设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
在“
Elsevier电子期刊
”中,
命中:
36
条,耗时:小于0.01 秒
1.
Affordances and constraints of
BYOD
(Bring Your Own Device) for learning and teaching in higher education: Teachers' perspectives
作者:
Yanjie Song
;
ysong@eduhk.hk
;
Siu Cheung Kong
关键词:
Affordances
;
Constraints
;
BYOD
;
Teachers' perspectives
;
Higher education
刊名:The Internet and Higher Education
出版年:2017
2.
Legal Issues in Secure Implementation of Bring Your Own Device (
BYOD
)
作者:
Madhavi Dhingra
关键词:
BYOD
;
Legal issues in
BYOD
;
BYOD
Policy
;
BYOD
Security
刊名:Procedia Computer Science
出版年:2016
3.
This is my device! Why should I follow your rules? Employees’ compliance with
BYOD
security policy
作者:
Anat Hovav
;
anatzh@korea.ac.kr" class="auth_mail" title="E-mail the corresponding author
;
Frida Ferdani Putri
frida_fputri@yahoo.com" class="auth_mail" title="E-mail the corresponding author
关键词:
Information security policy
;
BYOD
;
Mobile virtualization
;
Organizational justice
;
Reactance theory
;
Freedom threat
刊名:Pervasive and Mobile Computing
出版年:2016
4.
BYOD
security engineering: A framework and its analysis
作者:
Nima Zahadat
;
nzahadat@gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Paul Blessner
pbless@gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Timothy Blackburn
timb@gwmail.gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Bill A. Olson
bolson@gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Mobile Device Management system (MDM)
;
Mobile security
;
Bring Your Own Device (
BYOD
)
;
Policy management
;
BYOD
Security Framework
;
BYOD
Lifecycle
刊名:Computers & Security
出版年:2015
5.
An experience of personalized learning hub initiative embedding
BYOD
for reflective engagement in higher education
作者:
Siu Cheung Kong
;
sckong@ied.edu.hk" class="auth_mail" title="E-mail the corresponding author
;
Yanjie Song
ysong@ied.edu.hk" class="auth_mail" title="E-mail the corresponding author
关键词:
BYOD
;
Flipped classroom
;
Higher education
;
Personalized learning hub
;
Reflective engagement
刊名:Computers and Education
出版年:2015
6.
Corporate security solutions for
BYOD
: A novel user-centric and self-adaptive system
作者:
P. de las Cuevas
paloma@geneura.ugr.es" class="auth_mail" title="E-mail the corresponding author
;
A.M. Mora
;
amorag@geneura.ugr.es" class="auth_mail" title="E-mail the corresponding author
;
J.J. Merelo
jmerelo@geneura.ugr.es" class="auth_mail" title="E-mail the corresponding author
;
P.A. Castillo
pedro@geneura.ugr.es" class="auth_mail" title="E-mail the corresponding author
;
P. Garcí
;
a-Sá
;
nchez
pgarcia@geneura.ugr.es" class="auth_mail" title="E-mail the corresponding author
;
A. Ferná
;
ndez-Ares
antares@geneura.ugr.es" class="auth_mail" title="E-mail the corresponding author
关键词:
Corporate mobile security
;
User-centric systems
;
Self-adaptation
;
Multi-platform
;
BYOD
刊名:Computer Communications
出版年:2015
7.
Trusted Security Policies for Tackling Advanced Persistent Threat via Spear Phishing in
BYOD
Environment
作者:
Lau Lap Bann
;
Manmeet Mahinderjit Singh
;
Azman Samsudin
关键词:
Security policy
;
Spear Phishing
;
Access Control Policy Tool (ACPT)
;
OWASP risk rating methodology
刊名:Procedia Computer Science
出版年:2015
8.
Exploring undergraduates' perspectives and flipped learning readiness in their flipped classrooms
作者:
Yungwei Hao
hao@ntnu.edu.tw" class="auth_mail" title="E-mail the corresponding author
关键词:
Flipped learning
;
Flipped learning readiness
;
Individual difference
;
Higher education
刊名:Computers in Human Behavior
出版年:2016
9.
Data Management in Mobile Enterprise Applications
作者:
Marwah Hemdi
a
;
mah411@mail.usask.ca" class="auth_mail" title="E-mail the corresponding author
;
Ralph Deters
b
关键词:
Mobile Cloud Computing
;
Bring Your Own Device
;
Data Management
刊名:Procedia Computer Science
出版年:2016
10.
Silent risk: new incarnations of longstanding threats
作者:
Duncan HughesAuthor Vitae
刊名:Network Security
出版年:2016
1
2
3
4
按检索点细分(36)
题名(15)
作者(1)
关键词(9)
文摘(31)
按出版年细分(36)
2027年及以后(9)
2017年(1)
2016年(5)
2015年(5)
2013年(8)
2012年(7)
2000年(1)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.