Announcement for Downloading full text filePlease respect the Copyright Act.
All digital full text dissertation and theses from this website are authorized the copyright owners. These copyrighted full-text dissertation and theses can be only used for academic, research and non-commercial purposes. Users of this website can search, read, and print for personal usage. In respect of the Copyright Act of the Republic of China, please do not reproduce, distribute, change, or edit the content of these dissertations and theses without any permission. Please do not create any work based upon a pre-existing work by reproduction, Adaptation, Distribution or other means.
URN etd-0211115-141303 Statistics This thesis had been viewed 1723 times. Download 615 times. Author Nai-ching Chao Author's Email Address No Public. Department Information Management Year 2014 Semester 1 Degree Master Type of Document Master's Thesis Language zh-TW.Big5 Chinese Page Count 98 Title A RESEARCH ON THE IMPLEMENTATION OF ENTERPRISE BYOD POLICY Keyword Hierarchy Analytic Method Delphi Method BYOD Mobile Iinformation Management Mobile Device Management Mobile Application Manageent Mobile Application Manageent Mobile Device Management Mobile Iinformation Management BYOD Delphi Method Hierarchy Analytic Method Abstract The concept of Bring Your Own Device (BYOD) has been gaining its popularity and forming a trend in modern business operation. Along with BYOD, many issues arise regarding device management and data security. Businesses are concerned about that personal devices can be lost and the confidential information contained in them can be compromised, leading to serious problem. Facing the challenges brought forth by the inclusion of personal devices in the business environment, especially equipment mobilization and personal use, addressing the issues of effective management of confidential information and prevention of its breach is the main purpose of this study. This study analyzes relevant factors affecting business BYOD adoption by consulting available literature and protective techniques in practical use. We summarize BYOD strategic guidelines and impacting factors through expert opinions. The factors are grouped into four different data security management constructs: Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Information Management (MIM), and Enterprise Risk Management (ERM).We collect core research elements through interviews with experts and analyze their opinions using Modified Delphi Hierarchy Process (MDHP). Conditions of transferring research ideas into ipractice are also provided. The priorities of the enterprise BYOD implementation can be listed in the following order: MIM, MDM, ERM, and MAM. This shows that MIM deserves our special attention. In the MIM construct, the most important factor is data protection, showing that sensitive information needs special protection. Other recommendations include strengthening enterprise internal information security policies, effective action to strengthen identity verification and access control equipments, and better application control through information security policy, practices of institutionalization and implementation of identity authentication. Advisor Committee Patrick S. Chen - advisor
none - co-chair
Shu-Chiung Lin - co-chair
Files Date of Defense 2015-01-27 Date of Submission 2015-02-11