A RESEARCH ON THE IMPLEMENTATION OF ENTERPRISE BYOD POLICY

碩士 === 大同大學 === 資訊經營學系(所) === 103 === The concept of Bring Your Own Device (BYOD) has been gaining its popularity and forming a trend in modern business operation. Along with BYOD, many issues arise regarding device management and data security. Businesses are concerned about that personal devices c...

Full description

Bibliographic Details
Main Authors: Nai-ching Chao, 趙乃青
Other Authors: Patrick S. Chen
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/22752946247809093913
Description
Summary:碩士 === 大同大學 === 資訊經營學系(所) === 103 === The concept of Bring Your Own Device (BYOD) has been gaining its popularity and forming a trend in modern business operation. Along with BYOD, many issues arise regarding device management and data security. Businesses are concerned about that personal devices can be lost and the confidential information contained in them can be compromised, leading to serious problem. Facing the challenges brought forth by the inclusion of personal devices in the business environment, especially equipment mobilization and personal use, addressing the issues of effective management of confidential information and prevention of its breach is the main purpose of this study. This study analyzes relevant factors affecting business BYOD adoption by consulting available literature and protective techniques in practical use. We summarize BYOD strategic guidelines and impacting factors through expert opinions. The factors are grouped into four different data security management constructs: Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Information Management (MIM), and Enterprise Risk Management (ERM).We collect core research elements through interviews with experts and analyze their opinions using Modified Delphi Hierarchy Process (MDHP). Conditions of transferring research ideas into ipractice are also provided. The priorities of the enterprise BYOD implementation can be listed in the following order: MIM, MDM, ERM, and MAM. This shows that MIM deserves our special attention. In the MIM construct, the most important factor is data protection, showing that sensitive information needs special protection. Other recommendations include strengthening enterprise internal information security policies, effective action to strengthen identity verification and access control equipments, and better application control through information security policy, practices of institutionalization and implementation of identity authentication.