To see the other types of publications on this topic, follow the link: BYOT.

Dissertations / Theses on the topic 'BYOT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'BYOT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Winterhalder, Joy Erin. "Teachers' Perceptions and Experiences in Implementing Mobile Devices Into Their Teaching." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3377.

Full text
Abstract:
This phenomenological study addressed the lack of understanding of how teachers implement personal devices in the classroom and whether the instruction is constructivist in nature. Although mobile technology is convenient, it is not yet understood if Bring Your Own Device/Technology (BYOD/BYOT) programs encourage a teacher pedagogy shift. The purpose of this qualitative study was to explore the perceptions and lived experiences of 10 teachers in Grades 6 to 12 who had been part of a BYOD/BYOT program for more than 2 years. Data from interviews and lesson demonstrations were analyzed via a constructivist framework first identifying themes and then categories. Teachers perceived that using mobile technology provided the replacement of old tools, instructional planning changes, and the shifting of learning to the students from the traditional design of the teacher as the lecturer to the teacher as the facilitator. Teachers experienced more student engagement and collaboration although they needed to monitor students more carefully to avoid students' being off task and to ensure safety usage of the mobile devices in the classroom. There are implications for social change both on the local and organizational level. Teachers can better understand how their pedagogy aligns with constructivist teaching and learning, and therefore can see where they still need to grow. On the organizational level, school districts may better understand that using technology at first will be used to replace previous pedagogy practices directly and that it will take support and time for technology implementation to impact changes in teachers' philosophy of teaching.
APA, Harvard, Vancouver, ISO, and other styles
2

Cardoza, Yanet. "An Exploration of Teachers' Adoption of the Bring Your Own Technology Program." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc283863/.

Full text
Abstract:
The purpose of this study was to explore teachers' concerns, use, and actual practices in their adoption of the bring your own technology (BYOT) initiative. Twelve secondary teachers in a private school setting participated in this study. The participants represented all content areas including reading, math, science, and electives. The private school was in its third year of implementing BYOT. This case study incorporated multiple methods to collect data to gain a better understanding of teachers' adoption of an innovation, BYOT. The concerns-based adoption model (CBAM) was used as a theoretical framework. All three CBAM tools provided data: the Stages of Concern Questionnaire (SoCQ), levels of use interview protocol (LoUIP), and the innovation configuration (IC) map. Twelve of the participants completed the SoCQ across three different points in time. Six of the twelve teachers participated in three one-on-one interviews, including the LoUIP. Additionally, six teachers were observed in their classrooms during instruction. After triangulating all pieces of data, the majority of teachers had highest concerns related to self. Teachers were concerned about their ability to implement the innovation and managing BYOT in their classroom. Four of the six teachers had a level of use (LoU) at mechanical, and two teachers had a LoU at routine. The teachers' LoU indicated that they are using BYOT in the classroom; however, the majority of teachers observed had adoption practices mostly in the non-ideal variations of IC. The teachers' LoU and IC indicated that teachers had implemented BYOT in their own way and not necessarily in alignment with the campus' vision or expectations. This case study had several limitations, including the small number of participants and the brevity of classroom observations. Additionally, this study was limited to one school setting. Recommendations for future research include exploring teachers' adoption of BYOT in various school settings (i.e., both public and private schools) and teachers at the elementary, middle, and high school levels. Researchers should consider exploring the impact of specific interventions and support on teachers' adoption.
APA, Harvard, Vancouver, ISO, and other styles
3

Scholz, Carol Louise. "A Study of the Application of a Bring Your Own Device Strategy in an Elementary School." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2689.

Full text
Abstract:
Numerous studies have been published on the efficacy of a Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) at the U.S. secondary and postsecondary school levels to increase student access to technology. However, there is a lack of data on the efficacy of a BYOD AUP to increase elementary student technology access. The purpose of this descriptive case study was to determine if a BYOD AUP at the U.S. K-5 level would increase students' access to technology as necessitated by the implementation of the Common Core State Standards (CCSS). This study was grounded in social transmission and transformative theories. The phenomenon of a northwest suburban elementary school BYOD implementation was examined by documenting the perceptions, attitudes, beliefs, lived experiences, and practices of administrators and teachers. This study used interview and classroom observation of a purposive selection of 3 elementary educators, the principal, and superintendent. Coding of data according to key words lead to analysis according to nodes and themes. Triangulation of multiple data sources and member checking helped to establish the credibility of data. Study findings documented increased access to technology for elementary students, best practices and steps to implementation. Study recommendations for elementary educators and administrators considering BYOD include consensus building, AUP, technology infrastructure, communications, professional development, classroom management, and lesson design to inform the field on elementary BYOD. Study findings facilitate social change by providing BYOD implementation recommendations, increasing elementary student access to technology at a reduced cost to districts and schools.
APA, Harvard, Vancouver, ISO, and other styles
4

Asparuhov, Lachezar. "BYOD - Risks, Solutions and Guidelines." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-48630.

Full text
Abstract:
During the past few years the use of mobile devices became extremely popular not only for personal use but also for working. When personal mobile devices are used as working assets the enterprises should search for some suitable ways to protect their data and network from the unmanaged mobile devices. On the other hand, it is widely believed that employees are more productive when they work from their own devices. This arise three questions: what risks these devices are bringing to the organizations, how to protect the company data and network while allowing the employees to work from their devices, and how adapted the real world is to the Bring Your Own Device trend. To answer these questions and the sub-questions deriving from them, an extensive literature study and a survey approach are used. The results from the study show that even though there are many risks for the companies, brought by the use of personal mobile devices, there exist adequate solutions to mitigate these risks. However, the results from the survey approach show that the companies are not very adapted to this trend yet and there exist a need for better understanding of the problem.
APA, Harvard, Vancouver, ISO, and other styles
5

MAGNUSSON, MALIN. "Vidareutveckling av sport-bh för större byst." Thesis, Högskolan i Borås, Institutionen Textilhögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17530.

Full text
Abstract:
I denna studie behandlas vidareutvecklingen en sport-bh för kvinnor med stor byst. Forskning inom relaterade områden, såsom begreppen ”encapsulation” och ”compression”, studier av bröstens rörelsemönster under fysisk aktivitet, storlekssystem och bröstens anatomiska förutsättningar, har studerats för att ytterligare hjälpa utvecklingen av denna produkt. En mindre enkät utfördes bland vanliga, på olika sätt, fysiskt aktiva, kvinnor för att avgöra vilka preferenser dessa hade gällande sport-bh. Denna information har sedan tillämpats, i möjlig mån, på produktutvecklingen. Förutsättningar för den fysiska produkten, som designönskemål och ett begränsat materialutbud, har satt upp ramar för utvecklingsprocessen, som gått igenom CAD-baserad mönsterkonstruktion, samt drapering, avprovning och testning.
Program: Designteknikerutbildningen
APA, Harvard, Vancouver, ISO, and other styles
6

Zagray, Peter G. "BYOD: The PreK-12 Technology Leader's Perspective." Youngstown State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1559239825777546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Svensson, Markus, and Alexander Svensson. "Bring Your Own Device (BYOD) : Potentialen och problematiken." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23228.

Full text
Abstract:
Många konsumenter är snabbare än organisationer på att börja använda ny teknik och utrustning. När de sedan tar med denna utrustning och teknik till arbetet för att på ett mer tillfredsställande sätt utföra sina arbetsuppgifter uppstår fenomenet BYOD som har blivit allt vanligare och vanligare. Syftet med denna studie är att ta reda på vad fenomenet BYOD är och hur det påverkar organisationer som anammar det. Dess fördelar och risker har undersökts samt fenomenets utbredning bland svenska organisationer. Tidigare undersökningar har legat till grund för att identifiera ofta förekommande fördelar och risker. Utifrån dessa har sedan en enkätundersökning utformats som skickats ut till svenska organisationer. Undersökningen visar att BYOD medför vissa fördelar. Dessa är t.ex. ökad produktivitet och kreativitet bland de anställda vilket i sin tur ger organisationer en ökad operationell effektivitet, fler nöjda, flexibla och mobila anställda och bättre kundbemötande. Undersökningen visar även att många organisationer saknar en formell BYOD-policy och att stöld eller borttappade enheter är ett stort säkerhetsproblem. Stora orosmomenten bland organisationerna är bland annat ökad belastning på IT-avdelningen och undermålig enhetssäkerhet. Det är viktigt att organisationer som anammar BYOD tänker på säkerhetslösningar som mitigerar dessa risker.
APA, Harvard, Vancouver, ISO, and other styles
8

Veljkovic, Ivan. "BYOD: Risk considerations in a South African organisation." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29850.

Full text
Abstract:
In recent times, while numerous organisations have difficulty keeping abreast with the frequent year-on-year technology changes, their employees on the other hand, continue to bring their personal devices to work to more readily access organisational data. This concept is known as Bring Your Own Device (BYOD). Studies have demonstrated that the introduction of BYOD commonly has a positive effect on both organisation and employees: increased optimism, job satisfaction and productivity are some of the perceived positive effects. Furthermore, BYOD can improve employees’ opportunities for mobile working and assist with the work flexibility they seek. This phenomenon, however, is still not well understood. In the South African context, this refers particularly to an inadequate understanding of risks associated with the introduction of BYOD into organisations. Some of the risks associated with this phenomenon are, for instance, related to information security, legislation and privacy issues. Hence, the intention of this research was to investigate, determine and assess BYOD risk considerations in a South African organisation. Using the available literature on this subject and an interpretative exploratory case study approach, this research explored various facets of BYOD-related risks (e.g. implementational, technological, legislation, regulation and privacy risks, human aspects and organisational concerns) as well as the impact these risks may have on both employees and an organisation. The organisation under investigation – from this point onward referred to as “Organisation A” – is a South African based information technology (IT) security consulting and service management organisation, which has seen increased expansion in its business and thus an increase in the number of its employees utilising their personal devices at the workplace. Even so, Organisation A was uncertain regarding possible risks that might hinder benefits of BYOD. Hence, this researcher defined the main research question as “What are the risks of introducing the BYOD in the South African organisation and what is an effective approach to address identified risks?”. The main objective was to identify and describe BYOD-related risks and to propose an appropriate model for addressing these risks. To answer the main research question, this researcher reviewed the applicable literature on the BYOD, including the limited South African literature pertaining to the subject. The review elicited the most common BYOD-related risks but also some models, frameworks and standards that may be applied for addressing these risks. Based on these revelations, an applicable BYOD risk management model was created and proposed. The literature review findings were subsequently tested in the empirical setting (in Organisation A) by conducting comprehensive interviews with research participants. This research adopted a qualitative approach in general and a case study methodology in particular. The collected data were analysed using the interpretative phenomenological analysis (IPA), which aided in providing a comprehensive understanding of the interviewees’ responses regarding the BYOD risks. The interviewees were selected based on a purposeful (pre-defined) sampling. The results of this interpretative research suggest that the interviewees’ responses are closely aligned with the information on BYOD risks collected from the pertinent literature. The results show that successful introduction and usage of BYOD in the studied organisation requires the implementation of mixed risk management measures: technological (e.g. mobile device management and its additional components), non-technological (e.g. IT or BYOD security policies), the usage of general risk management frameworks (e.g. ISO 27001), the development of an organisational security culture and skilling of the human factor (e.g. employee awareness, training and education, for example). Additionally, it was found that participation of employees in the development of BYOD policies is an essential and effective tactic for transforming a fragile BYOD risk link (i.e. employees) into a strong risk prevention mechanism. Furthermore, this research also revealed that in the South African context, it is important that an organisation’s BYOD security policies are sound, preferably meeting the POPI Act requirements and thereby avoiding legislation risks. The contribution of this research is twofold: first academic, and second, practical. The academic contribution is realised by adding to the body of knowledge on the BYOD risks – most particularly in terms of understanding potential risks when introducing BYOD in the South African context. The practical contribution manifests through the provision of detailed risk considerations and mitigation guidelines for organisations wishing to introduce BYOD practices or considering ways to improve their current BYOD risk management strategy. It is acknowledged that this research has some limitations, particularly in regard to the limited generalisation of the findings due to the limited sample provided by only one organisation. Although the results are not necessarily applicable to other South African organisations, these limitations did not impact the relevance and validity of this research.
APA, Harvard, Vancouver, ISO, and other styles
9

Pokorný, David. "Zavedení BYOD pro notebooky v Telefónica Czech Republic." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-198248.

Full text
Abstract:
This thesis deals with the implementation of the Bring Your Own Device program for employee's private laptops at Telefonica Czech Republic. It describes the solution using a distributed virtualization. The private laptops are given identical system environments as standard corporate laptops. The solution of the problem is set in the environment of the real corporation. Areas focused on the establishment and operation of the program are security, technology, finance and processes.
APA, Harvard, Vancouver, ISO, and other styles
10

Jönsson, Mariela. ""Byt babyrösten mot dirty snack"." Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-24227.

Full text
Abstract:
The overall aim of this study is to examine how Swedish women’s youth- magazines describes women. Through a social constructivist perspective, this essay particularly focuses on how the magazines deals with issues of gender and sexuality and what norms they reproduce. The magazine’s image of the young Swedish woman is a somewhat complex one, although one thing is strikingly clear: she is very different from men. While adjectives as hard, cold and tough are being ascribed to the latter, the woman is often depicted with more “soft” qualities. In some cases she is portrayed as an emotional and goodhearted little princess that faithfully is waiting for “mr. Right” (heterosexuality is a consistent assumption), while in other cases the magazines seem to urge her to take responsibility for both her own and the man’s sexuality and pleasure.
APA, Harvard, Vancouver, ISO, and other styles
11

von, Bahr Felix, and Mikael Lundgren. "Ur bankkundens synvinkel : – vad skiljer i uppfattningen av bankerna mellan de kunder som bytt bank och de som inte bytt bank." Thesis, Umeå University, Umeå School of Business, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-1855.

Full text
Abstract:

Bankmarknaden i Sverige har genomgått stora förändringar under de senaste åren. En rad nya aktörer har etablerat sig på bankmarknaden och till följd av detta så har konkurrensen ökat. Denna ökade konkurrens har medfört att kundrörligheten ökat mellan bankerna och vi har på senare år sett att många kunder lämnat de fyra storbankerna för bättre villkor hos de mindre och mer specialiserade nischbankerna. Trots denna utveckling så har de fyra storbankerna cirka 80% av bankmarknaden i dagsläget och kunderna verkar i stor utsträckning vara ovilliga att byta bank. Utifrån denna bakgrund undrar vi varför inte fler bankkunder i Sverige byter bank när det borde vara välkänt att många skulle tjäna pengar på att göra detta. Vi beslutade således att undersöka vilka faktorer som påverkar valet av bank samt undersöka om det finns hinder eller relationer på bankmarknaden som förhindrar en högre grad av kundrörlighet.

Syftet med denna studie är att beskriva och förklara hur kundernas uppfattningar av bankerna skiljer sig mellan de som bytt bank och de som inte bytt bank i ett försök at utreda hur det kommer sig att konsumenter uppfattar bankbytet som svårt, krångligt och tidsödande. Våra delsyften är att beskriva de relationsband och byteshinder som finns på bankmarknaden samt undersöka hur uppfattningen om dessa hinder och band skiljer sig mellan de som bytt bank och de som inte bytt bank.

För att avspegla kundernas syn på bankerna så är vår studie skriven ur ett kundperspektiv. Vi har valt att genomföra en kvantitativ studie genom att med en enkätundersökning utförd i Umeå se hur bankkunderna uppfattar sina banker. Våra respondenter delades in två grupper efter de som bytt bank och de som inte bytt bank för att få en bild av hur uppfattningarna skiljde sig mellan dessa grupper. Som grund för undersökningen har vi valt ut teorier inom områdena upplevd tjänstekvalitet, relationsband samt byteshinder. Vi har presenterat hur teorierna inom dessa områden har utvecklats från sina ursprungsförfattare till dagens forskning för att säkerställa att vi har en solid grund att basera resterande delar av vårt arbete på.

Vi presenterat våra undersökningsresultat i empiriavsnittet där vi med hjälp av korstabeller och chi-två test tar fram statistiskt signifikanta skillnader mellan de som bytt bank och de som inte bytt bank. Dessa skillnader diskuteras därefter utförligt i vår analys där vi tar upp skillnaderna var för sig och diskuterar olika förklaringarna till varför dessa skillnader existerar. I analysen jämför vi även våra undersökningsresultat med vår teoretiska referensram och visar vilka samband som finns mellan vår studie och tidigare forskning.

Vår undersökning visar att bankkunderna uppfattar att det finns ett antal hinder på bankmarknaden, främst inom ett antal kostnader för kunden som ett byte medför. De som bytt bank uppfattar krångel med blanketter och inlärandet av nya system som det vanligaste hindren medan de som inte bytt bank anser att kundtröghet och papperskrångel är de vanligaste hindren. De som inte bytt bank prioriterar tjänstekvalitet och personliga relationer i högre rad än de som bytt bank. I motsats till detta så är ekonomiska faktorer viktigare för de som bytt bank än för de som inte bytt bank vilket antagligen är förklaringen till att de som bytt bank faktiskt har genomfört ett bankbyte.

Avslutningsvis så redogör vi för att det som skiljer i uppfattningarna av bankerna mellan de kunder som bytt bank och de som inte bytt är hur de prioriterar tjänstekvalitet, ekonomiska faktorer och relationen till banken.

APA, Harvard, Vancouver, ISO, and other styles
12

Räftegård, Simon, Rickard Sandin, and Anna Segerbom. "Vi har bytt adress : medarbetares upplevelser av nya kontorslokaler." Thesis, Högskolan i Borås, Akademin för vård, arbetsliv och välfärd, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-10331.

Full text
Abstract:
Kontorsmiljön kan variera beroende på arbetsplats, därför anses det viktigt att studera hur den fysiska kontorsmiljön kan påverka arbetstagarnas trivsel, gemenskap och arbetssituation. Tidigare forskning har visat att faktorer så som antal personer som delar kontorsrum eller individens möjlighet till att sitta avskilt kan ha en påverkan på arbetstagarens känsla av sammanhang i sitt arbete. Till och med arbetstagarens upplevelse av kontorets luftkvalitet och belysning har visat påverka arbetstagarnas beteenden i arbetet. I januari 2016 bytte arbetstagarna inom Hälso- och Sjukvårdssektorn i en av Göteborgs stads stadsdelsförvaltningar kontorslokaler, de flyttade från kontorslokaler i ett äldreboende till ett av kommunens kontorslokaler. Syftet med denna studie var att få en bättre förståelse över hur deras nya kontorsmiljö kan ha påverkat arbetstagarnas arbetssituation samt känsla av gemenskap och trivsel. Studien genomfördes med hjälp av kvalitativa intervjuer med nio av Hälso- och Sjukvårdssektorns medarbetare samt en mindre observation av den fysiska arbetsmiljön i deras nya kontorslokaler. De mest framträdande slutsatserna som drogs i studien var att det nya kontoret bidrog till att alla sektorns funktioner nu delar kontorslokal. Något som haft en stark påverkan på arbetstagarnas arbetssituation, gemenskap och trivsel. Då de nu fått en förbättrad kommunikation   mellan funktionerna, vilket även bidragit till bättre förutsättningar för samarbete. Studiens resultat visade även att kontorens storlek, struktur och fysiska attribut hade en påverkan av arbetstagarens känsla av sammanhang, genom att skapa bättre förutsättningar för ordning, kontroll och samarbete.
The office environment can variate in different workplaces, therefore it’s important to research how much the physical office environment can influence the employees’ work situation and feeling of community and wellbeing. Previous research has shown that factors such as the amount of people in an office space or the possibility to privacy can influence the employees’ sense of coherence in their work. Even the employees’ experience of the air quality and light has been shown to affect the employees’ behavior at work. In January of 2016 the employees at the Health Care sector in one of the city districts in Göteborgs stad moved their offices, from offices in an old retirement home to a county office building. The purpose of this research is to get a better understanding of how the new office environment have influenced the employees’ experience in regards to their new work situation and feeling of community and wellbeing. The research was conducted with the help of quality based interviews with nine employees and a small observation of the physical work environment at the Heath Care sector’s new office spaces. The major findings in this study showed that the new closeness, were the different functions within the sector now share the same office space, has had a clear influence on the employees work situation and feelings of community and wellbeing. Where the communication between the functions has improved, something that also has improved their conditions for cooperation. The study also showed that the size, the structure and the physical attributed of the office space has had an influence on the employees’ sense of coherence, by creating better conditions for organization, control and cooperation.
APA, Harvard, Vancouver, ISO, and other styles
13

Berglund, Emil, and Alexander Facklam. "Framgång eller förfall? : Utvecklingen, riskerna och potentialen av BYOD." Thesis, Uppsala universitet, Institutionen för informatik och media, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-297581.

Full text
Abstract:
Uppsatsen undersöker fenomenet Bring Your Own Device (BYOD), dess för- och nackdelar samt hur riskerna BYOD medför kan hanteras. För att uppnå detta har en litteraturstudie genomförts. Denna kompletteras av en enkätstudie på Stockholms Läns Landsting och tre intervjuer på Uppsala Kommun med målet att se hur dessa organisationer hanterar BYOD. Arbetet ger en djup insikt i BYOD olika aspekter och visar även på hur de risker som uppkommer kan hanteras.
APA, Harvard, Vancouver, ISO, and other styles
14

Forsberg, Evelina. "Enterprise Voice Simulation (EVS) för mobila enheter i BYOD miljö." Thesis, Umeå universitet, Institutionen för tillämpad fysik och elektronik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-91569.

Full text
Abstract:
Denna rapport introducerar Umeå universitets bakgrund till införandet av Lync Server 2013 som etablerades stabilt år 2014. Det trådlösa nätverket vid Umeå universitet trafikeras av studenter och anställda med mobila enheter som smartphones och laptops. Vid användandet av mobila enheter stiger flödesströmningen I det trådlösa nätverket med olika typer av trafiker. I denna rapport omfattas närmare ”Voice UDP” och ”Lync Enterprise Voice” med fokus på trängselkontroller vid överföringar av RTP-trafik mellan mobila klienter och 802.11 för att identifiera kvalitén i Lync-samtal, ”VoIP over WLAN”. Metoden baserades på referenser med MOS-skala 1 till 5 i syfte att jämföra vilka mobila enheter som bör kvalificeras till bästa uppnådda QoE. Resultatet av de åtta framtagna mobila enheterna framvisade att Samsung Galaxy s2 toppade totala benchmark för minst tappade och flest passerade paket. iPhone 5 resulterade den sämsta mobila enheten för RTP-trafik med mest antal förlorade paket och lägst antal passerande paket. Benchmark:Benchmark värderas med totala summeringen av procent mätningsreferenser, Voice MOS, packet loss, max consecutive packet loss, jitter, peak jitter samt Round-Trip Delay både i upplänk och nedlänk.
This report introduces the Umeå University background to the introduction of Lync Server 2013 stable established in 2014. The wireless network at Umeå University used by students and employees with mobile devices such as smartphones and laptops. The throughput into the wireless network is affected by different types of traffics from various devices in whole network infrastructure. This report covered closer glance at "Voice UDP" and "Lync Enterprise Voice" with a focus on congestion control for transfers of RTP traffic between mobile clients and 802.11 to identify the quality of a Lync call, "VoIP over WLAN”. The method is based on references with MOS scale of 1 to 5 in order to compare which mobile device should qualify for best achieved Quality of Experience. The results of the eight selected mobile devices showed that the Samsung Galaxy s2 topped the overall benchmark for minimum dropped and most passed packets. The iPhone 5 resulted in the worst mobile device for RTP traffic with the most amount of lost packets and the lowest amount of passing packets.Benchmark:Benchmark measured by the total summation of percent and pmeasurement references, Voice MOS, packet loss, maximum Consecutive
APA, Harvard, Vancouver, ISO, and other styles
15

Ahlberg, Jonas, and Madelen Lundqvist. "Bring Your Own Device : Val av teknisk lösning för BYOD." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17315.

Full text
Abstract:
De avancerade tekniska enheterna blir ständigt fler och människan blir allt mera beroende av att ha med dem överallt för att utföra olika ärenden. I de flesta fall rör det sig om så kallade smarta telefoner och surfplattor. Nu när vi privat har tillgång till de senaste och mest avancerade enheterna börjar användandet av dem för arbetsrelaterade uppgifter få fart och begreppet Bring Your Own Device (BYOD) växer fram. Verksamheter ser efterfrågan ifrån sina anställda som vill arbeta från sin egen enhet och försöker möta behovet. Dock ökar säkerhetsriskerna när företagsdata laddas ner till den anställdes privata enhet och vandrar med dem ut ifrån kontoret. Även virus kan följa med den privata enheten in på företagets nätverk och orsaka skada. Det gäller för företagen att på bästa sätt skydda sin data samtidigt som den anställde får jobba ifrån sin egen enhet. Detta kan lösas genom teknik och policys, vilket ställer höga krav på att tekniken är säker. Frågeställningen i denna uppsats handlar om hur en teknisk lösning kan väljas så att den uppfyller verksamhetens huvudsakliga behov och dessutom gör användarna nöjda. En kvalitativ studie har utförts med en fallstudie ute på ett företag. Syftet är att identifiera kriterier som företaget och användaren har och med hjälp av dessa bedöma tekniska lösningar på ett tydligt sätt. Detta för att göra det lätt att förstå vad som finns ute på marknaden just nu och hur de förhåller sig till kriterierna. I analysen identifieras kriterierna och en bedömning av hur respektive teknik hanterar de utvalda kriterierna utförs. Slutsatsen blir att verksamheten behöver bedöma hur viktiga de identifierade utvärderingskriterierna är för dem och utifrån det välja en teknisk lösning som passar verksamheten.
Program: Systemvetarutbildningen
APA, Harvard, Vancouver, ISO, and other styles
16

Klint, Robin. "What role does top management play in BYOD policy compliance?" Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20106.

Full text
Abstract:
Bring Your Own Device (BYOD) fortsätter öka i popularitet bland många organisationer. Problem, risker, och hot kopplade till denna enhetsstrategi har blivit noggrant studerat och diskuterat i många olika artiklar. Dock, rollen som toppchefer spelar i BYOD policyefterlevnad, är en aspekt som har blivit försummad och behöver ytterligare forskning. Toppchefers medverkan, stöd, och attityd mot informationssäkerhetsarbete påverkar anställdas intentioner att följa säkerhetspolicys. Därav, kasta ljus på effekten chefer och företagskultur kan ha, bedöms förmånligt för både organisationer såväl som deras ledare. En systematisk litteraturrecension utfördes med syftet att besvara vilken roll toppchefer spelar i BYOD policyefterlevnad. Specifika söktermer användes i fyra olika databaser för att hitta artiklar, som sedan utsattes för en process för att bedöma deras kvalitet baserat på förbestämda urvalskriterier. Denna process ledde till 14 artiklar som bedömdes vara bidragande till denna uppsats. Koncept som diskuterades och inträffade i flera av de valda artiklarna blev markerade och vidare analyserade. Fem koncept blev extraherade, och slutsatser drogs från dem. Fem intervjuer utfördes och resultaten både styrkte slutsatserna dragna från koncepten, och gav nya intressanta vinklar och aspekter.
Bring Your Own Device (BYOD) continues to rise in popularity among many organisations. Problems, risks, and threats connected to this device strategy have been thoroughly studied and discussed in many different articles. However, top managers’ role in BYOD policy compliance is an aspect that has been neglected and needs further research. Top managers' involvement, support, and attitude towards information security work affect employee’s intentions to comply with security policies. Hence, shedding light on the effect managers and corporate culture can have is deemed beneficial for both organisations and their leaders. A systematic literature review was conducted to answer what role top managers play in BYOD policy compliance. Specific search terms were used in four different databases to find articles which were then put through a process to assess their quality based on pre-defined selection criteria. This process led to 14 articles that were deemed to be contributory to this thesis. Concepts that were discussed and occurred in several of the selected articles were highlighted and further analysed. Five concepts were extracted, and conclusions were drawn from them. Five interviews were conducted, and the results supported the conclusions drawn from the concepts and provided interesting new angles and aspects.
APA, Harvard, Vancouver, ISO, and other styles
17

Akin-Adetoro, Adedolapo. "Bring Your Own Device (BYOD) adoption in South African SMEs." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/22724.

Full text
Abstract:
The advancement in technological development is now altering the conventional order in the diffusion of IT innovation from a top-down approach (organisation to employees) to a bottom-up approach (employees to organisation). This change is more notable in developed economies and has led to the Bring Your Own Device (BYOD) phenomenon which promises increased productivity for employees and their organisations. There have been several studies on the corporate adoption of BYOD but few have investigated the phenomenon from a small and medium enterprise (SME) perspective and from developing countries specifically. This study investigated the BYOD phenomenon in South African SMEs. The goal was to identify contextual factors influencing BYOD adoption with the purpose of understanding how these factors shaped and reshaped by SME actions. The Perceived EReadiness Model (PERM) was adopted to unearth contextual BYOD adoption factors, while the Structuration Theory was adopted as the theoretical lens from which the social construction of the BYOD phenomenon was understood. The study adopted an interpretive stance and was qualitative in nature. Data was collected from SMEs using semi-structured interviews, and analysed using a thematic analysis approach. The findings show that for BYOD to be adopted and institutionalized in an SME there needs to be organisational readiness in terms of awareness, management support, business resources, human resources, employees' pressure, formal governance, and technological readiness. Specifically, business resources, management support and technological readiness were perceived to be of the outmost importance to the success of BYOD. Environmental factors of market forces, support from industry, government readiness and the sociocultural factor are identified. Findings from the structuration analysis reports the presence of rules and resources (structures) which SMEs draw upon in their BYOD actions and interactions. It provides understanding on the guiding structures such as "no training" and "no formal governance" within which BYOD meanings are formed, and actions such as allowing employees to use their devices to access organisational resources without the fear of security breaches and data theft, are enacted. While it is true that the successive adoption of ICTs in organisation depends on the availability of a conducive formal policy, findings in the study show that SMEs used their business resources and management support as guiding structures of domination which were legitimized by internal informal verbal rules, lack of an institutional BYOD specific policy, minimal industry support; and the presences of social pressure.
APA, Harvard, Vancouver, ISO, and other styles
18

Muñoz, Rodrigo, and Fovad Adami. "Bring Your Own Device." Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102998.

Full text
Abstract:
Detta examensarbete har genomförts i samarbete med Sourcecom Svenska AB. Sourcecom Svenska AB arbetar med kommunikationslösningar inom IT-kommunikation, IT-säkerhet och telefoni. Examensarbetet går ut på att undersöka konceptet Bring Your Own Device (BYOD) och föreslå olika lösningar beroende på företagets informationssäkerhetskrav. För att förstå konceptet BYOD behövs först en inblick i hur ett policybaserat system fungerar. Rapporten undersöker och förklarar tre olika Network Access Control (NAC) lösningar som är policybaserade. De tre BYOD-lösningarna som presenteras i rapporten ger möjlighet att se och jämföra olika tekniker som erbjuds av olika leverantörer. Anslutningsmetoder inom BYOD som undersöks är trådlösa, trådbundna och fjärranslutningar. Rapporten undersöker även de produkterna som är involverade i konfigurationer av BYOD. Det ges en riskanalys till de risker som ett införande av en BYOD-lösning kan ta med sig till ett nätverkssystem samt förslag till olika metoder för att eliminera de riskerna. I slutet av rapporten presenteras tre olika BYOD-lösningar anpassade till tre olika företag beroende på deras krav på informationssäkerhet (hög risk, medelhög risk, låg risk). Rapportens främsta bidrag är en översikt över området BYOD, riskanalys och förslag att eliminera riskerna.
APA, Harvard, Vancouver, ISO, and other styles
19

Dunne, Martha. "Strategies That Mitigate IT Infrastructure Demands Produced by Student BYOD Usa." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7919.

Full text
Abstract:
The use of bring your own devices (BYOD) is a global phenomenon, and nowhere is it more evident than on a college campus. The use of BYOD on academic campuses has grown and evolved through time. The purpose of this qualitative multiple case study was to identify the successful strategies used by chief information officers (CIOs) to mitigate information technology infrastructure demands produced by student BYOD usage. The diffusion of innovation model served as the conceptual framework. The population consisted of CIOs from community colleges within North Carolina. The data collection process included semistructured, in-depth face-to-face interviews with 9 CIOs and the analysis of 25 documents, all from participant case organizations. Member checking was used to increase the validity of the findings. During the data analysis phase, the data were coded, sorted, queried, and analyzed obtained from semistructured interviews and organizational documentation with NVivo, a qualitative data analysis computer software package. Through methodological triangulation, 3 major themes emerged from the study: the importance of technology management tools, the importance of security awareness training, and the importance of BYOD security policies and procedures. These themes highlight successful strategies employed by CIOs. The implications for positive social change as a result of this study include creating a more positive experience for students interacting with technology on campus. Effects on social change will also arise by increasing a student's mindfulness through security awareness programs, which will empower the student to take more control of their online presence and as they pass that information along to family and friends.
APA, Harvard, Vancouver, ISO, and other styles
20

Andraščík, Jan. "Návrh metodiky pro zavedení systému správy mobilních zařízení v prostředí BYOD." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162621.

Full text
Abstract:
This master thesis is focused on topic of using mobile devices in work environment of enterprises, specifically on using mobile devices owned by employees. The thesis is divided into two parts. First part of the thesis describes benefits and risks of using mobile devices in enterprises while allowing usage of mobile devices owned by employees and compares individual mobile platforms in terms of security. Also there is a comparison of individual mobile devices management solutions in terms of security in this part of the thesis. Second part of the thesis is focused on methodology of mobile devices implementation in enterprises and their security. Methodology describes activities required for implementation of mobile devices in enterprises. At the end of this part there are security recommendations which are suitable to apply to mobile devices in enterprises.
APA, Harvard, Vancouver, ISO, and other styles
21

Ringani, G. N. "Nxopaxopo wa vutlhokovetseri byo phofula bya J.M Magaisa." Thesis, University of Limpopo, 2014. http://hdl.handle.net/10386/1413.

Full text
Abstract:
Thesis (M.A. (African Languages)) --University of Limpopo, 2014
The main aim of this study is to evaluate protest poetry in Mihloti (1981) and Xikolokolo nguvu ya Pitori (1987) by J.M. Magaisa with special references to theme, subject matter and the use of figures of speech.. Chapter 1 indicates the aim of the study, motivation, statement of the problem, research methodology, literature review and the key concepts which are used in this research. Chapter 2 explains the themes of the protest poetry in Magaisa’s poetry. In some explanation of the themes, some of the figures of speech have been used with the aim of making readers to understand his poetry. Chapter 3 indicates the modes of expression in Magaisa’ protest poetry. Some of the figures of speech and difficult terms have been explained in this chapter make people to understand them. Chapter 4 is the general conclusion which indicates the findings of the research and recommendations for further researches.
The University of Limpopo and C.S.D.
APA, Harvard, Vancouver, ISO, and other styles
22

Maršálová, Markéta. "Vnitropodnikové směrnice ve společnosti "Byt a servis, družstvo Olomouc"." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241522.

Full text
Abstract:
In my Thesis I focus on problems about international guidelines in Byt a servis, družstvo Olomouc. In first part I deal with bacis concepts like international guidelines and their partition, characteristic home owners association and cooperative. In second part I will do basic analysis about company and current status of international guidelines, which has company processed and about their quality. In conclusion of my thesis I suggest treatment of lacks and design a missing international guidelines.
APA, Harvard, Vancouver, ISO, and other styles
23

Elver, Mark (Marc S. ). Carleton University Dissertation Earth Sciences. "The stratigraphic and stable isotopic characteristics of an arctic icing Bylot Island, N.W.T." Ottawa, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Miller, Steve Gavin. "Business priorities driving BYOD and the resulting consequences: a South African case study." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/20944.

Full text
Abstract:
The consumerisation of information technology (IT) introduced the bring your own device (BYOD) phenomenon into the enterprise environment. As mobile and Internet technologies improve employees are opting to use their personal devices to access organisational systems in order to perform their work tasks. Such devices include smart phones, tablets and laptop computers. BYOD provide s opportunities for both the organisation and employees, but the adoption of BYO D also introduces risks to the organisation. Mobility and management of BYOD and CYOD (choose your own device) has consistently been a top concern for business management and Chief Information Officers (CIO's) globally. In the current, challenging economic environment organisations need to use all their resources, including technology, effectively. Organisations that develop an effective BYOD program can use this to assist in achieving their organisational objectives. This study uses a case study approach to investigate how business priorities drive the adoption of BYOD and how BYOD benefits and risks are realised by the organisation. Primary empirical data was collected using semi-structured interviews with employees from a large financial services organisation. Policy documents from the organisation was analysed as secondary data. Thematic analysis of the data revealed six major themes: improving employee mobility; improving client service and experience; creating a competitive industry advantage; improving business processes; information security risks; and management best practises. The themes were combined into a conceptual model, showing the decision process in adopting a BYOD program. This research contributes to the body of knowledge in this area, focusing on the South African context. The conceptual model can serve as an example for organisations currently making BYOD adoption decisions or organisations that are not achieving the full benefits of their BYOD program. The conceptual model reveals that organisations can use BYOD to achieve benefits including having a mobile workforce which results in an increase in productivity. However, mobility introduces risk to the organisation where information security risks is the top concern. This study recommends using a combination of technical and human controls to manage the risks. The technical controls include the use of an enterprise mobility management system and password controls. The human controls include the creation of effective BYOD and information security policies that the employees understand and follow. Providing employees with information security awareness and training is essential.
APA, Harvard, Vancouver, ISO, and other styles
25

Martinson, Amanda. "Bring Your Own Device : En fallstudie som undersöker implementeringen av BYOD i svenska företag." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-202257.

Full text
Abstract:
Jag har studerat fenomenet Bring Your Own Device (BYOD) och hur detta har implementerats i svenska företag. Syftet har varit att beskriva vad BYOD kan innebära i olika verksamheter utifrån vad som kan anses inkluderat i trenden. Jag har även studerat drivkrafterna bakom implementeringen samt vilka företagsspecifika förutsättningar som kan påverka lösningen. Undersökningen har genomförts genom en fallstudie och tre företag har studerats. Den empiriska undersökningen har visat på en stor skillnad mellan företagens valda lösningar och även tydliggjort vilka faktorer som kan komma att spela roll vid utformningen av en BYOD-lösning. I analysen har sedan de olika lösningarna jämförts med varandra utifrån ett underlag som tagits fram ur litteraturen. I litteraturen har även ett antal vanliga drivkrafter identifierats som sedan jämförs med de, för företagen, viktigaste drivkrafterna. Studien har resulterat i ett antal aspekter som fenomenet kan studeras utifrån; avsikten med implementeringen, enheter, funktioner, finansiering och support. Genom att undersöka ett företags lösning utifrån dessa kan man få en större förståelse för den valda lösningen och hur den påverkar företaget och dess anställda. En drivkraft stod ut som mer viktiga än andra, den anställdes ökade produktivitet och effektivitet. Många andra drivkrafter utöver denna ansågs viktiga men dessa hade i många fall sitt ursprung i den ökade produktiviteten. I övrigt visade studien att just syftet med implementeringen har en stor påverkan på hur BYOD-lösningen ser ut. Liksom företagets bransch och organisationskultur.
APA, Harvard, Vancouver, ISO, and other styles
26

Svensk, Kristoffer. "Mobile Device Security : Exploring the possibilities and limitations with Bring Your Own Device (BYOD)." Thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137113.

Full text
Abstract:
The goal for this thesis is to explore the possibilities with Bring Your OwnDevice (BYOD) on mobile devices using various Mobile Device Management(MDM) features on three different platforms - Android, iOS and Windows Phone8. The work involves a theoretical study and a practical implementation. Theresearch is to investigate the native (built-in) and implementable support forMDM using a client application, while the practical work is to implement aclient application for Android as a proof of concept based on the researchresult. The current threat landscape is revealed as well as suggestions on howto protect mobile devices for BYOD. The result shows that Android is the mostvulnerable platform and lacks native and implementable support for BYOD andMDM functionality using public frameworks. To provide more comprehensivesupport a client application would require more high-risk permissions, that areonly available using firmware signatures or restrictive manufacturer-specificApplication Programming Interface (API).
APA, Harvard, Vancouver, ISO, and other styles
27

Göransson, Rebecka. "Sport-bh för större kupor : Framtagning av gradering till sport-bh:ar för större byst." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-25174.

Full text
Abstract:
Denna studie görs i samarbete med ett svenskt modeföretag som har upplevt problem med passformen av deras sport-bh:ar i storlekarna L-XL. Problemet som uppstår är att de större storlekarna inte ger tillräckligt med täckning över bysten. Graderingen på sport-bh:arna behövs därför studeras och en fungerande gradering tas fram för att uppnå önskad passform på sport-bh:arna över bysten. Två graderingsmetoder granskas och appliceras på ett mönster från företaget. Prototyper i storlek L och XL sys upp enligt dessa metoder för avprovning och de två resultaten jämförs sedan. Metoden som uppnådde bäst passform utvecklas därefter vidare och en plaggmåttlista med de olika skillnadsmåtten tas därefter fram. Resultatet visade att Johnsons metod uppnådde en bättre passform men att en justering vid axelbanden behövdes göras innan måttlistan kunde sammanställas.
This study was done in collaboration with a Swedish fashion company that has experienced problems with the fit of their sports bra in the sizes L-XL. The problem that arises is that the larger sizes do not provide enough coverage over the bust. The grading on the sports bra is therefore needed to be studied and a functional grading system needs to be produced to achieve the desired fit on the sports bra over the bust. Two grading methods are reviewed and applied to a pattern from the company. Prototypes in size L and XL are sewn according to these methods for fitting and the two results are then compared. The method that achieved the best fit is then developed further and a garment measurement list with the difference measurements is then manufactured. The result showed that Johnson's method achieved a better fit but that an adjustment to the shoulder straps was needed before the measurement list could be compiled.
APA, Harvard, Vancouver, ISO, and other styles
28

Silva, Marcos Paulo da. "Ado??o de pr?ticas de BYOD ? luz dos princ?pios da teoria effectuation." PROGRAMA DE P?S-GRADUA??O EM ADMINISTRA??O, 2016. https://repositorio.ufrn.br/jspui/handle/123456789/22689.

Full text
Abstract:
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2017-04-17T21:38:09Z No. of bitstreams: 1 MarcosPauloDaSilva_TESE.pdf: 5717561 bytes, checksum: 79eed29f2011f51218a5d93114dd58e7 (MD5)
Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2017-04-19T18:39:53Z (GMT) No. of bitstreams: 1 MarcosPauloDaSilva_TESE.pdf: 5717561 bytes, checksum: 79eed29f2011f51218a5d93114dd58e7 (MD5)
Made available in DSpace on 2017-04-19T18:39:54Z (GMT). No. of bitstreams: 1 MarcosPauloDaSilva_TESE.pdf: 5717561 bytes, checksum: 79eed29f2011f51218a5d93114dd58e7 (MD5) Previous issue date: 2016-12-20
O presente estudo busca compreender de que forma usu?rios e gestor de Tecnologia da Informa??o (TI) adotam pr?ticas de Bring Your Own Device (BYOD), ? luz dos princ?pios da teoria Effectuation. No referencial te?rico, desenvolvem-se discuss?es sobre o contexto da consumeriza??o, suas aplica??es e implica??es para as organiza??es e indiv?duos, a abordagem da teoria Effectuation, o racioc?nio effectual, seus princ?pios e o processo. Trata-se de um estudo explorat?rio-descritivo, utilizando o m?todo misto de pesquisa ? qualitativo e quantitativo ? por meio de um estudo de caso ?nico, do qual participaram 42 usu?rios e o gestor de TI de uma empresa que atua h? 49 anos no setor varejista/atacadista de Natal/RN. Para a an?lise dos dados coletados junto aos usu?rios de TI, utilizou-se a estat?stica descritiva, regress?o log?stica (bootstrap), correla??o de Pearson e teste U de Mann-Whitney, com o aux?lio do software Statistical Package for the Social Sciences (SPSS) vers?o 21. Para a an?lise da entrevista concedida pelo gestor de TI, utilizou-se a an?lise de conte?do categorial ? an?lise tem?tica ? com o aux?lio do software ATLAS.ti, vers?o 7.5.15. A pesquisa mostra, por meio das metainfer?ncias, que existem diverg?ncias entre a ado??o das pr?ticas de BYOD pelos usu?rios de TI ? perfil effectual prevalente ? e pela empresa, representada pela gestor de TI ? perfil causal ? considerando que os aspectos da gest?o voltados para a mitiga??o de imprevistos, seguran?a da informa??o e o controle para o uso com foco no trabalho v?o de encontro ? perspectiva dos usu?rios de TI, de que por meio das pr?ticas de BYOD ? poss?vel uma atua??o aut?noma e dirigida ? inova??o, em raz?o da explora??o das conting?ncias e a realiza??o de parcerias com colegas de trabalho e/ou clientes e/ou fornecedores. No entanto, usu?rios e gestor de TI convergem em rela??o ? perspectiva sobre os benef?cios para as atividades da organiza??o, no que diz respeito ? satisfa??o dos funcion?rios, ? melhoria do atendimento aos clientes e ? realiza??o de parcerias para a ado??o, visto que o gestor percebe como uma parceria a disponibiliza??o da infraestrutura de TI organizacional para que os funcion?rios possam utilizar seus pr?prios aparelhos. Conclui-se que a realiza??o de parcerias engloba a ocorr?ncia de intera??es entre os usu?rios e o gestor de TI, o que potencializa a a??o humana na constru??o da ado??o das pr?ticas de BYOD, sobretudo quando o altru?smo inteligente se faz presente. Deve-se destacar que, na gest?o da ado??o, se dever? considerar o n?vel de escolaridade do usu?rio e a perspectiva de que a ado??o das pr?ticas ocorre em virtude da possibilidade dos aparelhos serem usados em qualquer lugar, conforme os modelos logit, a fim de otimizar o atendimento das demandas da maior parte dos usu?rios de TI da empresa.
The following study seeks to comprehend in which way Information Technology (IT) users and manager conduct the adoption of Bring Your Own Device (BYOD) practices, under the light of Effectuation theory principles. The theoretical framework brings discussions on the context of consumerization, its applications and implications for organizations and individuals, the Effectuation theory approach, the effectual logic, its principles and process. This is an exploratory-descriptive study, which uses both qualitative and quantitative research methods by means of one single case study, in which took part 42 users and the IT manager of a company that has been operating for the last 49 years in the retailer/wholesaler sector in the city of Natal/RN. Descriptive statistics, logistic regression (bootstrap), Pearson correlation and Mann-Whitney U test were used for the analysis of the data collected from the IT users, along with the aid of the Statistical Package for the Social Sciences (SPSS) software, version 21. Categorical content analysis ? thematic analysis ? was used for the analysis of the interview granted by the IT manager, with the support of the ATLAS.ti software, version 7.5.1.5. The research evinces, by means of metainferences, the existence of divergences between the adoption of BYOD practices by IT users ? effectual profile prevalent ? and by the company, represented by the IT manager ? causal profile. The management aspects concerning unforeseen events mitigation, information safety and control enforcing the used towards work activities go against IT users? perspective, which assume that, by means of BYOD practices, it is possible to attain an autonomous and innovation-biased performance, due to contingencies exploration and the establishment of partnerships with coworkers and/or clients and/or suppliers. Nevertheless, both IT users and manager converge regarding the perspective towards the benefits to the organization activities, in terms of employees? satisfaction, to the improvement of customer?s services and to the realization of partnerships for the adoption, since the IT manager perceives the availability of IT infrastructure by the company so that the employees may use their own devices as a partnership. It is concluded that the establishment of partnerships encompass the occurrence of interactions between the used and the IT manager, which enhance the human action upon the construction of BYOD practices adoption, especially when intelligent altruism is present. It must be highlighted that, in the adoption policy, the user educational level and the perspective that these practices adoption occur due to the possibility of the devices being used anywhere must be considered, according to the logit models, in order to optimize the meeting of the demands from most IT users of the company.
APA, Harvard, Vancouver, ISO, and other styles
29

Cockerham, Catherine L. "Burial practice at Tell Dothan was Tomb 1 a "byt mrzḥ"? /." Theological Research Exchange Network (TREN), 1995. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Mammetti, Jitka. "Způsoby ocenění nemovitostí v Itálii se zaměřením na nemovitost typu byt." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2011. http://www.nusl.cz/ntk/nusl-232590.

Full text
Abstract:
This Master´s thesis is engaged in the property valuation in Italy. In particular, summarizes the most common method of market valuation property type apartment. There are explained basic valuation methods and thein use in actual practice. The Master´s thesis also described the current situation of the Italian property market. This Master´s thesis also offers the possibility of using some of the knowledges of the property valuation in Italy for the property valuation in the Czech Republic. The main target of the Master´s thesis is the description of methods and procedures for property valuation used in Italy. Mentioned knowledges are applied on the current apartment valuation at the end of this Master´s thesis.
APA, Harvard, Vancouver, ISO, and other styles
31

Vaculovičová, Vanda. "Způsoby ocenění nemovitostí v Německu se zaměřením na nemovitost typu byt." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2012. http://www.nusl.cz/ntk/nusl-232612.

Full text
Abstract:
The Master´s thesis is engaged in valuation of property in Germany. Special focus is given to on valuation methods applicable to apartment value estimation. In order to that comparative and capital valuation methods are described in detail within the scope of the thesis. These methods are applied on the example of apartment valuation of an current apartment in Münster in the thesis. Fundamental components of the thesis are an explanation of basic valuation methods, an explanation of basis terms, a method of determination of average rent, a basic legal regulations and a description of an expert´s assessment. Furthermore the thesis describes as well the actual situation on the real estate market in Germany.
APA, Harvard, Vancouver, ISO, and other styles
32

Izrael, Peter. "Způsoby ocenění nemovitostí v Maďarsku se zaměřením na nemovitosti typu Byt." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2013. http://www.nusl.cz/ntk/nusl-232726.

Full text
Abstract:
The objective of the diploma thesis is to explore the ways and methods of valuation applied in Hungary. Thesis demonstrates historical evolution of property market in Hungary and describes the current market supported by data and graphs. The process of expert evidence preparation is characterized, as well. The result of the thesis is an example of a complex expert evidence for property type flat in accordance with Hungarian statutory.
APA, Harvard, Vancouver, ISO, and other styles
33

Kopic, Martin. "Způsoby ocenění nemovitostí na Slovensku se zaměřením na nemovitosti typu byt." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2013. http://www.nusl.cz/ntk/nusl-232809.

Full text
Abstract:
Aim my diploma work work is chart manners evaluation and method used on Slovakia with a view to flats. Describe situation on startle with real property on Slovakia, try to obtain formulation realtor's office or experts as to buyers' market with housing on Slovakia. Compare offer and demand for choice real property. Carry out characteristics way evaluation and value exemplary flat after these methodist. In introduction define fundamental terms from areas appraisement real property, in next parts is list and description single estimative methods. In next coherent transport systems parts deal with market with housing on Slovakia and last part is on line state evaluation flats by the help of these methods.
APA, Harvard, Vancouver, ISO, and other styles
34

Uz, Ali. "The Effectiveness of Remote Wipe as a Valid Defense for Enterprises Implementing a BYOD Policy." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/30376.

Full text
Abstract:
In today’s work place where corporations allow employees to use their own smart phones to access their company’s network and sensitive data, it is essential to ensure the security of said data. When an employee smart phone is compromised, companies will rely on the remote wipe command that attempts to remove sensitive data. In this thesis, we analyze the effectiveness of remote wipe commands on the Apple iPhone and Android model devices and demonstrate how data can be recovered following a remote wipe procedure. We conduct two experiments on each device to verify whether remote wipe is a viable defense mechanism or not. Furthermore, we touch on the subject of mobile forensics used by law enforcement and review methods and techniques used to recover data for use as evidence in criminal cases.
APA, Harvard, Vancouver, ISO, and other styles
35

Giroux, Marie-Andrée. "Effets des ressources allochtones sur une population de renards arctiques à l'île Bylot, Nunavut, Canada." Thèse, [Rimouski, Québec] : Université du Québec à Rimouski, 2007.

Find full text
Abstract:
Thèse (M. Sc.) -- Université du Québec à Rimouski, 2007.
Titre de l'écran-titre (visionné le 5 novembre 2007). Mémoire présenté à l'Université du Québec à Rimouski comme exigence partielle du programme de maîtrise en gestion de la faune et de ses habitats. Comprend un résumé. CaQRU CaQRU CaQRU Comprend des bibliogr. Publié aussi en version papier. CaQRU
APA, Harvard, Vancouver, ISO, and other styles
36

Jess, Scott. "Resolving the timing of major erosion events along the West Greenland-Baffin-Bylot continental margins." Thesis, University of Aberdeen, 2018. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=239479.

Full text
Abstract:
Continental passive margins exhibit high elevation topography in many localities across the globe. The source and age of much of this topography remains a subject of great debate within the wider community, with numerous theories being presented, including significant post-rift uplift and isostatically preserved rift anks. Establishing the mechanisms that generate topography and the onshore evolution across passive margins is vital in understanding regional geological histories and their wider development. The passive margins of the NW Atlantic realm exhibit high elevation topography topped with low relief summits. The origin of this topography is debated, with both 3 km of uplift in the post-rift stage and the isostatic preservation of Cretaceous rift anks being suggested within the literature. The work of this thesis aims to resolve this debate by establishing the timing and source of uplift across the region and determining the onshore evolution prior to, during and after rifting with the application of apatite low temperature thermochronology. Contemporary analytical and modelling techniques are utilised to generate thermal histories from across both central West Greenland and SE Baffin Island, helping to de ne how the modern landscape has formed. Results from this work outline an onshore history dominated by uplift in the Cretaceous and exhumation throughout the Cenozoic. Basement samples from SW Greenland exhibit protracted cooling throughout the Mesozoic and Cenozoic, implying low rates of exhumation have been apparent throughout. Within the Nuussuaq Basin, centralWest Greenland, thermal histories display reheating i through the Late Cretaceous/Palaeogene and cooling to present, consistent with events outlined in the basin's stratigraphy and implying uplift of the topography is likely the result of extrusive volcanism and an isostatic response to the unroo ng of the lithosphere. Spatial trends in data and thermal histories across SE Ba n Island imply much of the landscape is shaped by rift ank uplift along its SE coastline, driving exhumation of the region throughout the Cenozoic. Collectively these results suggest the elevated topography of the NW Atlantic realm is the result of rift related uplift in the Cretaceous, magmatism and widespread exhumation throughout the Cenozoic, preserved by isostatic exure. This interpretation of the region's onshore history contributes greatly to our understanding of the NW Atlantic's geological evolution. The results highlight the role of extensional tectonism, exhumation and isostasy in shaping both margin's landscapes and helps to determine the principal characteristics of the wider extensional system and the evolution of the o shore domain. Moreover, these conclusions have a wider relevance to the evolution of passive margins across the North Atlantic, improving our understanding of how topography across other margins, such as of East Greenland, Norway and the UK, has formed.
APA, Harvard, Vancouver, ISO, and other styles
37

Fincher, Derrel. "Bring your own device (BYOD) programs in the classroom| Teacher use, equity, and learning tools." Thesis, Pepperdine University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10141725.

Full text
Abstract:

This study explores teacher perceptions of Bring Your Own Device (BYOD) programs in the classroom, with a focus on teacher use, student equity of access, and student ability to use their devices as learning tools. While one-to-one laptop programs (students assigned identical school-owned laptop or tablet) has an extensive body of literature behind it, BYOD has relatively little peer-reviewed research.

A framework was developed to guide this research that related teacher technology use, equity of student access, and student ability to learn to use the devices they brought. Two instruments were created to collect data: (a) an anonymous online survey to collect information from 108 teachers already incorporating BYOD into their classes, (b) a semi-structured interview with eleven teachers who volunteered after completing the first instrument.

Findings suggested that teachers with constructivist compatible beliefs were likely to have more positive perceptions of BYOD, as were those who worked in schools with a more positive atmosphere. Very few teachers (12%) thought that BYOD programs were inherently inequitable, although 25% thought the programs in their own school was inequitable. Teachers were concerned that all students have access to an effective device when the student did not bring one and they primarily looked to school-owned technology to be available. Teachers also reported that students could learn to use their individual devices by working with other students and through working on assignments, while teachers had specific techniques they used to support this learning. Teachers overall did not view themselves as being responsible for providing technology support to students, and instead expected students to resolve their own technology problems. Many teachers (42%) liked that students had different types of devices.

A key advantage of BYOD is the knowledge the students bring when they bring their own device. These results provide tentative support for Bring Your Own Device programs as a viable, cost- effective way for students to use their own technology for learning.

APA, Harvard, Vancouver, ISO, and other styles
38

Holmberg, Daniel. "Secure IPC to Enable Highly Sensitive Communication in a Smartphone Environment with a BYOD Setup." Thesis, Linköpings universitet, Informationskodning, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-175518.

Full text
Abstract:
The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. Allowing multiple applications to communicate through Inter-process Communication (IPC) in a shared environment can induce a wide range of security vulnerabilities if not implemented adequately. In this thesis, multiple different IPC mechanisms have been investigated and applied with respect to confidentiality, integrity, and availability (CIA-triad) of a system including an Android application and a server, to enable a secure Single Sign-On (SSO) solution. Relevant threats were iden- tified that could highlight vulnerabilities related to the use of IPC mechanisms provided by the Android OS such as AIDL, Messenger, Content Provider, and Broadcast Receiver. A Proof-of-Concept (POC) system for each IPC mechanism was developed and implemented with targeted mitigation techniques (MT) and best practices to ensure a high level of con- formity with the CIA-triad. Additionally, each IPC mechanism was evaluated through a set of functional tests, a Grey-box penetration testing approach, and a performance analysis of the execution time and the total Lines-of-Code (LOC) required. The results shows that there are indeed different ways of achieving secure communication on the Android OS and thereby enabling a secure SSO solution by ensuring the inclusion of related MTs to prevent critical security vulnerabilities. Also, the IPC mechanism with the highest performance in relation to execution time and LOC is shown to be AIDL.
APA, Harvard, Vancouver, ISO, and other styles
39

Arlestedt, Rebecka, and Melenie Lindh. "Enterprise Mobility : Defining and evaluating business digitalization." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28264.

Full text
Abstract:
Mobile technology has developed rapidly in the recent years and considerably changed the way organizations work. Mobility can bring great benefits to the organizations of which they are at, by e.g. improving employee satisfaction and increase efficiency and productivity. Despite this the development of mobile solutions have grown much faster for individuals than for organizations, with a plethora of devices and applications. The slow enterprise adoption is partly due to the fact that companies need to take information security risks into account at the same time as IT systems need to be rebuilt and customized to accommodate the new mobile way of working. Employees, unlike most other technologies, largely drive mobile strategies at organizations. Organizations are not developing in a fast enough pace and many scientist are describing a research gap in organizations adoption of mobility. This study aims to examine how research in the area has been presented and how enterprise mobility is viewed and utilized. The study has been implemented through qualitative research with a interpretative and exploratory approach. A case study was conducted at two organizations, demonstrating the possibilities and obstacles of enterprise mobility, and also strengthened the existing definition of the field. Additionally the case study illustrated discrepancies in IT solutions and the adoption of enterprise mobility within two different industries. Both researchers and organizations have shown a great interest in exploring this area additionally. Further studies can be extended to include the effects of how companies have adapted to enterprise mobility.
Den mobila teknologin har utvecklats i snabb takt under de senaste åren och således förändrat organisationers sätt att arbeta. Mobilitet kan möjliggöra för organisationer att t.ex. förbättra de anställdas tillfredsställelse, öka effektiviteten och produktiviteten, samt minimera kostnader. Trots den snabba utveckling av såväl mobila lösningar som mobila enheter, så har utvecklingen gått betydligt snabbare för privatpersoner än för organisationer. Detta kan delvis förklaras av det faktum att organisationer, i större utsträckning än privatpersoner, måste ta hänsyn till de säkerhetsrisker som mobilt arbete kan medföra. Det kan också förklaras av att många IT-system kräver vidareutveckling och anpassning för att kunna möta det nya mobila sättet att arbeta. Att organisationer inte utvecklas i tillräcklig snabb takt ligger till grund för att många forskare beskriver att det finns ett forskningsgap i organisationers antagande av mobilitet. Denna studie syftar därför till att undersöka hur begreppet enterprise mobility presenteras i tidigare forskning samt hur det uppfattas och tillämpas bland anställda. Studien har använt en kvalitativ forskningsansats med ett undersökande och tolkande förhållningssätt. En fallstudie har genomförts på två olika organisationer för att identifiera möjligheter och utmaningar med enterprise mobility, men också för att stärka den befintliga definitionen av begreppet. Fallstudien presenterar också skillnader i anpassade IT-lösningar och antagandet av mobilitet inom två olika branscher. Både forskare och organisationer har uttryckt ett stort intresse av att utforska detta område ytterligare. Denna studie ligger till grund för att senare undersöka effekterna av hur företagen har anpassat sig till enterprise mobility.
APA, Harvard, Vancouver, ISO, and other styles
40

Uxa, Jan. "Srovnání jednotlivých způsobů ocenění pro nemovitost typu byt v lokalitě Plzeň - Bolevec." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2011. http://www.nusl.cz/ntk/nusl-232585.

Full text
Abstract:
This dissertation analyse selected used methods of appraising of flats and their reciprocal comparing. Then the dissertation defines basic concepts and percepts, with them the matters of appraising of flats hang together. Priceds flats thein are in Pilsen in the in area Bolevec. There were selected flats with differeent layout.
APA, Harvard, Vancouver, ISO, and other styles
41

Úradníček, Pavel. "Srovnání vybraných způsobů ocenění pro nemovitost typu byt ve Žďáře nad Sázavou." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2011. http://www.nusl.cz/ntk/nusl-232583.

Full text
Abstract:
This master’s thesis survey on juxtaposition single methods that the use for evaluation real property type flat. From methods exploited for evaluation avails administrative way evaluation, for assesment usual price will used method direct comparison. Confrontation flats will effected in locality Žďár nad Sázavou, subject evaluation will houses about sizes 2+1. Work includes description given to areas and maps in her situation in the marketplace with houses periods.
APA, Harvard, Vancouver, ISO, and other styles
42

Košťálková, Kateřina. "Analýza vybraných způsobů ocenění pro nemovitost typu byt v jižní části Olomouce." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2015. http://www.nusl.cz/ntk/nusl-233078.

Full text
Abstract:
This master´s thesis is focuses on the analysis of selected methods of valuation for apartment-type property in the southern part of Olomouc. Thesis is separated into theoretical and practical part. The theoretical part defines basic concepts, definitions and methods related to valuation. Thesis also includes a description of the location and condition of the real estate market. The practical part deals with the actual valuation using methods: direct comparsion, the yield method and cost method. In conclusion, there is an evaluation of prices and assessing the suitability of individual method used.
APA, Harvard, Vancouver, ISO, and other styles
43

Järvström, Zara. "Är gräset grönare på andra sidan? : En intervjustudie om ungdomar som bytt program ellerinriktning på gymnasiet." Thesis, Uppsala universitet, Pedagogiska institutionen, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-152282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Rodrigues, Ge?rgia Cristiane. "BYOD como pol?tica de seguran?a em uma empresa: uma an?lise ? luz da PMT." Universidade Federal do Rio Grande do Norte, 2015. http://repositorio.ufrn.br/handle/123456789/20412.

Full text
Abstract:
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2016-05-06T23:52:19Z No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5)
Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2016-05-09T19:56:30Z (GMT) No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5)
Made available in DSpace on 2016-05-09T19:56:30Z (GMT). No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) Previous issue date: 2015-09-11
O avan?o da tecnologia m?vel, no que diz respeito ? disponibilidade de servi?os 3G/4G e da utiliza??o de Dispositivos como Smartphones e Tablets originou um novo fen?meno de comunica??o: BYOD (Bring Your Own Device), ? uma nova tend?ncia de neg?cios, onde os funcion?rios est?o utilizando seus pr?prios dispositivos para fins de trabalho. A r?pida expans?o de BYOD e as quest?es de seguran?a e privacidade de dados representam desafios significativos para as organiza??es. A resposta mais comum a essas preocupa??es ? a ado??o de pol?ticas corporativas que regem BYOD. Este estudo tem por objetivo analisar a inten??o dos funcion?rios em cumprir com a pol?tica de seguran?a da organiza??o no contexto de BYOD, quando os funcion?rios utilizam seus dispositivos pessoais para acessar recursos organizacionais para realizarem o trabalho, dentro ou fora do ambiente organizacional. Para tanto, foi utilizada a Teoria de Motiva??o a Prote??o (TMP) como embasamento te?rico. Em termos metodol?gicos, a presente pesquisa, ? do tipo descritiva e tamb?m explorat?ria com uma abordagem quantitativa. N?o aleat?ria ? o tipo de amostragem. Para coleta, foi aplicado um question?rio estruturado, tipo survey, com um conjunto de itens de medi??o para cada construto. A etapa de an?lise dos dados foi realizada por meio de utiliza??o de t?cnicas de estat?stica descritiva e an?lise multivariada, tais como a An?lise Fatorial Explorat?ria (AFE) e a Regress?o Linear M?ltipla (RLM). Do ponto de vista te?rico, os resultados demonstram que o modelo PMT fornece uma base te?rica s?lida para a investiga??o nesta ?rea. No entanto, os resultados tamb?m indicam que este modelo ? afetado por fatores contextuais, e que a escolha da amostra pode influenciar a import?ncia dos diferentes componentes do modelo. Portanto, o cuidado deve ser tomado na generaliza??o desses resultados para outros contextos e popula??es
The advancement of mobile technology, with regard to the availability of 3G / 4G and use of devices such as Smartphones and Tablets yielded a new communication phenomenon: BYOD (Bring Your Own Device), is a new business trend, where employees are using their own devices for work purposes. The rapid expansion of BYOD , data security and privacy issues pose significant challenges for organizations. The most common response to these concerns is the adoption of corporate policies governing BYOD. This study aims to analyze the intention of employees to comply with the organization's security policy in the context of BYOD, when employees use their personal devices to access organizational resources to develop work related tasks, inside or outside the organizational environment. Therefore, we will use the Motivation Theory Protection as theoretical basis. In terms of methodology, this research will be a descriptive and exploratory study with a quantitative approach. Nonrandom will be the type of sampling. For collection, a structured questionnaire, survey type, with a set of measurement items for each construct is applied. The data analysis step is performed by means of descriptive statistics, Exploratory Factor Analysis and Multiple Linear Regression. From a theoretical point of view, the results demonstrate that the PMT model provides a solid theoretical basis for research in this area. However, the results also suggest that this model is affected by contextual factors, and the selection of the sample may influence the importance of the different components of the model. Therefore, caution should be taken in generalizing these results to other settings and populations.
APA, Harvard, Vancouver, ISO, and other styles
45

Monsch, Christine [Verfasser]. "Bring Your Own Device (BYOD). : Rechtsfragen der dienstlichen Nutzung arbeitnehmereigener mobiler Endgeräte im Unternehmen. / Christine Monsch." Berlin : Duncker & Humblot, 2017. http://d-nb.info/1238439667/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Santee, Coleen D. "An Exploratory Study of the Approach to Bring Your Own Device (BYOD) in Assuring Information Security." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1005.

Full text
Abstract:
The availability of smart device capabilities, easy to use apps, and collaborative capabilities has increased the expectations for the technology experience of employees. In addition, enterprises are adopting SaaS cloud-based systems that employees can access anytime, anywhere using their personal, mobile device. BYOD could drive an IT evolution for powerful device capabilities and easy to use apps, but only if the information security concerns can be addressed. This research proposed to determine the acceptance rate of BYOD in organizations, the decision making approach, and significant factors that led to the successful adoption of BYOD using the expertise of experienced internal control professionals. The approach and factors leading to the decision to permit the use of BYOD was identified through survey responses, which was distributed to approximately 5,000 members of the Institute for Internal Controls (IIC). The survey participation request was opened by 1,688 potential respondents, and 663 total responses were received for a response rate of 39%. Internal control professionals were targeted by this study to ensure a diverse population of organizations that have implemented or considered implementation of a BYOD program were included. This study provided an understanding of how widely the use of BYOD was permitted in organizations and identified effective approaches that were used in making the decision. In addition, the research identified the factors that were influential in the decision making process. This study also explored the new information security risks introduced by BYOD. The research argued that there were several new risks in the areas of access, compliance, compromise, data protection, and control that affect a company’s willingness to support BYOD. This study identified new information security concerns and risks associated with BYOD and suggested new elements of governance, risk management, and control systems that were necessary to ensure a secure BYOD program. Based on the initial research findings, future research areas were suggested.
APA, Harvard, Vancouver, ISO, and other styles
47

Neverdauskaitė, Vaida. "Asmeninių įrenginių saugaus konfigūravimo sprendimų paramos sistema." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130821_153046-89372.

Full text
Abstract:
Mobilieji įrenginiai tobulėja ir pateikia vis daugiau galimybių jų vartotojams. Tokie įrenginiai naudojami tiek asmeniniais, tiek darbo tikslais, kas sukelia papildomų saugos grėsmių įmonėms. Esant tokiai situacijai, reikalingos papildomos valdymo priemonės, kurios užtikrintų asmeninių įrenginių saugos konfigūravimą, atitinkantį organizacijos saugos politiką. Organizacijos saugos politika privalo atsižvelgti į dvi pagrindines sritis: organizacijos sistemų saugumą ir mobiliojo įrenginio saugumą. Magistrinio darbo tikslas – išnagrinėti mobiliesiems įrenginiams keliamas grėsmes bei sudaryti mobiliųjų įrenginių saugios konfigūracijos paramos sistemos prototipą.
The mobile industry is evolving rapidly and new mobile devices with sophisticated capabilities are released almost every day. The technical advancements in mobile industry have resulted in increase of security threats and attacks. To provide strong security mechanism a combination of solutions need to be implemented at different levels based on enterprise mobile application security requirements. Enterprise mobile security should ensure two key components: enterprise system security and device security. The aim of this paper is to create secure configuration decision support system prototype for personal devices.
APA, Harvard, Vancouver, ISO, and other styles
48

Beardsell, Andréanne. "Écologie de la nidification de la buse pattue dans le Haut-Arctique et vulnérabilité des nids aux risques géomorphologiques." Master's thesis, Université Laval, 2016. http://hdl.handle.net/20.500.11794/26921.

Full text
Abstract:
Les caractéristiques physiques d’un site de nidification peuvent influencer la probabilité qu’il soit utilisé et l’issue des tentatives de nidification. La buse pattue (Buteo lagopus) construit un imposant nid, qui peut être réutilisé plusieurs années, en bordure des falaises et des versants en Arctique. Ces habitats escarpés sont perturbés par des mouvements de masse pouvant entraîner la destruction de sites critiques pour la reproduction des buses. Nous avons d’abord examiné l’effet de plusieurs variables environnementales et de la réutilisation d’un nid sur la reproduction de la buse pattue. Ensuite, nous avons évalué la vulnérabilité des nids aux mouvements de masse et identifié les facteurs environnementaux associés à la persistance des nids. L’étude s’est déroulée à l’île Bylot (Nunavut) de 2007 à 2015. La probabilité qu’un nid soit utilisé par un couple augmentait avec la distance du nid actif le plus proche, la présence d’un surplomb au-dessus du nid et la densité des lemmings. Les nids accessibles aux renards et orientés vers le nord étaient associés à un moins bon succès reproducteur. Celui-ci était aussi positivement relié à la densité estivale de lemmings et négativement relié aux précipitations. Nos résultats suggèrent que les caractéristiques physiques du site de nidification offrant un microclimat favorable et une protection contre les prédateurs reflètent des sites de haute qualité. Le succès reproducteur était similaire entre les nouveaux nids et ceux préexistants, suggérant que la construction d’un nid n’entraîne pas de coût sur la reproduction à court terme. Parmi les 82 nids connus, près du tiers ont été détruits par des mouvements de masse et parmi ceux encore intacts, la majorité sont à risque modéré et haut de l’être. La probabilité de destruction était élevée pour les nids construits sur des sédiments non consolidés et positivement associée aux fortes précipitations. La hausse anticipée des précipitations due aux changements climatiques est susceptible d’augmenter la vulnérabilité des nids aux mouvements de masse ce qui pourrait ultimement réduire la disponibilité de sites appropriés pour la reproduction de ce rapace.
The physical characteristics of a nest site are thought to influence both its use by birds and the outcome of breeding attempts. The rough-legged hawk (Buteo lagopus) built a massive nest, which can be reused several years, along cliffs and slopes in the Arctic. These steep habitats are exposed to mass movements which may result in the destruction of critical sites for hawks. We examined the relationships between several environmental variables, patterns of nest reuse and reproductive output in rough-legged hawks. We also assessed nest vulnerability to mass movements and identified environmental factors associated with the persistence of nesting structures. The study was conducted on Bylot Island (Nunavut) from 2007 to 2015. Nest use probability increased with the nearest distance to breeding conspecific, with lemming density and for sheltered nest. Hawk nests inaccessible to foxes and facing away from the north were associated with a high reproductive success. Reproductive success was also positively related to summer lemming density and negatively related to rainfall. Our results suggest that nest site physical characteristics offering a favorable microclimate and protection from weather and predators provide the highest-quality site. Hawks that bred in a newly-built nest had similar success compared to those that used pre-existing nests, suggesting that building a new nest entailed no short term reproductive costs. Among 82 known nests, nearly a third were destroyed during the study and among those still intact, more than half are exposed to a moderate to high risk of being destroyed. The probability of nest destruction was high for nests built on unconsolidated sediments and positively associated with heavy rainfall. The anticipated increase in precipitation due to climate change is likely to increase the exposure of nest to mass movements which could ultimately reduce the availability of suitable sites for the reproduction of this raptor.
APA, Harvard, Vancouver, ISO, and other styles
49

Knight, Ross David Carleton University Dissertation Geology. "Sedimentology and stratigraphy of the Neohelikian Elwin Formation, uppermost Bylot Supergroup, Borden Rift Basin, northern Baffin Island." Ottawa, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Perreault, Naïm. "Impact de la formation de ravins de thermo-érosion sur les milieux humides, Île Bylot, Nunavut, Canada." Thèse, Université du Québec à Trois-Rivières, 2012. http://depot-e.uqtr.ca/6185/1/030405438.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography