• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 25
  • 11
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 50
  • 21
  • 16
  • 16
  • 16
  • 14
  • 14
  • 13
  • 12
  • 12
  • 10
  • 10
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Fatores críticos à política de utilização de tecnologias pessoais para a condução de atividades corporativas

Bono Milan, Luiz Fernando Albertin 25 February 2014 (has links)
Submitted by Luiz Fernando Bono Milan (luiz.milan@gvmail.br) on 2014-03-20T01:05:20Z No. of bitstreams: 1 Dissertacao_Luiz_Fernando_Albertin_Bono_Milan.pdf: 897012 bytes, checksum: 54a4f2a41113fec19ec36c34425766dd (MD5) / Approved for entry into archive by PAMELA BELTRAN TONSA (pamela.tonsa@fgv.br) on 2014-03-20T15:01:59Z (GMT) No. of bitstreams: 1 Dissertacao_Luiz_Fernando_Albertin_Bono_Milan.pdf: 897012 bytes, checksum: 54a4f2a41113fec19ec36c34425766dd (MD5) / Made available in DSpace on 2014-03-20T15:02:49Z (GMT). No. of bitstreams: 1 Dissertacao_Luiz_Fernando_Albertin_Bono_Milan.pdf: 897012 bytes, checksum: 54a4f2a41113fec19ec36c34425766dd (MD5) Previous issue date: 2014-02-25 / Com o crescente número de fabricantes de produtos, serviços e soluções de TI, direcionando boa parte de sua produção ao indivíduo, desenvolvendo dispositivos pessoais móveis, redes sociais, armazenamento remoto de arquivos, aplicativos grátis ou a custos acessíveis a boa parte dos profissionais do mercado de trabalho atual, os indivíduos estão, cada vez mais, se munindo de dispositivos e aplicações para organizar suas vidas, se relacionar com pessoas e grupos sociais e para se entreterem, entre outras coisas. Consequentemente, muitos levam estas tecnologias pessoais para dentro do ambiente corporativo e as utilizam para auxiliar em suas tarefas profissionais. Este fenômeno tem sido chamado, pelos estudos não-científicos sobre o tema, de Consumerização de TI ou BYOD (Bring Your Own Device). O objetivo deste estudo é identificar o conjunto de fatores críticos que as organizações devem levar em consideração no momento em que criam ou aprimoram sua política de utilização de tecnologias pessoais para a condução de atividades corporativas. Para identificar este conjunto de fatores críticos são utilizadas técnicas de análise de conteúdo, para analisar o material coletado, que são estudos não-científicos, tais como: pesquisas de empresas de consultoria na área de administração de TI, estudos de instituições de diferentes indústrias e entrevistas com pesquisadores e profissionais da área de TI e de outras áreas do Brasil e dos Estados Unidos da América. São identificados sete fatores, dos quais, três são críticos à política de utilização de tecnologias pessoais no ambiente corporativo, dois são impulsionadores do fenômeno e dois são fatores beneficiados pelo fenômeno. / Having a growing number of products manufacturers, IT services and solutions directing much of its production to user-driven technologies, developing user-driven mobile devices, social networks, remote file storing, free apps or at least affordable to good part of the workforce nowadays, users are increasingly taking these devices and applications to organize their lives, relate to people and social groups and to entertain themselves, among other things. Consequently, many take these user-driven technologies into the enterprise environment and use them to assist in their professional tasks. This phenomenon has been called by non-scientific studies on the subject as IT Consumerization and BYOD (Bring Your Own Device). This study aims to identify the set of critical factors that organizations should consider when they are creating or enhancing their use policy to these user-driven technologies in their environment. To identify this set of critical factors, content analysis techniques are aplied to analyze non- scientific studies, such as research consulting firms in the area of IT administration, studies of different industries and institutions. Brazilian and Americans researchers, been IT professionals and professionals from non-IT areas were interviewed. Seven factors were identified, of which three are critical of the policy of user-driven technologies in the enterprise environment, two are drivers of the phenomenon and two factors are benefited by the phenomenon.
42

En säkerhetsgranskning av Secure Application Framework

Norling, Sebastian January 2013 (has links)
Företaget Wireless Independent Provider (WIP) har tagit fram ett säkerhetsramverk vid namn Secure Application Framework (SAF) som är ett väldokumenterat ramverk för att skapa säkra interna företagsappar. Syftet med detta ramverk är att lösa problematiken kring Bring Your Own Device (BYOD) – hur man ska skilja på privat data och företagets data i enheten. Med ett sådant system så finns det mycket att tänka på rörande säkerheten. Genom att identifiera ett antal olika hot och genomföra en riskanalys på dessa kommer man fram till att systemet är skyddat mot majoriteten av hoten, det finns dock förslag till förbättringar på enstaka delar av systemet. Det genomförs även prestandatester och undersökning av lavineffekten för ett antal olika symmetriska krypteringsalgoritmer i syfte att fastslå om den använda algoritmen i systemet har fördelar jämfört med andra moderna krypteringsalgoritmer. Utifrån resultaten som tagits fram i detta arbete så konstateras det att skyddet mot de identifierade hoten är mycket bra samt att det inte finns någonting som skulle motivera ett byte av den symmetriska krypteringsalgoritmen.
43

Bezpečnosť a správa mobilných zariadení v podnikovom IT / Security and management of mobile devices in the enterprise IT

Rusiňák, Peter January 2011 (has links)
The diploma thesis deals with the management and security of mobile devices in the enterprise IT. The aim of the work is to familiarize the reader with the issue of enterprise mobility. As enterprise mobility covers a vast area and an important aspect of greatly efficient and secure use of any company's mobile devices is their mobile strategy, the work focuses on the process of creating a mobile security strategy and providing guidelines for its successful implementation. The integration of smart phones into a corporate infrastructure is a complex act. It is necessary to take into account the many safety demands and requirements for interoperability. The issue of mobile enterprise device management and security is very broad. Another part of the work describes various mobile platforms in terms of their suitability for use in the enterprise IT. Operating systems are analyzed in detail from several different points of view. The work provides insight into the market of operating systems and explains the basic security threats to which these systems are exposed and recommends ways of protection against unwanted effects. The final part of the thesis deals with design solutions management and security of mobile devices in the company. On the basis of the requirements set suggests a solution that encompasses deployment of Mobile Device Management device management and security proposes rules for the extension of security policy on mobile device management.
44

Mobile Device Strategy : A management framework for securing company information assets on mobile devices

Brodin, Martin January 2016 (has links)
The problem addressed by this research is a demand for increased flexibility in access to organisational information, driven by the increasing popularity of mobile devices. Employees increasingly bring private devices to work (Bring Your Own Device, BYOD) or use work devices for private purposes (Choose Your Own Device, CYOD). This puts managers in a difficult position, since they want the benefits of mobility, without exposing organisational data to further risk. The research focuses on management (particularly information security management) issues in the design and implementation of strategies for mobile devices.  There are two objectives. The first is to identify existing information security management strategies for mobile and dual-use devices. The second is to develop a framework for analysing, evaluating and implementing a mobile device strategy. The overall research strategy is inspired by Design Science; where the mission is to develop an artefact, in this case a framework, which will help to solve a practical problem. Methods include literature review, theoretical development, and the collection and analysis of qualitative data through interviews with executives. The main result of this work is the framework, which deals with the complete process, including analysis, design and implementation of a mobile device management strategy. It helps researchers to understand necessary steps in analysing phenomenon like BYOD and gives practitioners guidance in which analyses to conduct when working on strategies for mobile devices. The framework was developed primarily through theoretical work (with inspiration from the mobile security and strategic management literature, and the ISO/IEC 27000 standard), and evaluated and refined through the empirical studies. The results include twelve management issues, a research agenda, argumentation for CYOD and, guidance for researchers and practitioners.
45

The New Normal: Lived Experiences of Teachers’ Educating Students in an Always-on and Connected Middle School Environment

Murray, Alexander R. 19 July 2016 (has links)
No description available.
46

Factors Affecting the Adoption of Bring Your Own Device by Teachers in Caymanian Public High Schools

Lawrence, Cleyo Lutice 01 January 2018 (has links)
At public high schools in Cayman, teachers need to improve their productivity and efficiency by using technologies that are simple and portable like their personal devices. Studies about bring your own device (BYOD) initiatives have revealed conflicting outcomes, and are lacking in the Caribbean and especially in Cayman. The purpose of this quantitative study was to determine the main factors related to teachers' willingness to adopt BYOD in public high schools in Cayman. The theoretical framework was the unified theory of acceptance and use of technology (UTAUT). This study employed a cross-sectional survey design using a modified UTAUT instrument, which captured quantitative data from 82 participants. The use of hierarchical multiple regression to analyze the data revealed that teachers' BYOD adoption could expand by increasing facilitating conditions, performance expectancy, effort expectancy, and decreasing perceived risk. This study reduces the gap in the literature about the unified theory of acceptance and use of technology and BYOD in the Caribbean and the Cayman Islands. It also provides evidence that perceived risk can increase its explanatory power of the unified theory of acceptance and use of technology. The study also contributes to a positive social change by revealing critical issues that administrators should address when devising BYOD policies and planning educational technology integration.
47

BYOD: The PreK-12 Technology Leader's Perspective

Zagray, Peter G. 31 May 2019 (has links)
No description available.
48

A Case Study of Technology Choices by High School Students

Owens-Hartman, Amy R. January 2015 (has links)
No description available.
49

The management of an information technology infrastructure in schools in the Western Cape Province / Bestuur van rekenaar tegnologie in skole van die Wes Kaapse Onderwys Departement

Perkins, Catharina Elizabetha 11 1900 (has links)
This research conceptualises IT infrastructure management at secondary schools in the WCED (Western Cape Education Department). This includes whether or not secondary schools in the WCED make use of a full time, on-site network administrator or whether a teacher acts as on-site network administrator. The literature review studied the effectiveness of IT infrastructure management which includes hardware, software, policies, computer network, security; staff management and BYOD (bring your own device). The management of IT infrastructure at secondary schools within the WCED differs widely from school to school, and its functionality depends on many factors. The quantitative study revealed problem areas within IT infrastructure management at secondary schools in the WCED. Furthermore the quantitative study also revealed that there is a need for best practice guidelines with regards to IT infrastructure management in order to improve service delivery. The literature review provided sources for best practice IT infrastructure management. / Rekenaar infrastruktuur by sekondere skole in die WKOD (Wes Kaapse Onderwys Departement) word in die navorsing beskryf. Die studie ondersoek verskillende strukture naamlike skole wat 'n voltydse netwerk administrateur het en skole waar 'n onderwyser die verantwoordelikheid aanneem van 'n netwerk administrateur. Die effektiewe beheer van rekenaar infrastrukture word bespreek. Dit sluit hardeware, sagteware, beleid formulasie, rekenaar netwerk, sekuriteit, personeel bestuur, en BYOD (bring jou eie toestel). Die bestuur van rekenaar infrastruktuur verskil van skool tot skool en die effektiewe bestuur daarvan word deur baie faktore beinvloed. Die kwantitatiewe studie het probleem areas vir die bestuur van rekenaar infrastruktuur by sekondere skole in die WKOD uitgewys. Die kwantitatiewe studie het verder die behoefte vir beste praktyk riglyne uitgewys om sodoende better dienslewering te verseker. Die literere studie het beste praktyk riglyne vir rekenaar infrastruktuur bestuur genoem. / Educational Leadership and Management
50

The management of an information technology infrastructure in schools in the Western Cape Province / Bestuur van rekenaar tegnologie in skole van die Wes Kaapse Onderwys Departement

Perkins, Catharina Elizabetha 11 1900 (has links)
This research conceptualises IT infrastructure management at secondary schools in the WCED (Western Cape Education Department). This includes whether or not secondary schools in the WCED make use of a full time, on-site network administrator or whether a teacher acts as on-site network administrator. The literature review studied the effectiveness of IT infrastructure management which includes hardware, software, policies, computer network, security; staff management and BYOD (bring your own device). The management of IT infrastructure at secondary schools within the WCED differs widely from school to school, and its functionality depends on many factors. The quantitative study revealed problem areas within IT infrastructure management at secondary schools in the WCED. Furthermore the quantitative study also revealed that there is a need for best practice guidelines with regards to IT infrastructure management in order to improve service delivery. The literature review provided sources for best practice IT infrastructure management. / Rekenaar infrastruktuur by sekondere skole in die WKOD (Wes Kaapse Onderwys Departement) word in die navorsing beskryf. Die studie ondersoek verskillende strukture naamlike skole wat 'n voltydse netwerk administrateur het en skole waar 'n onderwyser die verantwoordelikheid aanneem van 'n netwerk administrateur. Die effektiewe beheer van rekenaar infrastrukture word bespreek. Dit sluit hardeware, sagteware, beleid formulasie, rekenaar netwerk, sekuriteit, personeel bestuur, en BYOD (bring jou eie toestel). Die bestuur van rekenaar infrastruktuur verskil van skool tot skool en die effektiewe bestuur daarvan word deur baie faktore beinvloed. Die kwantitatiewe studie het probleem areas vir die bestuur van rekenaar infrastruktuur by sekondere skole in die WKOD uitgewys. Die kwantitatiewe studie het verder die behoefte vir beste praktyk riglyne uitgewys om sodoende better dienslewering te verseker. Die literere studie het beste praktyk riglyne vir rekenaar infrastruktuur bestuur genoem. / Educational Leadership and Management

Page generated in 0.0553 seconds