HHWForum.hu
Filmek
TV Sorozatok Feliratos filmek Szinkronos filmek HD és Blu-ray Karácsony Online nézhető filmek Film kollekciók Mobilos filmek Rajzfilmek Dokumentum filmek Horror filmek Magyar filmek DVD ISO HUN DVD ISO ENG DVD-Rip ENG 3D filmek Zenés filmek
Zenék
Zenei Kérések Videóklippek, koncertfelvételek OST Single
Játékok
Játék Kérések
XXX
XXX Játékok XXX Magyar XXX Sorozatok, Gyűjtemények XXX Képek XXX Magazinok, képregények XXX Videók és Rövid filmek
Mobil
Mobilos filmek Mobilos programok Androidos játékok Mobil Háttérképek Csengőhangok
Programok
Windows Op. ISO ENG Windwos Op. ISO HUN Microsoft Office MacOS Program Kérések
Háttérképek
Templates Háttérképek Témák
E-könyvek
E-könyv Kérések Külföldi könyvek Hangoskönyvek Külföldi magazinok Gyerek hangoskönyvek Gyerekdalok
Mai Friss

Keresés
A fő kategória kiválasztásával az alfórumokban is keres.
Saját feltöltéseim
User
Belépés   Regisztráció
Belépés
Felhasználónév
Jelszó: Elfelejtett jelszó?
 
HHWForum.hu Letöltések E-könyvek Külföldi könyvek Bring Your Own Device Security Policy Compliance Framework

  • 0 szavazat - átlag 0
  • 1
  • 2
  • 3
  • 4
  • 5
Rétegzési módok
Bring Your Own Device Security Policy Compliance Framework
Nem elérhető book24h
Power User
**
Üzenetek: 154,468
Témák: 154,468
Thanks Received: 0 in 0 posts
Thanks Given: 0
Csatlakozott: Sep 2024
Értékelés: 0
#1
2025-04-05, 06:56
[Kép: f63bd38ea976ea5e579ef654944d2e08.webp]
Free Download Bring Your Own Device Security Policy Compliance Framework
English | 2025 | ISBN: 3031868005 | 373 Pages | PDF EPUB (True) | 7.4 MB
Proliferation of Bring Your Own Device (BYOD) has instigated a widespread change, fast outpacing the security strategies deployed by organizations. The influx of these devices has created information security challenges within organizations, further exacerbated with employees' inconsistent adherence with BYOD security policy. To prevent information security breaches, compliance with BYOD security policy and procedures is vital. This book aims to investigate the factors that determine employees' BYOD security policy compliance by using mixed methods approach. Security policy compliance factors, BYOD practices and security risks were identified following a systematic review approach. Building on Organizational Control Theory, Security Culture and Social Cognitive Theory, a research framework positing a set of plausible factors determining BYOD security policy compliance was developed. Next, with a purposive sample of eight information security experts from selected public sector organizations, interviews and BYOD risk assessments analysis were performed to furnish in-depth insights into BYOD risks, its impact on organizations and recommend control measures to overcome them. This led to the suggestion of four control measures to mitigate critical BYOD security risks such as Security Training and Awareness (SETA), policy, top management commitment and technical countermeasures. The control measures were mapped into the research framework to be tested in the following quantitative phase. The proposed research framework was tested using survey results from 346 employees of three Critical National Information Infrastructure (CNII) agencies. Using Partial Least Squares - Structural Equation Modelling (PLS-SEM), the framework's validity and reliability were evaluated, and hypotheses were tested. Findings show that perceived mandatoriness, self-efficacy and psychological ownership are influential in predicting employees' BYOD security policy compliance. Specification of security policy is associated with perceived mandatoriness, while BYOD IT support and SETA are significant towards self-efficacy. Unexpectedly, security culture has been found to have no significant relationship to BYOD security policy compliance. Theoretical, practical, and methodological contributions were discussed and suggestions for future research were recommended. The analysis led to a number of insightful findings that contribute to the literature and the management, which are predominantly centered on traditional computing. In view of the ever-increasing BYOD threats to the security of government information, it is imperative that IT managers establish and implement effective policies to protect vital information assets. Consequently, the findings of this study may benefit policymakers, particularly in the public sector, in their efforts to increase BYOD security policy compliance among employees.


Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me
Idézet:A kódrészlet megtekintéséhez be kell jelentkezned, vagy nincs jogosultságod a tartalom megtekintéséhez.
Links are Interchangeable - Single Extraction

  •
A szerző üzeneteinek keresése
Válaszol


Hasonló témák...
Téma: Szerző Válaszok: Megtekintések: Utolsó üzenet
  Redefining Auditing In The Digital Era Global Perspectives On Technology Security And Leadership (Abdelmounim Bouziane;) Farid-Khan 0 41 2026-03-23, 14:19
Utolsó üzenet: Farid-Khan
  The Joy Of Cryptography An Undergraduate Course In Provable Security The MIT Press (Mike Rosulek) Farid-Khan 0 26 2026-03-19, 14:17
Utolsó üzenet: Farid-Khan
  Plasma Electronics Applications In Microelectronic Device 3ed (2026) (Toshiaki Makabe;Zoran Lj. Petrovi;) Farid-Khan 0 22 2026-03-16, 11:54
Utolsó üzenet: Farid-Khan
  Certificate Of Cloud Security Knowledge CCSK V5 Study Guide In Depth Guidance And Practice TrueRetail EPUB (Graham Thomp Farid-Khan 0 24 2026-03-16, 06:40
Utolsó üzenet: Farid-Khan
  Making AI Work For People A Framework For Designing And Building Impactful AI Powered Applications TrueRetail EPUB (Asma Farid-Khan 0 20 2026-03-16, 06:10
Utolsó üzenet: Farid-Khan
  Plasma Electronics Applications In Microelectronic Device Fabrication 3rd Edition (Toshiaki Makabe;Zoran Lj. Petrovi;) Farid-Khan 0 21 2026-03-16, 05:33
Utolsó üzenet: Farid-Khan
  Information Security And Privacy Quick Reference TrueRetail PDF (Mike Chapple;Joe Shelley;James Michael Stewart;) Farid-Khan 0 25 2026-03-13, 10:18
Utolsó üzenet: Farid-Khan
  Zero Trust Security A Hands On Guide TrueRetail PDF (Adam Tilmar Jakobsen;) Farid-Khan 0 25 2026-03-13, 09:15
Utolsó üzenet: Farid-Khan
  UX For AI A Framework For Designing AI Driven Products TrueRetail PDF (Greg Nudelman;Daria Kempka;) Farid-Khan 0 24 2026-03-13, 09:11
Utolsó üzenet: Farid-Khan
  Taming The Hacking Storm A Framework For Defeating Hackers And Malware TrueRetail PDF (Roger A. Grimes;) Farid-Khan 0 22 2026-03-11, 07:47
Utolsó üzenet: Farid-Khan

Digg   Delicious   Reddit   Facebook   Twitter   StumbleUpon  


Jelenlevő felhasználók ebben a témában:
1 Vendég

  •  
  • Vissza a lap tetejére  
  • Lite mode  
  •  Kapcsolat
Theme © 2014 iAndrew
MyBB, © 2002-2026 MyBB Group.
Lineáris
Rétegezett
Megtekintés nyomtatható verzióban
Feliratkozás a témára
Szavazás hozzáadása ehhez a témához
Send thread to a friend