نتایج جستجو برای: byod
تعداد نتایج: 233 فیلتر نتایج به سال:
Appendix (available online via http://link.springer.com)
Over the past four decades, varied information technology and communication tools were incorporated in standard audience research methodologies thus becoming a ubiquitous feature of fieldwork and data analysis. In this paper, we highlight the costs and benefits of the application of these technologies to audience research through specific case studies set within varied museum environments. Coll...
Because of the recent increase of mobile device adoption in the workplace, and the numerous security risks inherent in mobile device use, there is a growing need for organizations to craft mobile device security policies that will have a positive effect on employees’ intention to comply. Using prospect theory, developed by Kahneman and Tversky (1979), and the framing effects associated with thi...
Directory; Cabell’s Directories; Compendex (Elsevier Engineering Index); DBLP; GetCited; Google Scholar; INSPEC; JournalTOCs; Library & Information Science Abstracts (LISA); MediaFinder; The Index of Information Systems Journals; The Standard Periodical Directory; Ulrich’s Periodicals Directory Copyright The International Journal of E-Adoption (IJEA) (ISSN 1937-9633; eISSN 1937-9641), Copyright...
In this paper, we introduce a new methodology for network access control Android devices based on app risk assessment. Named ARANAC (which stands Application Risk Assessment Network Access Control), is specially tailored scenarios using the Bring-Your-Own-Device (BYOD) policy, where adoption of some solutions can lead to problems in security and privacy both employees business organization. mai...
This study analyzes the viability of using employees’ smartphones following the BYOD paradigm as a valid tool to enable firms to control effective presence (primarily of remote labor force). We propose a model for a Mobile Presence Control Information System with which to demonstrate experimentally the viability of unifying three elements that have only been examined individually in previous st...
In enterprise organizations, the Bring-Your-Own-Device (BYOD) requirement has become prevalent as employees use their own mobile devices to process the workflow-oriented tasks. Consequently, it calls for approaches that can quickly develop and integrate mobile user interactions into existing business processes, and adapt to various contexts. However, designing, developing and deploying adaptive...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید