• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 25
  • 11
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 50
  • 21
  • 16
  • 16
  • 16
  • 14
  • 14
  • 13
  • 12
  • 12
  • 10
  • 10
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Mobiltelefoner inom vuxenutbildning : Integrerade i undervisningen eller ett störningsmoment?

Englund, Petra January 2017 (has links)
Mobiltelefonens mångfacettering erbjuder många möjligheter inom studier, men även flera utmaningar. Den här studien har utgått ifrån en sociokulturell teori om lärande, där det endast går att förstå eller undersöka människors tänkande eller kunskaper genom en analys av språk och handlingar, i relation till sociala och kulturella resurser som används av människan. I detta fall mobiltelefoner. Studien baserades i uppbyggnaden av fallstudier, då det som undersökts är ”hur” och ”varför” ett aktuellt skeende i ett konkret socialt sammanhang ser ut som det gör. Studiengenomfördes även med influenser av symbolisk interaktionism, detta då mänsklig interaktion sker bland annat med hjälp av symboler och mobiltelefonen i sig kan ses som en symbol, likväl som denger tillgång till andra symboler. Då en djupare förståelse för attityderna och uppfattningarna rörande mobilanvändandet i sociala sammanhang eftersträvades var denna studie kvalitativ och utfördes med semistrukturerade intervjuer som metod för insamling av data. Intervjupersonerna kan både se för- och nackdelar med att använda mobiltelefoner i studier, bland annat mobiltelefonens lättillgänglighet och mobilitet, men även det negativa i att olika sociala medier kan pocka på uppmärksamheten och störa koncentrationen både för mobiltelefonens ägare och även andra personer i dess närhet. Dock välkomnas teknik som kan förenkla studierna, men mobiltelefonen i dag saknar anpassning till detta, vilket gör att den därmed inte är en självklar del inom utbildning och studier. / <p>Godkännande datum: 2017-06-02</p>
32

Návrh metodiky pro zavedení systému správy mobilních zařízení v prostředí BYOD / Design of methodology for implementation of mobile device management in a BYOD environment

Andraščík, Jan January 2012 (has links)
This master thesis is focused on topic of using mobile devices in work environment of enterprises, specifically on using mobile devices owned by employees. The thesis is divided into two parts. First part of the thesis describes benefits and risks of using mobile devices in enterprises while allowing usage of mobile devices owned by employees and compares individual mobile platforms in terms of security. Also there is a comparison of individual mobile devices management solutions in terms of security in this part of the thesis. Second part of the thesis is focused on methodology of mobile devices implementation in enterprises and their security. Methodology describes activities required for implementation of mobile devices in enterprises. At the end of this part there are security recommendations which are suitable to apply to mobile devices in enterprises.
33

Strategies That Mitigate IT Infrastructure Demands Produced by Student BYOD Usa

Dunne, Martha 01 January 2019 (has links)
The use of bring your own devices (BYOD) is a global phenomenon, and nowhere is it more evident than on a college campus. The use of BYOD on academic campuses has grown and evolved through time. The purpose of this qualitative multiple case study was to identify the successful strategies used by chief information officers (CIOs) to mitigate information technology infrastructure demands produced by student BYOD usage. The diffusion of innovation model served as the conceptual framework. The population consisted of CIOs from community colleges within North Carolina. The data collection process included semistructured, in-depth face-to-face interviews with 9 CIOs and the analysis of 25 documents, all from participant case organizations. Member checking was used to increase the validity of the findings. During the data analysis phase, the data were coded, sorted, queried, and analyzed obtained from semistructured interviews and organizational documentation with NVivo, a qualitative data analysis computer software package. Through methodological triangulation, 3 major themes emerged from the study: the importance of technology management tools, the importance of security awareness training, and the importance of BYOD security policies and procedures. These themes highlight successful strategies employed by CIOs. The implications for positive social change as a result of this study include creating a more positive experience for students interacting with technology on campus. Effects on social change will also arise by increasing a student's mindfulness through security awareness programs, which will empower the student to take more control of their online presence and as they pass that information along to family and friends.
34

Bring your own device - a concern for organizations? : A thesis about tech organizations awareness and management of smartwatches

Gustavsson, Simon, Årman, Fredrik January 2020 (has links)
With 5G around the corner and an overall increase in a faster and more stable internet connection, the future of Internet of Things (IoT) looks bright. There is a steady increase in the development of IoT devices, such as the smartwatch, and a high increase in usage of IoT, both by organizations and private citizens. Organizational managing of a smartwatch falls under the “Bring your own device” (BYOD) policy which allows employees to do work on their private devices. It appears to be a lack of knowledge in organizations on how to manage IoT devices both regarding policies and technical IT security. There has been an increase in malware attacks against IoT devices, and compromised smartwatches could be used to gain unauthorized access to organizations’ networks. The smartwatch is a common and powerful IoT device and will be used as an example in this thesis which purpose is to examine how organizations’ perceive and manage IoT devices, focusing on the smartwatch in order to gain insight regarding whether IoT devices such as the smartwatch is an area of concern within organizations. To understand the smartwatch, understanding IoT first will be important. The literature review delves into both IoT and smartwatch functionality and security. It looks at the BYOD policy and technical IT security solutions regarding the smartwatch. The review pointed to there being IT security issues with smartwatches and that implementing a BYOD policy increases productivity but increases the risk of malware attacks from and against the allowed devices. To fulfill the thesis purpose, qualitative interviews with high ranking IT security personnel at tech organizations were performed, thematized, and analyzed. The most prominent results are discussed; if the smartwatch is a threat and possible technical solutions for prevention, the organizations customer businesses IT security level, and BYOD policy. The results from the thesis showed that the organizations had a high awareness of the smartwatch and the IT security risks brought with it. They all had BYOD policies to restrict/limit access for the smartwatch’s access to their internal networks and a set of technical solutions to prevent breaches in the IT infrastructure and to detect if there had been a breach. The informants claimed that their organizations’ awareness regarding the smartwatch and the concerning IT security was higher than many of their customer businesses, which makes for an interesting subject for future research. How can these organizations reach the same level of awareness? / Med 5G runt hörnet och en generell ökning av både snabbare och stabilare internet så ser framtiden för Internet of Things (IoT) ljus ut. Det pågår en stadig ökning i utvecklingen av IoT-enheter såsom smartklockan, samtidigt som en användandet av IoT ökar både på företag och hos privatpersoner. En verksamhets hantering av smartklockan hamnar under policyn ”Bring your own device” (BYOD) vilket tillåter anställda att använda sina privata enheter i jobbrelaterat syfte. Det verkar finnas en kunskapsbrist hos verksamheter avseende hur man hanterar IoT-enheter, både gällande policy och teknisk IT-säkerhet. Det har skett en ökning av malware attacker (skadlig kod) mot IoT-enheter och en kompromissad smartklocka kan potentiellt användas för att få otillbörlig åtkomst till en verksamhets nätverk. Smartklockan är en vanlig och kraftfull IoT-enhet och kommer att användas som exempel i den här uppsatsen. Syftet med uppsatsen är att undersöka hur verksamheter uppfattar och hanterar IoT-enheter med fokus på smartklockan, för att ta reda på om IoT-enheter såsom smartklockan är ett område som verksamheter arbetar med. För att förstå smartklockan så är det viktigt att först förstå IoT. I litteraturstudien redogörs både IoT och smartklockors funktionalitet samt säkerhetsaspekter. Vidare beskrivs även BYOD policy och tekniska IT-säkerhetslösningar gällande smartklockan. Litteraturstudien pekade på att det existerar IT-säkerhetsproblem med smartklockan och att implementera en BYOD policy kan öka verksamhetens produktivitet men även öka riskerna med malware attacker, både mot och från de tillåtna enheterna. För att uppfylla uppsatsens syfte utfördes kvalitativa intervjuer med högt uppsatt IT-säkerhetspersonal på IT-orienterade verksamheter, som sedan tematiserades och analyserades. De mest relevanta resultaten diskuteras, avseende smartklockan som ett hot och de relaterade tekniska lösningarna, verksamheternas kundföretags IT-säkerhetsnivå och BYOD policyn. De empiriska resultaten från uppsatsen visade att verksamheterna som intervjuades hade en hög medvetenhet relaterat till smartklockan och de IT-säkerhetsproblem som den kan medföra. Alla verksamheterna hade en BYOD policy för att begränsa/förbjuda smartklockans åtkomst till deras interna nätverk, samt ett par tekniska lösningar för att förebygga intrång i deras IT-infrastruktur och för att upptäcka om ett intrång redan skett. Informanterna påstod att deras verksamheters medvetenhet kring smartklockan och den relaterade IT-säkerheten var högre kontra flera av deras kundföretags, vilket är ett relevant ämne för framtida forskning. Hur kan dessa verksamheter nå upp till samma nivå av medvetenhet?
35

Pojetí digitálního vzdělávání na 1. stupni ZŠ a jeho akceptace mezi žáky / The understanding of digital education on elementary school and its cceptance amongs the pupils

Hovorková, Michaela January 2019 (has links)
5 ABSTRACT The diploma thesis deals with the topic of digital education at primary school and its acceptance among pupils. The project is an inspiring attempt to link formal and informal education in the learning process. This study has become an inspiration for making digital teaching more effective and developing digital literacy for primary school pupils. The theoretical part is divided into three main chapters, which deal with the area of cognitive development of early school age children, digital education and digital technologies used in teaching. The knowledge from the professional literature in the theoretical part is the basis for the practical part, which through the creation of two educational geolocation games researches the development of individual digital competencies on a sample of two classes. The aim of this work is to find out how digital literacy and its individual competences can be developed in the primary school with respect to the age and cognitive development of pupils. On the basis of qualitative research in the form of observation, field notes and recording sheets, it was possible to analyze the basic level of development of individual digital competencies at elementary schools. The output is a description and evaluation of the possibility of development of digital literacy and...
36

BYOD之B2B策略行銷-以S公司為例之4C架構觀點 / B2B Marketing Strategy of BYOD - A Case of 4C Analysis of S Company

郭順良, Guo,Shuen Liang Unknown Date (has links)
根據資策會的研究顯示,網際網路與行動通訊技術的整合是2010年至2030年最大的商機。各種網路應用與服務將逐步轉換至行動網路上,這項被各方期待的殺手級應用,成為驅動台灣未來十年之通訊及電信產業,突破新台幣2兆元大關的重要關鍵。 隨著網路寬頻化的發展日益成熟,未來專業行動工作者將能享有結合語音通訊。視訊及其他新興應用的嶄新網路服務。同時,由於M化(Mobility)兼具機動性與即時性,因此企業一旦M化後,將可以透過無線網路的傳輸,讓員工不受時空限制,隨時安全地取得公司資訊,作最迅速的處理,為企業帶來營運效率、客戶服務品質的提昇並降低總成本等效益。 在此資通訊整合之下員工攜帶自己的行動裝置上班(BYOD, Bring Your Own Device)的趨勢因應而生。BYOD是一種另類策略,讓員工、企業夥伴與其他用戶可使用個人所選購的客端裝置,執行企業應用程式與讀取資料。對多數企業而言,適用於BYOD方案的裝置目前僅限於智慧型手機和平板電腦。 S公司是該3C產業中最具競爭力成長最快速的企業。該公司藉由其在資訊產品及智慧型行動裝置產品在取得技術優勢之際積極的往行動化整體解決方案(Mobility Total Solution)延伸,提出BYOD整體解決方案。本文係針對該公司對此BYOD的策略行銷進行探討研究出以下結果: 一、BYOD的解決方案處於生命週期的萌芽期,該產業面臨資通訊技術整的問題。企業對於導入該解決方案,仍然面臨企業資訊安全及管理的挑戰。 二、S公司的行動化產品正處於高度成長的階段,在BYOD的B2B經營模式需要擺脫 B2B的成功模式。 三、以策略行銷4C理論分析出S公司的競爭優勢。 四、針對S公司的B2B經營模式提出可行的建議方案。 BYOD從生命週期的角度來看,尚在初期的萌芽階段。雖然行動載具的種類及功能日新月異,技術演進快速但企業對於BYOD在資產管理及資訊安全的控管上仍無完整的解決之道。期望本論文提出的相關策略性想法也能夠引發業界對於BYOD的相關服務提供者的整合性的策略思考方向。
37

Program för digitala prov : Och hur programmet möter kraven som ställs när det används i gymnasieskolan

Jackson, Marcus January 2018 (has links)
Under de senaste två årtionden har det blivit en drastisk ökning av privat ägda laptops. Detta har öppnat för nya möjligheter som bring your own device (BYOD) digitala prov i skolan. Men med detta blir nedlåsning av datorn inför digitalt prov ännu viktigare. Undersökningar har gjorts gällande elevernas uppfattning kring digitala provsystem samt deras åsikter om digitala prov i allmänhet. Andra arbeten har gjorts gällande hur digitala provsystem fungerar tekniskt men samtidigt finns det artiklar som visar hur viktig lärarnas åsikter är. Därför kommer detta arbete definiera kraven som de krav som lärare har för att undersöka deras perspektiv, inte på det digitala prov eller provsystem som andra arbeten utan på nedlåsningsprogrammet för datorn vilket bidrar med information i ett nytt perspektiv. Detta görs genom insamling av enkäter från lärarna på en gymnasieskola för att definiera krav. Dessa krav ställs sedan mot vanligt använda nedlåsningsprogram för att svara på hur de klarar av de krav som lärare har. Resultatet av detta visar att nedlåsningsprogrammen inte uppfyller alla krav som lärarna ställer. Dock vid undersökning av de krav som underkändes bedöms nedlåsningsprogrammen leva upp till en majoritet av lärarnas krav då anpassade lösningar och vikten av olika krav disskuteras. Detta ger ett positivt betyg för nedlåsningsprogrammen och ger uppmaning till lärare att gå över till digitala prov utan att oroa sig för nedlåsningen av datorerna.
38

BYOD como pol?tica de seguran?a em uma empresa: uma an?lise ? luz da PMT

Rodrigues, Ge?rgia Cristiane 11 September 2015 (has links)
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2016-05-06T23:52:19Z No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) / Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2016-05-09T19:56:30Z (GMT) No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) / Made available in DSpace on 2016-05-09T19:56:30Z (GMT). No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) Previous issue date: 2015-09-11 / O avan?o da tecnologia m?vel, no que diz respeito ? disponibilidade de servi?os 3G/4G e da utiliza??o de Dispositivos como Smartphones e Tablets originou um novo fen?meno de comunica??o: BYOD (Bring Your Own Device), ? uma nova tend?ncia de neg?cios, onde os funcion?rios est?o utilizando seus pr?prios dispositivos para fins de trabalho. A r?pida expans?o de BYOD e as quest?es de seguran?a e privacidade de dados representam desafios significativos para as organiza??es. A resposta mais comum a essas preocupa??es ? a ado??o de pol?ticas corporativas que regem BYOD. Este estudo tem por objetivo analisar a inten??o dos funcion?rios em cumprir com a pol?tica de seguran?a da organiza??o no contexto de BYOD, quando os funcion?rios utilizam seus dispositivos pessoais para acessar recursos organizacionais para realizarem o trabalho, dentro ou fora do ambiente organizacional. Para tanto, foi utilizada a Teoria de Motiva??o a Prote??o (TMP) como embasamento te?rico. Em termos metodol?gicos, a presente pesquisa, ? do tipo descritiva e tamb?m explorat?ria com uma abordagem quantitativa. N?o aleat?ria ? o tipo de amostragem. Para coleta, foi aplicado um question?rio estruturado, tipo survey, com um conjunto de itens de medi??o para cada construto. A etapa de an?lise dos dados foi realizada por meio de utiliza??o de t?cnicas de estat?stica descritiva e an?lise multivariada, tais como a An?lise Fatorial Explorat?ria (AFE) e a Regress?o Linear M?ltipla (RLM). Do ponto de vista te?rico, os resultados demonstram que o modelo PMT fornece uma base te?rica s?lida para a investiga??o nesta ?rea. No entanto, os resultados tamb?m indicam que este modelo ? afetado por fatores contextuais, e que a escolha da amostra pode influenciar a import?ncia dos diferentes componentes do modelo. Portanto, o cuidado deve ser tomado na generaliza??o desses resultados para outros contextos e popula??es / The advancement of mobile technology, with regard to the availability of 3G / 4G and use of devices such as Smartphones and Tablets yielded a new communication phenomenon: BYOD (Bring Your Own Device), is a new business trend, where employees are using their own devices for work purposes. The rapid expansion of BYOD , data security and privacy issues pose significant challenges for organizations. The most common response to these concerns is the adoption of corporate policies governing BYOD. This study aims to analyze the intention of employees to comply with the organization's security policy in the context of BYOD, when employees use their personal devices to access organizational resources to develop work related tasks, inside or outside the organizational environment. Therefore, we will use the Motivation Theory Protection as theoretical basis. In terms of methodology, this research will be a descriptive and exploratory study with a quantitative approach. Nonrandom will be the type of sampling. For collection, a structured questionnaire, survey type, with a set of measurement items for each construct is applied. The data analysis step is performed by means of descriptive statistics, Exploratory Factor Analysis and Multiple Linear Regression. From a theoretical point of view, the results demonstrate that the PMT model provides a solid theoretical basis for research in this area. However, the results also suggest that this model is affected by contextual factors, and the selection of the sample may influence the importance of the different components of the model. Therefore, caution should be taken in generalizing these results to other settings and populations.
39

Ochrana citlivých informací na mobilních zařízení / Privacy Protection on Mobile Devives

Aron, Lukáš Unknown Date (has links)
Tato práce analyzuje ochranu citlivých dat na mobilních zařízeních a představuje metodu pro ochranu těchto dat před možností úniku informaci ze zařízení. Ochrana se zaměřuje na využívání zařízení, jak pro osobní účely, tak i v pracovním prostředí. Koncept navrženého řešení je implementován ve formě prototypu. Model implementace je verifikován s modelem požadovaného chování. Součástí práce jsou experimenty s prototypem a experimenty zaměřené na verifikaci mezi danými modely.
40

A Study of the Application of a Bring Your Own Device Strategy in an Elementary School

Scholz, Carol Louise 01 January 2016 (has links)
Numerous studies have been published on the efficacy of a Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) at the U.S. secondary and postsecondary school levels to increase student access to technology. However, there is a lack of data on the efficacy of a BYOD AUP to increase elementary student technology access. The purpose of this descriptive case study was to determine if a BYOD AUP at the U.S. K-5 level would increase students' access to technology as necessitated by the implementation of the Common Core State Standards (CCSS). This study was grounded in social transmission and transformative theories. The phenomenon of a northwest suburban elementary school BYOD implementation was examined by documenting the perceptions, attitudes, beliefs, lived experiences, and practices of administrators and teachers. This study used interview and classroom observation of a purposive selection of 3 elementary educators, the principal, and superintendent. Coding of data according to key words lead to analysis according to nodes and themes. Triangulation of multiple data sources and member checking helped to establish the credibility of data. Study findings documented increased access to technology for elementary students, best practices and steps to implementation. Study recommendations for elementary educators and administrators considering BYOD include consensus building, AUP, technology infrastructure, communications, professional development, classroom management, and lesson design to inform the field on elementary BYOD. Study findings facilitate social change by providing BYOD implementation recommendations, increasing elementary student access to technology at a reduced cost to districts and schools.

Page generated in 0.0242 seconds