Proposal of MDM management framework for BYOD use of large companies
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Song, M. | - |
dc.contributor.author | Lee, K. | - |
dc.date.accessioned | 2021-09-05T16:01:52Z | - |
dc.date.available | 2021-09-05T16:01:52Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2014 | - |
dc.identifier.issn | 1975-4094 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/100755 | - |
dc.description.abstract | Result of the confirmation of the analytical data security assessment project of Samsung control items, large companies, learned that there is a difference in the level of implementing the management policy to the characteristics of the business of the department and affiliated companies. It is intended to provide a management framework of MDM [1] security solutions for the application of this information, to prevent the outflow of internal assets in BYOD [2]. Currently, research and functional evaluation of MDM security solutions is the major. However, when introducing the MDM solutions, research management framework to reflect the characteristics of the amplifier section of the department and affiliates in the large companies, considering the technical and policy is not presented, so far the hard way are. Therefore, management framework that can be with the data collected during the analysis of the questionnaire Samsung security management existing items, to understand the need for MDM security solutions for each department and affiliated companies, to make effective use of this I will try to offer. © 2014 SERSC. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.subject | Affiliated companies | - |
dc.subject | BYOD | - |
dc.subject | Functional evaluation | - |
dc.subject | Management frameworks | - |
dc.subject | MDM | - |
dc.subject | Security | - |
dc.subject | Security assessment | - |
dc.subject | Security management | - |
dc.subject | Computer science | - |
dc.subject | Solutions | - |
dc.subject | Industry | - |
dc.title | Proposal of MDM management framework for BYOD use of large companies | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, K. | - |
dc.identifier.doi | 10.14257/ijsh.2014.8.1.13 | - |
dc.identifier.scopusid | 2-s2.0-84893745020 | - |
dc.identifier.bibliographicCitation | International Journal of Smart Home, v.8, no.1, pp.123 - 128 | - |
dc.relation.isPartOf | International Journal of Smart Home | - |
dc.citation.title | International Journal of Smart Home | - |
dc.citation.volume | 8 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 123 | - |
dc.citation.endPage | 128 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Affiliated companies | - |
dc.subject.keywordPlus | BYOD | - |
dc.subject.keywordPlus | Functional evaluation | - |
dc.subject.keywordPlus | Management frameworks | - |
dc.subject.keywordPlus | MDM | - |
dc.subject.keywordPlus | Security | - |
dc.subject.keywordPlus | Security assessment | - |
dc.subject.keywordPlus | Security management | - |
dc.subject.keywordPlus | Computer science | - |
dc.subject.keywordPlus | Solutions | - |
dc.subject.keywordPlus | Industry | - |
dc.subject.keywordAuthor | BYOD | - |
dc.subject.keywordAuthor | MDM | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Solution | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.