• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Ado??o de pr?ticas de BYOD ? luz dos princ?pios da teoria effectuation

Silva, Marcos Paulo da 20 December 2016 (has links)
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2017-04-17T21:38:09Z No. of bitstreams: 1 MarcosPauloDaSilva_TESE.pdf: 5717561 bytes, checksum: 79eed29f2011f51218a5d93114dd58e7 (MD5) / Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2017-04-19T18:39:53Z (GMT) No. of bitstreams: 1 MarcosPauloDaSilva_TESE.pdf: 5717561 bytes, checksum: 79eed29f2011f51218a5d93114dd58e7 (MD5) / Made available in DSpace on 2017-04-19T18:39:54Z (GMT). No. of bitstreams: 1 MarcosPauloDaSilva_TESE.pdf: 5717561 bytes, checksum: 79eed29f2011f51218a5d93114dd58e7 (MD5) Previous issue date: 2016-12-20 / O presente estudo busca compreender de que forma usu?rios e gestor de Tecnologia da Informa??o (TI) adotam pr?ticas de Bring Your Own Device (BYOD), ? luz dos princ?pios da teoria Effectuation. No referencial te?rico, desenvolvem-se discuss?es sobre o contexto da consumeriza??o, suas aplica??es e implica??es para as organiza??es e indiv?duos, a abordagem da teoria Effectuation, o racioc?nio effectual, seus princ?pios e o processo. Trata-se de um estudo explorat?rio-descritivo, utilizando o m?todo misto de pesquisa ? qualitativo e quantitativo ? por meio de um estudo de caso ?nico, do qual participaram 42 usu?rios e o gestor de TI de uma empresa que atua h? 49 anos no setor varejista/atacadista de Natal/RN. Para a an?lise dos dados coletados junto aos usu?rios de TI, utilizou-se a estat?stica descritiva, regress?o log?stica (bootstrap), correla??o de Pearson e teste U de Mann-Whitney, com o aux?lio do software Statistical Package for the Social Sciences (SPSS) vers?o 21. Para a an?lise da entrevista concedida pelo gestor de TI, utilizou-se a an?lise de conte?do categorial ? an?lise tem?tica ? com o aux?lio do software ATLAS.ti, vers?o 7.5.15. A pesquisa mostra, por meio das metainfer?ncias, que existem diverg?ncias entre a ado??o das pr?ticas de BYOD pelos usu?rios de TI ? perfil effectual prevalente ? e pela empresa, representada pela gestor de TI ? perfil causal ? considerando que os aspectos da gest?o voltados para a mitiga??o de imprevistos, seguran?a da informa??o e o controle para o uso com foco no trabalho v?o de encontro ? perspectiva dos usu?rios de TI, de que por meio das pr?ticas de BYOD ? poss?vel uma atua??o aut?noma e dirigida ? inova??o, em raz?o da explora??o das conting?ncias e a realiza??o de parcerias com colegas de trabalho e/ou clientes e/ou fornecedores. No entanto, usu?rios e gestor de TI convergem em rela??o ? perspectiva sobre os benef?cios para as atividades da organiza??o, no que diz respeito ? satisfa??o dos funcion?rios, ? melhoria do atendimento aos clientes e ? realiza??o de parcerias para a ado??o, visto que o gestor percebe como uma parceria a disponibiliza??o da infraestrutura de TI organizacional para que os funcion?rios possam utilizar seus pr?prios aparelhos. Conclui-se que a realiza??o de parcerias engloba a ocorr?ncia de intera??es entre os usu?rios e o gestor de TI, o que potencializa a a??o humana na constru??o da ado??o das pr?ticas de BYOD, sobretudo quando o altru?smo inteligente se faz presente. Deve-se destacar que, na gest?o da ado??o, se dever? considerar o n?vel de escolaridade do usu?rio e a perspectiva de que a ado??o das pr?ticas ocorre em virtude da possibilidade dos aparelhos serem usados em qualquer lugar, conforme os modelos logit, a fim de otimizar o atendimento das demandas da maior parte dos usu?rios de TI da empresa. / The following study seeks to comprehend in which way Information Technology (IT) users and manager conduct the adoption of Bring Your Own Device (BYOD) practices, under the light of Effectuation theory principles. The theoretical framework brings discussions on the context of consumerization, its applications and implications for organizations and individuals, the Effectuation theory approach, the effectual logic, its principles and process. This is an exploratory-descriptive study, which uses both qualitative and quantitative research methods by means of one single case study, in which took part 42 users and the IT manager of a company that has been operating for the last 49 years in the retailer/wholesaler sector in the city of Natal/RN. Descriptive statistics, logistic regression (bootstrap), Pearson correlation and Mann-Whitney U test were used for the analysis of the data collected from the IT users, along with the aid of the Statistical Package for the Social Sciences (SPSS) software, version 21. Categorical content analysis ? thematic analysis ? was used for the analysis of the interview granted by the IT manager, with the support of the ATLAS.ti software, version 7.5.1.5. The research evinces, by means of metainferences, the existence of divergences between the adoption of BYOD practices by IT users ? effectual profile prevalent ? and by the company, represented by the IT manager ? causal profile. The management aspects concerning unforeseen events mitigation, information safety and control enforcing the used towards work activities go against IT users? perspective, which assume that, by means of BYOD practices, it is possible to attain an autonomous and innovation-biased performance, due to contingencies exploration and the establishment of partnerships with coworkers and/or clients and/or suppliers. Nevertheless, both IT users and manager converge regarding the perspective towards the benefits to the organization activities, in terms of employees? satisfaction, to the improvement of customer?s services and to the realization of partnerships for the adoption, since the IT manager perceives the availability of IT infrastructure by the company so that the employees may use their own devices as a partnership. It is concluded that the establishment of partnerships encompass the occurrence of interactions between the used and the IT manager, which enhance the human action upon the construction of BYOD practices adoption, especially when intelligent altruism is present. It must be highlighted that, in the adoption policy, the user educational level and the perspective that these practices adoption occur due to the possibility of the devices being used anywhere must be considered, according to the logit models, in order to optimize the meeting of the demands from most IT users of the company.
2

BYOD como pol?tica de seguran?a em uma empresa: uma an?lise ? luz da PMT

Rodrigues, Ge?rgia Cristiane 11 September 2015 (has links)
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2016-05-06T23:52:19Z No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) / Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2016-05-09T19:56:30Z (GMT) No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) / Made available in DSpace on 2016-05-09T19:56:30Z (GMT). No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) Previous issue date: 2015-09-11 / O avan?o da tecnologia m?vel, no que diz respeito ? disponibilidade de servi?os 3G/4G e da utiliza??o de Dispositivos como Smartphones e Tablets originou um novo fen?meno de comunica??o: BYOD (Bring Your Own Device), ? uma nova tend?ncia de neg?cios, onde os funcion?rios est?o utilizando seus pr?prios dispositivos para fins de trabalho. A r?pida expans?o de BYOD e as quest?es de seguran?a e privacidade de dados representam desafios significativos para as organiza??es. A resposta mais comum a essas preocupa??es ? a ado??o de pol?ticas corporativas que regem BYOD. Este estudo tem por objetivo analisar a inten??o dos funcion?rios em cumprir com a pol?tica de seguran?a da organiza??o no contexto de BYOD, quando os funcion?rios utilizam seus dispositivos pessoais para acessar recursos organizacionais para realizarem o trabalho, dentro ou fora do ambiente organizacional. Para tanto, foi utilizada a Teoria de Motiva??o a Prote??o (TMP) como embasamento te?rico. Em termos metodol?gicos, a presente pesquisa, ? do tipo descritiva e tamb?m explorat?ria com uma abordagem quantitativa. N?o aleat?ria ? o tipo de amostragem. Para coleta, foi aplicado um question?rio estruturado, tipo survey, com um conjunto de itens de medi??o para cada construto. A etapa de an?lise dos dados foi realizada por meio de utiliza??o de t?cnicas de estat?stica descritiva e an?lise multivariada, tais como a An?lise Fatorial Explorat?ria (AFE) e a Regress?o Linear M?ltipla (RLM). Do ponto de vista te?rico, os resultados demonstram que o modelo PMT fornece uma base te?rica s?lida para a investiga??o nesta ?rea. No entanto, os resultados tamb?m indicam que este modelo ? afetado por fatores contextuais, e que a escolha da amostra pode influenciar a import?ncia dos diferentes componentes do modelo. Portanto, o cuidado deve ser tomado na generaliza??o desses resultados para outros contextos e popula??es / The advancement of mobile technology, with regard to the availability of 3G / 4G and use of devices such as Smartphones and Tablets yielded a new communication phenomenon: BYOD (Bring Your Own Device), is a new business trend, where employees are using their own devices for work purposes. The rapid expansion of BYOD , data security and privacy issues pose significant challenges for organizations. The most common response to these concerns is the adoption of corporate policies governing BYOD. This study aims to analyze the intention of employees to comply with the organization's security policy in the context of BYOD, when employees use their personal devices to access organizational resources to develop work related tasks, inside or outside the organizational environment. Therefore, we will use the Motivation Theory Protection as theoretical basis. In terms of methodology, this research will be a descriptive and exploratory study with a quantitative approach. Nonrandom will be the type of sampling. For collection, a structured questionnaire, survey type, with a set of measurement items for each construct is applied. The data analysis step is performed by means of descriptive statistics, Exploratory Factor Analysis and Multiple Linear Regression. From a theoretical point of view, the results demonstrate that the PMT model provides a solid theoretical basis for research in this area. However, the results also suggest that this model is affected by contextual factors, and the selection of the sample may influence the importance of the different components of the model. Therefore, caution should be taken in generalizing these results to other settings and populations.

Page generated in 0.0554 seconds