Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing

碩士 === 國立中正大學 === 會計與資訊科技研究所 === 101 === In 2012, the investigation of Cisco indicated that "bring your own device" (BYOD) had become a booming fans in the enterprise. Enhancing productivity and satisfaction are two main benefits of BYOD. Except for the benefits of using BYOD, the risk of...

Full description

Bibliographic Details
Main Authors: Jhu Jyun, Jheng, 鄭竹均
Other Authors: 洪育忠
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/38343330467306609065
id ndltd-TW-101CCU00736017
record_format oai_dc
spelling ndltd-TW-101CCU007360172015-10-13T22:08:00Z http://ndltd.ncl.edu.tw/handle/38343330467306609065 Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing 影響雲端環境下自攜式設備的資安管理機制建構之因素探討 Jhu Jyun, Jheng 鄭竹均 碩士 國立中正大學 會計與資訊科技研究所 101 In 2012, the investigation of Cisco indicated that "bring your own device" (BYOD) had become a booming fans in the enterprise. Enhancing productivity and satisfaction are two main benefits of BYOD. Except for the benefits of using BYOD, the risk of information security still exists. In 2005, because the mobile devices of a staff had been stolen, the Boeing Company had leaked nearly 161,000 records of employers’ data. In Taiwan, a similar case also happens. In this case, a senior manager of a firm stole customers’ data by using BYOD and leaked the data after his resignation from this firm. Before he was arrested, at least 140,000 records of data were leaked. The purpose of the study is to investigate factors affecting the application and implementation of BYOD. Questionnaires were issued to collect data. The following findings can serve as references for the enterprises in their attempts to promote BYOD and establish effective strategies: 1. The information security, effort expectancy, and the quality of systems are positively and significantly related to the acceptance of using BYOD. 2. The performance expectancy and social influence are insignificant in the acceptance of using BYOD. 3. The education and training of information security are insignificant in enhancing the information security of using BYOD. 洪育忠 2013 學位論文 ; thesis 92 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中正大學 === 會計與資訊科技研究所 === 101 === In 2012, the investigation of Cisco indicated that "bring your own device" (BYOD) had become a booming fans in the enterprise. Enhancing productivity and satisfaction are two main benefits of BYOD. Except for the benefits of using BYOD, the risk of information security still exists. In 2005, because the mobile devices of a staff had been stolen, the Boeing Company had leaked nearly 161,000 records of employers’ data. In Taiwan, a similar case also happens. In this case, a senior manager of a firm stole customers’ data by using BYOD and leaked the data after his resignation from this firm. Before he was arrested, at least 140,000 records of data were leaked. The purpose of the study is to investigate factors affecting the application and implementation of BYOD. Questionnaires were issued to collect data. The following findings can serve as references for the enterprises in their attempts to promote BYOD and establish effective strategies: 1. The information security, effort expectancy, and the quality of systems are positively and significantly related to the acceptance of using BYOD. 2. The performance expectancy and social influence are insignificant in the acceptance of using BYOD. 3. The education and training of information security are insignificant in enhancing the information security of using BYOD.
author2 洪育忠
author_facet 洪育忠
Jhu Jyun, Jheng
鄭竹均
author Jhu Jyun, Jheng
鄭竹均
spellingShingle Jhu Jyun, Jheng
鄭竹均
Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing
author_sort Jhu Jyun, Jheng
title Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing
title_short Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing
title_full Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing
title_fullStr Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing
title_full_unstemmed Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing
title_sort exploring factors affecting the information security management mechanism of bring-your-own devices in the environment of cloud-computing
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/38343330467306609065
work_keys_str_mv AT jhujyunjheng exploringfactorsaffectingtheinformationsecuritymanagementmechanismofbringyourowndevicesintheenvironmentofcloudcomputing
AT zhèngzhújūn exploringfactorsaffectingtheinformationsecuritymanagementmechanismofbringyourowndevicesintheenvironmentofcloudcomputing
AT jhujyunjheng yǐngxiǎngyúnduānhuánjìngxiàzìxiéshìshèbèidezīānguǎnlǐjīzhìjiàngòuzhīyīnsùtàntǎo
AT zhèngzhújūn yǐngxiǎngyúnduānhuánjìngxiàzìxiéshìshèbèidezīānguǎnlǐjīzhìjiàngòuzhīyīnsùtàntǎo
_version_ 1718074068381466624