Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing
碩士 === 國立中正大學 === 會計與資訊科技研究所 === 101 === In 2012, the investigation of Cisco indicated that "bring your own device" (BYOD) had become a booming fans in the enterprise. Enhancing productivity and satisfaction are two main benefits of BYOD. Except for the benefits of using BYOD, the risk of...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/38343330467306609065 |
id |
ndltd-TW-101CCU00736017 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101CCU007360172015-10-13T22:08:00Z http://ndltd.ncl.edu.tw/handle/38343330467306609065 Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing 影響雲端環境下自攜式設備的資安管理機制建構之因素探討 Jhu Jyun, Jheng 鄭竹均 碩士 國立中正大學 會計與資訊科技研究所 101 In 2012, the investigation of Cisco indicated that "bring your own device" (BYOD) had become a booming fans in the enterprise. Enhancing productivity and satisfaction are two main benefits of BYOD. Except for the benefits of using BYOD, the risk of information security still exists. In 2005, because the mobile devices of a staff had been stolen, the Boeing Company had leaked nearly 161,000 records of employers’ data. In Taiwan, a similar case also happens. In this case, a senior manager of a firm stole customers’ data by using BYOD and leaked the data after his resignation from this firm. Before he was arrested, at least 140,000 records of data were leaked. The purpose of the study is to investigate factors affecting the application and implementation of BYOD. Questionnaires were issued to collect data. The following findings can serve as references for the enterprises in their attempts to promote BYOD and establish effective strategies: 1. The information security, effort expectancy, and the quality of systems are positively and significantly related to the acceptance of using BYOD. 2. The performance expectancy and social influence are insignificant in the acceptance of using BYOD. 3. The education and training of information security are insignificant in enhancing the information security of using BYOD. 洪育忠 2013 學位論文 ; thesis 92 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中正大學 === 會計與資訊科技研究所 === 101 === In 2012, the investigation of Cisco indicated that "bring your own device" (BYOD) had become a booming fans in the enterprise. Enhancing productivity and satisfaction are two main benefits of BYOD. Except for the benefits of using BYOD, the risk of information security still exists. In 2005, because the mobile devices of a staff had been stolen, the Boeing Company had leaked nearly 161,000 records of employers’ data. In Taiwan, a similar case also happens. In this case, a senior manager of a firm stole customers’ data by using BYOD and leaked the data after his resignation from this firm. Before he was arrested, at least 140,000 records of data were leaked.
The purpose of the study is to investigate factors affecting the application and implementation of BYOD. Questionnaires were issued to collect data. The following findings can serve as references for the enterprises in their attempts to promote BYOD and establish effective strategies:
1. The information security, effort expectancy, and the quality of systems are positively and significantly related to the acceptance of using BYOD.
2. The performance expectancy and social influence are insignificant in the acceptance of using BYOD.
3. The education and training of information security are insignificant in enhancing the information security of using BYOD.
|
author2 |
洪育忠 |
author_facet |
洪育忠 Jhu Jyun, Jheng 鄭竹均 |
author |
Jhu Jyun, Jheng 鄭竹均 |
spellingShingle |
Jhu Jyun, Jheng 鄭竹均 Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing |
author_sort |
Jhu Jyun, Jheng |
title |
Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing |
title_short |
Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing |
title_full |
Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing |
title_fullStr |
Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing |
title_full_unstemmed |
Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing |
title_sort |
exploring factors affecting the information security management mechanism of bring-your-own devices in the environment of cloud-computing |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/38343330467306609065 |
work_keys_str_mv |
AT jhujyunjheng exploringfactorsaffectingtheinformationsecuritymanagementmechanismofbringyourowndevicesintheenvironmentofcloudcomputing AT zhèngzhújūn exploringfactorsaffectingtheinformationsecuritymanagementmechanismofbringyourowndevicesintheenvironmentofcloudcomputing AT jhujyunjheng yǐngxiǎngyúnduānhuánjìngxiàzìxiéshìshèbèidezīānguǎnlǐjīzhìjiàngòuzhīyīnsùtàntǎo AT zhèngzhújūn yǐngxiǎngyúnduānhuánjìngxiàzìxiéshìshèbèidezīānguǎnlǐjīzhìjiàngòuzhīyīnsùtàntǎo |
_version_ |
1718074068381466624 |