Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing

碩士 === 國立中正大學 === 會計與資訊科技研究所 === 101 === In 2012, the investigation of Cisco indicated that "bring your own device" (BYOD) had become a booming fans in the enterprise. Enhancing productivity and satisfaction are two main benefits of BYOD. Except for the benefits of using BYOD, the risk of...

Full description

Bibliographic Details
Main Authors: Jhu Jyun, Jheng, 鄭竹均
Other Authors: 洪育忠
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/38343330467306609065
Description
Summary:碩士 === 國立中正大學 === 會計與資訊科技研究所 === 101 === In 2012, the investigation of Cisco indicated that "bring your own device" (BYOD) had become a booming fans in the enterprise. Enhancing productivity and satisfaction are two main benefits of BYOD. Except for the benefits of using BYOD, the risk of information security still exists. In 2005, because the mobile devices of a staff had been stolen, the Boeing Company had leaked nearly 161,000 records of employers’ data. In Taiwan, a similar case also happens. In this case, a senior manager of a firm stole customers’ data by using BYOD and leaked the data after his resignation from this firm. Before he was arrested, at least 140,000 records of data were leaked. The purpose of the study is to investigate factors affecting the application and implementation of BYOD. Questionnaires were issued to collect data. The following findings can serve as references for the enterprises in their attempts to promote BYOD and establish effective strategies: 1. The information security, effort expectancy, and the quality of systems are positively and significantly related to the acceptance of using BYOD. 2. The performance expectancy and social influence are insignificant in the acceptance of using BYOD. 3. The education and training of information security are insignificant in enhancing the information security of using BYOD.