Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/54633
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor曹承礎
dc.contributor.authorHui-Chuan Changen
dc.contributor.author張惠娟zh_TW
dc.date.accessioned2021-06-16T03:36:03Z-
dc.date.available2020-08-11
dc.date.copyright2015-08-11
dc.date.issued2015
dc.date.submitted2015-06-22
dc.identifier.citation中文文獻
鄧振源、曾國雄(1989a),層級分析法(AHP)的內涵特性與應用(上),中國統計學報,27(6),5-22。
鄧振源、曾國雄(1989b),層級分析法(AHP)的內涵特性與應用(下),中國統計學報,27(7),1-20。
褚士瑩(2009),層級分析法(AHP)理論與實作[線上資料],來源:http://faculty.ndhu.edu.tw/~chpchu/POMR_Taipei_2009/AHP2009.pdf。
高振源(2011),建構資安治理成熟度評估指標之研究─以某政府機關為例,中國文化大學資訊安全產業研發碩士班。
張維君(2014),開放BYOD讓Intel資安風險不升反降,資安人。
楊晨欣(2013),英特爾開放BYOD,年省5百萬個工時,iThome。
ITIS智網(2013),資策會MIC經濟部ITIS計畫,資通訊服務產業年鑑。
CIO大調查(2014),CIO IT經理人。
英文文獻
Aceng Salim,Arry Akhmad Arman.'Development of Assessment Method for Information Technology and Business'.IEEE International Conference on Electrical Engineering and Computer Science.24-25 November 2014
Antonio Scarfò,”New security perspectives around BYOD”,IEEE International Conference on Broadband, Wireless Computing, Communication and Applications,2012.
Brian Katz,“Why almost everyone gets it wrong about BYOD”,InfoWorld,2013
D. Jaramillo,N. Katz,B. Bodin,W. Tworek,R. Smart,T. Cook,”Cooperative solutions for Bring Your Own Device(BYOD)”,IBM,2013.
Falahah.” Implementation of Modified Maturity Level Measurement Model for All COBIT Framework (Case Study: IT Management Audit ofPT.POS Indonesia)”. Proceeding 3rtl International Conference.2010.
Gartner ,Defining BYOD Ownership and Support Expectations in Contracts Ensures Successful Implementation”, Gartner, April 2014.
Gartner ,Gartner’s Three Rings of Information Governance Help You Prioritize Different Types of Data”, Gartner, July2014.
Gary P. Brinson, L. Randolph Hood and Gilbert L. Beebower .Determinants of Portfolio Performance.Financial Analysts Journal.Vol. 42, No. 4 (Jul. - Aug., 1986), pp. 39-44
Gianpiero Costantino, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra,”Towards Enforcing On-The-Fly Policies in BYOD Environments”,IEEE,2013.
Gurudatt Kulkarni,Vikas Solanke, Sangita Mohite, “Mobile Cloud Computing - Bring Your Own Device”,IEEE International Conference on Communication Systems and Network Technologies,2014.
Intel ,'Thrive on Consumerization How to manage the revolution and enhance user productivity'. Intel. p. 7. Retrieved 6 January 2013.
IBM ,“BYOD: Bring your own device – Why and how you should adopt BYOD”.IBM, 2013.
Janice Mayer and Leonardo Lemes Fagundes,” A Model to Assess the Maturity Level of the Risk Management Process in Information
Security”.IEEE,2009.
Jeanne Harris,Blake Ives,Iris Junglas,”IT Consumerization:When Gadgets Turn Into Enterprise IT Tools”,MIS Quarterly Executive,Sepetemper 2012(11:3).

Khoula AlHarthy,Wael Shawkat,”Implement Network Security Control Solutions in BYOD Environment”, IEEE International Conference on Control System, Computing and Engineering, 29 Nov. - 1 Dec. 2013.
Kyung-A Yoon, Seung-Hun Park,Doo-Hwan Bae,Hoon-Seon Chang,Jae-Cheon Jung.'A Framework for the V&V Capability Assessment Focused on the
Safety-Criticality'.IEEE.2005.
Meisam Eslahi, Maryam Var Naseri, H. Hashim, N.M. Tahir, Ezril Hisham Mat Saad,”BYOD:Current State and Security Challenges”,ISCAIE,April 7-8,2014.
Paul P. Tallona, Ronald V. Ramirezb & James E. Shortc
.'The Information Artifact in IT Governance: Toward a Theory of Information Governance'.JMIS.pages 141-178
Paul P. Tallon.” Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost”, IEEE Computer Society,2013.
P. C. Castro,J. W. Ligman,M. Pistoia,J. Ponzo,G. S. Thomas,S. P. Wood,M. Baluda,”Enabling Bring-Your-Own-Device using mobile application instrumentation”,IBM, J. RES. & DEV. VOL. 57 NO. 6 PAPER 7 NOVEMBER/DECEMBER 2013.
Rebecca ,Noel,. “Analyzing Consumerization - Should Enterprise
Business Context Determine Session Policy?”.IEEE International Conference on Intelligence in Next Generation Networks,2012.
Rossouw von Solmsa,S.H. (Basie) von Solmsb. 'Information Security Governance: A model based on the Direct–Control Cycle'.Elsevier Ltd.2006.
Rossouw Von Solms,Kerry-Lynn Thomson,Port Elizabeth. 'Information security governance control through comprehensive policy architectures'.2010.
Saaty,T.L.The Analytic Hierachy Process. New York:McGraw Hill.1980
SAP.”Case Study:BYOD at SAP”.2013.
Steven De Haes,Roger Debreceny,Wim Van Grembergen. Understanding the Core Concepts in COBIT 5. ISACA JOURNAL VOLUME 5, 2013
Rui Qiang,Yixian Jiang.'Enterprise Energy Saving and Emission Reduction Level Assessment Research Based on the Capability Maturity Model'.IEEE.2009.
The Economist.“The Open Corporation: How the app culture is changing how companies do business An Economist Intelligence Unit research programme sponsored by AT&T”. The Economist.
Vanier, D. (2001). Why Industry Needs Asset Management Tools. J. Comput. Civ. Eng. 15, special issue: information technology for life-cycle infrastructure management, 35–43.
V Khatri, CV Brown. Designing data governance.Communications of the ACM, 2010
Wim Van Grembergen .Aligning Business and Information Technology through the Balanced Scorecard at a Major Canadian Financial Group:its Status Measured with an IT BSC Maturity Model. Proceedings of the 34th Hawaii International Conference on System Sciences, 2001.
Weill,P.and Ross,J.W. IT governance: How top performers manage IT decision rights for superior results. Harvard Business School Press, Boston, MA, 2004.
Weill,P.and Ross,J.W. IT governance on one page. CISR WP No.349 and Sloan WP NO.4516-04,2004
Yin, Robert K. Case study research: Design and methods. Sage publications, 2014.
Yong Wang, Jinpeng Wei, Karthik Vangury,”Bring Your Own Device Security Issues and Challenges”, The 11th Annual IEEE CCNC- Mobile Device, Platform and Communication,2014.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/54633-
dc.description.abstract行動裝置日漸普及後,越來越多企業允許員工帶自己的無線設備到工作場所且能夠存取進入所屬公司之應用程式與資訊,即BYOD(Bring Your Own Device;員工自帶設備)IT消費化(The consumerization of IT)現象。
然而卻發現台灣企業針對此現象多採「維持現狀」等消極策略,本研究論文欲解決多數台灣企業對現行BYOD解決方案仍存疑慮且不瞭解自身的定位何在之問題。
本研究綜合文獻分析法、多重個案分析法、問卷調查法與AHP層級分析法,分析BYOD現象與現有BYOD解決方案之成功因素與關鍵影響因素,得出「企業BYOD成熟度評估指標」,包含「策略與預算」、「資訊安全技術」、「規範」、「資料治理」與「組織與人資」五大評估構面,並依此建構供企業評量BYOD現況表現之工具「企業BYOD成熟度自評量表」。
研究結果以「企業BYOD成熟度自評量表」問卷評量表現與AHP層級分析法之專家意見建立「企業BYOD成熟度評量基準」,供企業了解自身表現後,更清楚企業BYOD定位與改進方向。
zh_TW
dc.description.abstractWith the popularization of mobile devices, more and more companies allowed their employees bring their wireless devices to workplace and were able to access enterprise applications and information.This paradigm called BYOD (Bring Your Own devices).
Surprisingly, Taiwan companies still remained unchanged to BYOD paradigm. Most of them could not find their own position and had no practical solutions.
This research integrated literature reviews, multiple case studies, questionnaire survey and analytic hierarchy process (AHP).Through analyzing critical factors of BYOD phenomena and existing BYOD solutions,this research came up with “Enterprise BYOD Evaluation Indicators”,including “Strategy and Budget”,“ Information Security Technology”,“Compliance”, “Data Governance”and “Organization and Human Resource”and constructing “Enterprise BYOD Maturity Self-Rating Scale”.
Combining “Enterprise BYOD Maturity Self-Rating Scale”quesionnare results and AHP expert advices, this research established “Enterprise BYOD maturity assessment benchmarks”.Companies can use this BYOD assessment tool to examine their current status, and better knowing the direction of improvement.
en
dc.description.provenanceMade available in DSpace on 2021-06-16T03:36:03Z (GMT). No. of bitstreams: 1
ntu-104-R02725017-1.pdf: 5281852 bytes, checksum: 48615879334ec7415ef6d8397268e8af (MD5)
Previous issue date: 2015
en
dc.description.tableofcontents致謝辭 ii
中文摘要 iii
Abstract iv
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的 2
1.3 研究流程 2
1.4 論文架構 4
第二章 文獻探討 6
2.1 BYOD(Bring Your Own Device;員工自帶設備) 6
2.1.1 BYOD組成要素 7
2.1.2 BYOD成功要素 9
2.2 IT資產管理(IT asset management) 11
2.2.1 資產 11
2.2.2 IT資產與IT資產管理 13
2.3 IT治理(IT Governance) 15
2.3.1 IT平衡計分卡(IT Balanced Scorecard) 16
2.3.2 Control Objectives for Information and Related Technology 5(COBIT 5) 18
2.4 資訊安全 20
2.4.1資安控管 20
2.4.2相關技術 21
2.5資訊治理(Information Governance) 23
2.5.1資料之三環架構 23
2.5.2資料治理模型 24
第三章 研究設計與施行 26
3.1 研究方法 26
3.1.1 文獻分析法 26
3.1.2 個案分析法 27
3.1.3 問卷調查法 29
3.1.4 AHP(Analytic Hierarchy Process Theory)層級分析法 31
3.2 研究架構 35
3.3 資料整理與分析 36
3.3.1多重個案研究 36
3.3.2企業BYOD評估指標 45
第四章 研究結果與討論 49
4.1 企業BYOD成熟度自評量表 49
4.1.1 臺灣企業普遍BYOD現況與企業規模 49
4.1.2 企業BYOD成熟度評估指標表現 52
4.2 AHP層級分析法 65
4.2.1 研究之「層級架構」 65
4.2.2 AHP問卷填答 65
4.2.3 AHP一致性檢定 66
4.2.4 各層評估結果與分析 68
4.2.5 整體分析 75
4.3 比較分析 76
4.3.1量表結果成熟度分析 76
4.3.2量表與AHP層級排序比較 78
4.4 企業BYOD成熟度指標評估依據 79
第五章 研究結論與建議 81
5.1研究結論 81
5.2研究建議 82
5.3未來方向 83
參考文獻 85
附錄A 90
附錄B 100
dc.language.isozh-TW
dc.subjectIT治理zh_TW
dc.subjectBYODzh_TW
dc.subject成熟度評估zh_TW
dc.subject資料治理zh_TW
dc.subjectAHP層級分析法zh_TW
dc.subjectBYODzh_TW
dc.subject成熟度評估zh_TW
dc.subjectIT治理zh_TW
dc.subject資料治理zh_TW
dc.subjectAHP層級分析法zh_TW
dc.subjectData Governanceen
dc.subjectIT Governanceen
dc.subjectanalytic hierarchy process (AHP)en
dc.subjectBYODen
dc.subjectanalytic hierarchy process (AHP)en
dc.subjectData Governanceen
dc.subjectIT Governanceen
dc.subjectMaturity Assessmenten
dc.subjectBYODen
dc.subjectMaturity Assessmenten
dc.title建構BYOD成熟度評估指標─台灣ICT企業之研究zh_TW
dc.titleA BYOD Assessment of ICT Industries in Taiwanen
dc.typeThesis
dc.date.schoolyear103-2
dc.description.degree碩士
dc.contributor.oralexamcommittee許瑋元,王貞雅
dc.subject.keywordBYOD,成熟度評估,IT治理,資料治理,AHP層級分析法,zh_TW
dc.subject.keywordBYOD,Maturity Assessment,IT Governance,Data Governance,analytic hierarchy process (AHP),en
dc.relation.page104
dc.rights.note有償授權
dc.date.accepted2015-06-22
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-104-1.pdf
  未授權公開取用
5.16 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved