請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/54633完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 曹承礎 | |
| dc.contributor.author | Hui-Chuan Chang | en |
| dc.contributor.author | 張惠娟 | zh_TW |
| dc.date.accessioned | 2021-06-16T03:36:03Z | - |
| dc.date.available | 2020-08-11 | |
| dc.date.copyright | 2015-08-11 | |
| dc.date.issued | 2015 | |
| dc.date.submitted | 2015-06-22 | |
| dc.identifier.citation | 中文文獻
鄧振源、曾國雄(1989a),層級分析法(AHP)的內涵特性與應用(上),中國統計學報,27(6),5-22。 鄧振源、曾國雄(1989b),層級分析法(AHP)的內涵特性與應用(下),中國統計學報,27(7),1-20。 褚士瑩(2009),層級分析法(AHP)理論與實作[線上資料],來源:http://faculty.ndhu.edu.tw/~chpchu/POMR_Taipei_2009/AHP2009.pdf。 高振源(2011),建構資安治理成熟度評估指標之研究─以某政府機關為例,中國文化大學資訊安全產業研發碩士班。 張維君(2014),開放BYOD讓Intel資安風險不升反降,資安人。 楊晨欣(2013),英特爾開放BYOD,年省5百萬個工時,iThome。 ITIS智網(2013),資策會MIC經濟部ITIS計畫,資通訊服務產業年鑑。 CIO大調查(2014),CIO IT經理人。 英文文獻 Aceng Salim,Arry Akhmad Arman.'Development of Assessment Method for Information Technology and Business'.IEEE International Conference on Electrical Engineering and Computer Science.24-25 November 2014 Antonio Scarfò,”New security perspectives around BYOD”,IEEE International Conference on Broadband, Wireless Computing, Communication and Applications,2012. Brian Katz,“Why almost everyone gets it wrong about BYOD”,InfoWorld,2013 D. Jaramillo,N. Katz,B. Bodin,W. Tworek,R. Smart,T. Cook,”Cooperative solutions for Bring Your Own Device(BYOD)”,IBM,2013. Falahah.” Implementation of Modified Maturity Level Measurement Model for All COBIT Framework (Case Study: IT Management Audit ofPT.POS Indonesia)”. Proceeding 3rtl International Conference.2010. Gartner ,Defining BYOD Ownership and Support Expectations in Contracts Ensures Successful Implementation”, Gartner, April 2014. Gartner ,Gartner’s Three Rings of Information Governance Help You Prioritize Different Types of Data”, Gartner, July2014. Gary P. Brinson, L. Randolph Hood and Gilbert L. Beebower .Determinants of Portfolio Performance.Financial Analysts Journal.Vol. 42, No. 4 (Jul. - Aug., 1986), pp. 39-44 Gianpiero Costantino, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra,”Towards Enforcing On-The-Fly Policies in BYOD Environments”,IEEE,2013. Gurudatt Kulkarni,Vikas Solanke, Sangita Mohite, “Mobile Cloud Computing - Bring Your Own Device”,IEEE International Conference on Communication Systems and Network Technologies,2014. Intel ,'Thrive on Consumerization How to manage the revolution and enhance user productivity'. Intel. p. 7. Retrieved 6 January 2013. IBM ,“BYOD: Bring your own device – Why and how you should adopt BYOD”.IBM, 2013. Janice Mayer and Leonardo Lemes Fagundes,” A Model to Assess the Maturity Level of the Risk Management Process in Information Security”.IEEE,2009. Jeanne Harris,Blake Ives,Iris Junglas,”IT Consumerization:When Gadgets Turn Into Enterprise IT Tools”,MIS Quarterly Executive,Sepetemper 2012(11:3). Khoula AlHarthy,Wael Shawkat,”Implement Network Security Control Solutions in BYOD Environment”, IEEE International Conference on Control System, Computing and Engineering, 29 Nov. - 1 Dec. 2013. Kyung-A Yoon, Seung-Hun Park,Doo-Hwan Bae,Hoon-Seon Chang,Jae-Cheon Jung.'A Framework for the V&V Capability Assessment Focused on the Safety-Criticality'.IEEE.2005. Meisam Eslahi, Maryam Var Naseri, H. Hashim, N.M. Tahir, Ezril Hisham Mat Saad,”BYOD:Current State and Security Challenges”,ISCAIE,April 7-8,2014. Paul P. Tallona, Ronald V. Ramirezb & James E. Shortc .'The Information Artifact in IT Governance: Toward a Theory of Information Governance'.JMIS.pages 141-178 Paul P. Tallon.” Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost”, IEEE Computer Society,2013. P. C. Castro,J. W. Ligman,M. Pistoia,J. Ponzo,G. S. Thomas,S. P. Wood,M. Baluda,”Enabling Bring-Your-Own-Device using mobile application instrumentation”,IBM, J. RES. & DEV. VOL. 57 NO. 6 PAPER 7 NOVEMBER/DECEMBER 2013. Rebecca ,Noel,. “Analyzing Consumerization - Should Enterprise Business Context Determine Session Policy?”.IEEE International Conference on Intelligence in Next Generation Networks,2012. Rossouw von Solmsa,S.H. (Basie) von Solmsb. 'Information Security Governance: A model based on the Direct–Control Cycle'.Elsevier Ltd.2006. Rossouw Von Solms,Kerry-Lynn Thomson,Port Elizabeth. 'Information security governance control through comprehensive policy architectures'.2010. Saaty,T.L.The Analytic Hierachy Process. New York:McGraw Hill.1980 SAP.”Case Study:BYOD at SAP”.2013. Steven De Haes,Roger Debreceny,Wim Van Grembergen. Understanding the Core Concepts in COBIT 5. ISACA JOURNAL VOLUME 5, 2013 Rui Qiang,Yixian Jiang.'Enterprise Energy Saving and Emission Reduction Level Assessment Research Based on the Capability Maturity Model'.IEEE.2009. The Economist.“The Open Corporation: How the app culture is changing how companies do business An Economist Intelligence Unit research programme sponsored by AT&T”. The Economist. Vanier, D. (2001). Why Industry Needs Asset Management Tools. J. Comput. Civ. Eng. 15, special issue: information technology for life-cycle infrastructure management, 35–43. V Khatri, CV Brown. Designing data governance.Communications of the ACM, 2010 Wim Van Grembergen .Aligning Business and Information Technology through the Balanced Scorecard at a Major Canadian Financial Group:its Status Measured with an IT BSC Maturity Model. Proceedings of the 34th Hawaii International Conference on System Sciences, 2001. Weill,P.and Ross,J.W. IT governance: How top performers manage IT decision rights for superior results. Harvard Business School Press, Boston, MA, 2004. Weill,P.and Ross,J.W. IT governance on one page. CISR WP No.349 and Sloan WP NO.4516-04,2004 Yin, Robert K. Case study research: Design and methods. Sage publications, 2014. Yong Wang, Jinpeng Wei, Karthik Vangury,”Bring Your Own Device Security Issues and Challenges”, The 11th Annual IEEE CCNC- Mobile Device, Platform and Communication,2014. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/54633 | - |
| dc.description.abstract | 行動裝置日漸普及後,越來越多企業允許員工帶自己的無線設備到工作場所且能夠存取進入所屬公司之應用程式與資訊,即BYOD(Bring Your Own Device;員工自帶設備)IT消費化(The consumerization of IT)現象。
然而卻發現台灣企業針對此現象多採「維持現狀」等消極策略,本研究論文欲解決多數台灣企業對現行BYOD解決方案仍存疑慮且不瞭解自身的定位何在之問題。 本研究綜合文獻分析法、多重個案分析法、問卷調查法與AHP層級分析法,分析BYOD現象與現有BYOD解決方案之成功因素與關鍵影響因素,得出「企業BYOD成熟度評估指標」,包含「策略與預算」、「資訊安全技術」、「規範」、「資料治理」與「組織與人資」五大評估構面,並依此建構供企業評量BYOD現況表現之工具「企業BYOD成熟度自評量表」。 研究結果以「企業BYOD成熟度自評量表」問卷評量表現與AHP層級分析法之專家意見建立「企業BYOD成熟度評量基準」,供企業了解自身表現後,更清楚企業BYOD定位與改進方向。 | zh_TW |
| dc.description.abstract | With the popularization of mobile devices, more and more companies allowed their employees bring their wireless devices to workplace and were able to access enterprise applications and information.This paradigm called BYOD (Bring Your Own devices).
Surprisingly, Taiwan companies still remained unchanged to BYOD paradigm. Most of them could not find their own position and had no practical solutions. This research integrated literature reviews, multiple case studies, questionnaire survey and analytic hierarchy process (AHP).Through analyzing critical factors of BYOD phenomena and existing BYOD solutions,this research came up with “Enterprise BYOD Evaluation Indicators”,including “Strategy and Budget”,“ Information Security Technology”,“Compliance”, “Data Governance”and “Organization and Human Resource”and constructing “Enterprise BYOD Maturity Self-Rating Scale”. Combining “Enterprise BYOD Maturity Self-Rating Scale”quesionnare results and AHP expert advices, this research established “Enterprise BYOD maturity assessment benchmarks”.Companies can use this BYOD assessment tool to examine their current status, and better knowing the direction of improvement. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-16T03:36:03Z (GMT). No. of bitstreams: 1 ntu-104-R02725017-1.pdf: 5281852 bytes, checksum: 48615879334ec7415ef6d8397268e8af (MD5) Previous issue date: 2015 | en |
| dc.description.tableofcontents | 致謝辭 ii
中文摘要 iii Abstract iv 第一章 緒論 1 1.1 研究背景與動機 1 1.2 研究目的 2 1.3 研究流程 2 1.4 論文架構 4 第二章 文獻探討 6 2.1 BYOD(Bring Your Own Device;員工自帶設備) 6 2.1.1 BYOD組成要素 7 2.1.2 BYOD成功要素 9 2.2 IT資產管理(IT asset management) 11 2.2.1 資產 11 2.2.2 IT資產與IT資產管理 13 2.3 IT治理(IT Governance) 15 2.3.1 IT平衡計分卡(IT Balanced Scorecard) 16 2.3.2 Control Objectives for Information and Related Technology 5(COBIT 5) 18 2.4 資訊安全 20 2.4.1資安控管 20 2.4.2相關技術 21 2.5資訊治理(Information Governance) 23 2.5.1資料之三環架構 23 2.5.2資料治理模型 24 第三章 研究設計與施行 26 3.1 研究方法 26 3.1.1 文獻分析法 26 3.1.2 個案分析法 27 3.1.3 問卷調查法 29 3.1.4 AHP(Analytic Hierarchy Process Theory)層級分析法 31 3.2 研究架構 35 3.3 資料整理與分析 36 3.3.1多重個案研究 36 3.3.2企業BYOD評估指標 45 第四章 研究結果與討論 49 4.1 企業BYOD成熟度自評量表 49 4.1.1 臺灣企業普遍BYOD現況與企業規模 49 4.1.2 企業BYOD成熟度評估指標表現 52 4.2 AHP層級分析法 65 4.2.1 研究之「層級架構」 65 4.2.2 AHP問卷填答 65 4.2.3 AHP一致性檢定 66 4.2.4 各層評估結果與分析 68 4.2.5 整體分析 75 4.3 比較分析 76 4.3.1量表結果成熟度分析 76 4.3.2量表與AHP層級排序比較 78 4.4 企業BYOD成熟度指標評估依據 79 第五章 研究結論與建議 81 5.1研究結論 81 5.2研究建議 82 5.3未來方向 83 參考文獻 85 附錄A 90 附錄B 100 | |
| dc.language.iso | zh-TW | |
| dc.subject | IT治理 | zh_TW |
| dc.subject | BYOD | zh_TW |
| dc.subject | 成熟度評估 | zh_TW |
| dc.subject | 資料治理 | zh_TW |
| dc.subject | AHP層級分析法 | zh_TW |
| dc.subject | BYOD | zh_TW |
| dc.subject | 成熟度評估 | zh_TW |
| dc.subject | IT治理 | zh_TW |
| dc.subject | 資料治理 | zh_TW |
| dc.subject | AHP層級分析法 | zh_TW |
| dc.subject | Data Governance | en |
| dc.subject | IT Governance | en |
| dc.subject | analytic hierarchy process (AHP) | en |
| dc.subject | BYOD | en |
| dc.subject | analytic hierarchy process (AHP) | en |
| dc.subject | Data Governance | en |
| dc.subject | IT Governance | en |
| dc.subject | Maturity Assessment | en |
| dc.subject | BYOD | en |
| dc.subject | Maturity Assessment | en |
| dc.title | 建構BYOD成熟度評估指標─台灣ICT企業之研究 | zh_TW |
| dc.title | A BYOD Assessment of ICT Industries in Taiwan | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 103-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 許瑋元,王貞雅 | |
| dc.subject.keyword | BYOD,成熟度評估,IT治理,資料治理,AHP層級分析法, | zh_TW |
| dc.subject.keyword | BYOD,Maturity Assessment,IT Governance,Data Governance,analytic hierarchy process (AHP), | en |
| dc.relation.page | 104 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2015-06-22 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
| 顯示於系所單位: | 資訊管理學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-104-1.pdf 未授權公開取用 | 5.16 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
