli, C.、Pawlowski, S. D.(2004)。The Delphi method as a research tool: an example, design considerations and applications。Information and Management,42(1),15-29。 | 3. | Khorramshahgol, R.、Moustakis. V. S.(1988)。Delphi hierarchy process (DHP): A method for priority setting derived from the delphi method and analytic hierarchy process。European Journal of Operational Research,37(3),347-354。 | 4. | Brooks, K. W.(1979)。Delphi technique: Expanding applications。North Central Association Quarterly,53(3),377-385。 | 5. | Miller, K. W.、Voas, J. M.、Hurlburt, G. F.(2012)。BYOD: Security and Privacy Considerations。IT Professional,14(5),53-55。 | 6. | Morrow, B.(2012)。BYOD security challenges: control and protect your most sensitive data。Network Security,2012(12),5-8。 | 7. | Song, Y.(2014)。"Bring Your Own Device (BYOD)" for seamless science inquiry in a primary school。Computers & Education,74,50-60。 | 8. | Bello Garba, A.、Armarego, J.、Murray, D.(2015)。Bring your own device organizational information security and privacy。ARPN Journal of Engineering and Applied Sciences,10(3),1279-1287。 | 9. | Chen, P. S.、Yen, D. C.、Lin, S. C.(2015)。The classification of information assets and risk assessment: an exploratory study using the case of C-Bank。Journal of Global Information Management,23(4),26-54。 | 10. | de Meyrick, J.(2003)。The Delphi method and health research。Health Education,103(1),7-16。 | 11. | Gessner, D.、Girao, J.、Karame, G.、Li, W.(2013)。Towards a user-friendly security-enhancing BYOD solution。NEC Technical Journal,7(3),113。 | 12. | Di Zio, S.、Maretti, M.(2014)。Acceptability of energy sources using an integration of the Delphi method and the analytic hierarchy process。Quality & Quantity,48(6),2973-2991。 | 13. | Hsu, P. F.、Tsai, C. W.、Chen, K. C.(2014)。Optimizing the host of a travel program for commercial tv stations by using the AHP and sensitivity analysis。International Journal of Decision Support System Technology,6(3),30-42。 | 14. | Ghosh, A.、Gajar, P. K.、Rai, S.(2013)。Bring your own device (BYOD): security risks and mitigating strategies。Journal of Global Research in Computer Science,4(4),62-70。 | 15. | Kumar, R.、Singh, H.(2015)。A proactive procedure to mitigate the BYOD risks on the security of an information system。ACM SIGSOFT Software Engineering Notes,40(1),1-4。 | 16. | Kim, T. E.、Gausdal, A. H.(2017)。Leading for safety: a weighted safety leadership model in shipping。Reliability Engineering & System Safety,165,458-466。 | 17. | Jaramillo, D.、Katz, N.、Bodin, B.、Tworek, W.、Smart, R.、Cook, T.(2013)。Cooperative solutions for bring your own device (BYOD)。IBM Journal of Research and Development,57(6),(5)1-(5)11。 | 18. | Leavitt, N.(2013)。Today's mobile security requires a new approach。Computer,46(11),16-19。 | 19. | Lin, S. C.、Chen, P. C.、Chang, C.(2014)。A novel method of mining network flow to detect P2P botnets。Peer-to-Peer Networking and Applications,7(4),645-654。 | 20. | Marshall, S.(2014)。IT consumerization: A case study of BYOD in a healthcare setting。Technology Innovation Management Review,4(3)。 | 21. | Mansfield Devine, S.(2012)。Interview: BYOD and the enterprise network。Computer fraud & security,2012(4),14-17。 | 22. | Mooney, J. L.、Parham, A. G.、Cairney, T. D.(2014)。Mobile risks demand c-suite action!。Journal of Corporate Accounting & Finance,25(5),13-24。 | 23. | Min, J. C. H.(2016)。Guiding the guides: developing indicators of tour guides' service quality。Total Quality Management & Business Excellence,27(9/10),1043-1062。 | 24. | Romer, H.(2014)。Best practices for BYOD security。Computer Fraud & Security,2014(1),13-15。 | 25. | Singh, N.(2012)。BYOD Genie is Out of the Bottle: 'Devil or Angel'。Journal of Business Management & Social Sciences Research,1(3),1-12。 | 26. | Song, M.、Lee, K.(2014)。Proposal of MDM management framework for BYOD use of large companies。International Journal of Smart Home,8(1),123-128。 | 27. | Ullman, E.(2011)。BYOD and security。Technology & Learning,31(8),32-36。 | 28. | Tokuyoshi, B.(2013)。The security implications of BYOD。Network Security,2013(4),12-13。 | 29. | Thomson, G.(2012)。BYOD: enabling the chaos。Network Security,2012(2),5-8。 | 30. | Green, B.、Jones, M.、Hughes, D.、Williams, A.(1999)。Applying the Delphi technique in a study of GPs' information requirements。Health and Social Care in the Community,7(3),198-205。 | 31. | Murry, John W. Jr.、Hammons, James O.(1995)。Delphi: A Versatile Methodology for Conducting Qualitative Research。The Review of Higher Education,18(4),423-436。 | 32. | Dalkey, Norman C.、Helmer, Olaf(1963)。An Experimental Application of the Delphi Method to the Use of Experts。Management Science,9(3),458-467。 | 33. | Holden, Michael C.、Wedman, John F.(1993)。Future issues of computer-mediated communication: The results of a Delphi study。Educational Technology Research and Development,41(4),5-24。 | 會議論文1. | Loose, M.、Weeger, A.、Gewald, H.(2013)。BYOD: The Next Big Thing in Recruiting? Examining the Determinants of BYOD Service Adoption Behavior from the Perspective of Future Employees。19th Americas Conference on Information Systems--Hyperconnected world: anything, anywhere, anytime,(會議日期: 15-17 August, 2013)。Chicago, Illinois。634-645。 | 2. | Bisdikian, C.、Mitschang, B.、Pedreschi, D.、Tseng, V. S.、Bettini, C.(2011)。Challenges for mobile data management in the era of cloud and social computing。The 2011 12th IEEE International Conference on Mobile Data Management,6。 | 3. | Copeland, R.、Crespi, N.(2012)。Establishing enterprise business context (eBC) for service policy decision in mobile broadband networks。2012 21st International Conference on the Computer Communications and Networks。 | 4. | Copeland, R.、Crespi, N.(2012)。Analyzing consumerization: Should enterprise business context determine session policy?。2012 16th International Conference on the Intelligence in Next Generation Networks。 | 5. | Eslahi, M.、Naseri, M. V.、Hashim, H.、Tahir, N. M.、Saad, E. H. M.(2014)。BYOD: current state and security challenges。2014 IEEE Symposium on Computer Applications and Industrial Electronics,(會議日期: 7-8 April, 2014)。Penang。 | 6. | Marques, P.、Simoes, P.、Silva, L.、Boavida, F.、Silva, J.(2001)。Providing applications with mobile agent technology。OPENARCH 2001,(會議日期: 2001/04/27-04/28)。 | 7. | Pogarcic, I.、Gligora Markovic, M.、Davidovic, V.(2013)。BYOD: a challenge for the future digital generation。2013 36th International Convention on the Information & Communication Technology Electronics & Microelectronics,(會議日期: May 20-24, 2013)。Opatija。 | 8. | Scarfo, A.(2012)。New security perspectives around BYOD。The 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications,(會議日期: Nov 12-14, 2012)。Victoria:IEEE Computer Society。446-451。 | 研究報告1. | Redman, P.、Girard, J.、Wallin, L.-O.(2011)。Magic quadrant for mobile device management software。 | 2. | Ponemon Institute LLC(2014)。The cost of insecure mobile devices in the workplace。 | 圖書1. | Tornatzky, L. G.、Fleischer, M.(1990)。The Process of Technological Innovation。Lexington, MA:Lexington Books。 | 2. | Laudon, K. C.、Laudon, J. P.(2000)。Management Information Systems: Organization and Technology in the Networked Enterprise。Prentice Hall。 | 3. | Ackerman, A. S.、Krupp, M. L.(2012)。Five components to consider for BYOT/BYOD。International Association for Development of the Information Society。 | 4. | Mallick, M.、Long, C.(2003)。Mobile and wireless design essentials。Robert Ipsen。 | 5. | Stoneburner, G.、Goguen, A.、Feringa, A.(2001)。Risk management guide for information technology systems。National Institute of Standards and Technology。 | 6. | Standard and Poor's(2007)。Public Finance Criteria。New York:Standard & Poor's。 | 7. | Skipper, H. D.(1998)。International risk and insurance: an environmental-managerial approach。Chicago, IL:Irwin/McGraw-Hill。 | 8. | Dalkey, Norman C.(1969)。The Delphi Method: An Experimental Study of Group Opinion。Rand Corporation。 | 9. | Likert, Rensis(1932)。A Technique for the Measurement of Attitudes。 | 10. | Delbecq, Andre L.、Van de Ven, Andrew H.、Gustafson, David H.(1975)。Group Techniques for Program Planning: A Guide to Nominal Groups and Delphi Process。Scott Foresman & Company。 | 11. | Saaty, Thomas L.(1980)。The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation。McGraw-Hill。 | 其他1. | InformationWeek(2012)。2012 State of mobile security,http://reports.informationweek.com/abstract/18/8792/Mobility-Wireless/research-2012-state-of-mobile-security.html?cid=rpt_cync。 | 2. | Madden, B.(2012)。What is MDM, MAM, and MIM? (And what's the difference?),http://www.brianmadden.com/blogs/brianmadden/archive/2012/05/29/whatis-mdm-mam-and-mim-and-what-s-the-difFerence.aspx。 | 3. | Security for Business Innovation Council(2012)。Security for business innovation council report paper presented at the RSA conference EUROPE LONDON 2012,http://www.emc.com/about/news/press/2012/20121009-02.htm, 。 | 圖書論文1. | Parente, F.、Anderson-Parente, J.(1987)。Delphi inquiry systems。Judgmental Forecasting。New York:John Wiley and Sons。 | 2. | Cao, P.、Tang, G. C.、Zhang, Y.、Luo, Z. Q.(2014)。Qualitative evaluation of software reliability considering many uncertain factors。Ecosystem Assessment and Fuzzy Systems Management。Springer International Publishing。 | |
| |