Exploring Factors Affecting The Information Security Management Mechanism of Bring-Your-Own Devices in the Environment of Cloud-Computing
碩士 === 國立中正大學 === 會計與資訊科技研究所 === 101 === In 2012, the investigation of Cisco indicated that "bring your own device" (BYOD) had become a booming fans in the enterprise. Enhancing productivity and satisfaction are two main benefits of BYOD. Except for the benefits of using BYOD, the risk of...
Main Authors: | Jhu Jyun, Jheng, 鄭竹均 |
---|---|
Other Authors: | 洪育忠 |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/38343330467306609065 |
Similar Items
-
Bring Your Own Device
by: Muñoz, Rodrigo, et al.
Published: (2012) -
Mobile Device Security : Exploring the possibilities and limitations with Bring Your Own Device (BYOD)
by: Svensk, Kristoffer
Published: (2013) -
A Review of Bring Your Own Device on Security Issues
by: Morufu Olalere, et al.
Published: (2015-04-01) -
Bring Your Own Device - Säkerhetsaspekter
by: Knutas, Sofie
Published: (2014) -
BRING YOUR OWN DEVICE (BYOD) VS. CHOOSE YOUR OWN DEVICE (CYOD)
by: Ştefan Iovan, et al.
Published: (2018-11-01)