首頁 > 網路資源 > 大同大學數位論文系統

Title page for etd-0211115-141303


URN etd-0211115-141303 Statistics This thesis had been viewed 1811 times. Download 615 times.
Author Nai-ching Chao
Author's Email Address No Public.
Department Information Management
Year 2014 Semester 1
Degree Master Type of Document Master's Thesis
Language zh-TW.Big5 Chinese Page Count 98
Title A RESEARCH ON THE IMPLEMENTATION OF ENTERPRISE BYOD POLICY
Keyword
  • Hierarchy Analytic Method
  • Delphi Method
  • BYOD
  • Mobile Iinformation Management
  • Mobile Device Management
  • Mobile Application Manageent
  • Mobile Application Manageent
  • Mobile Device Management
  • Mobile Iinformation Management
  • BYOD
  • Delphi Method
  • Hierarchy Analytic Method
  • Abstract The concept of Bring Your Own Device (BYOD) has been gaining its popularity and forming a trend in modern business operation. Along with BYOD, many issues arise regarding device management and data security. Businesses are concerned about that personal devices can be lost and the confidential information contained in them can be compromised, leading to serious problem. Facing the challenges brought forth by the inclusion of personal devices in the business environment, especially equipment mobilization and personal use, addressing the issues of effective management of confidential information and prevention of its breach is the main purpose of this study. This study analyzes relevant factors affecting business BYOD adoption by consulting available literature and protective techniques in practical use. We summarize BYOD strategic guidelines and impacting factors through expert opinions. The factors are grouped into four different data security management constructs: Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Information Management (MIM), and Enterprise Risk Management (ERM).We collect core research elements through interviews with experts and analyze their opinions using Modified Delphi Hierarchy Process (MDHP). Conditions of transferring research ideas into ipractice are also provided. The priorities of the enterprise BYOD implementation can be listed in the following order: MIM, MDM, ERM, and MAM. This shows that MIM deserves our special attention. In the MIM construct, the most important factor is data protection, showing that sensitive information needs special protection. Other recommendations include strengthening enterprise internal information security policies, effective action to strengthen identity verification and access control equipments, and better application control through information security policy, practices of institutionalization and implementation of identity authentication.
    Advisor Committee
  • Patrick S. Chen - advisor
  • none - co-chair
  • Shu-Chiung Lin - co-chair
  • Files indicate access worldwide
    Date of Defense 2015-01-27 Date of Submission 2015-02-11


    Browse | Search All Available ETDs