设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
CNKI学位论文(95)
知网期刊论文(115)
在“
Elsevier电子期刊
”中,
命中:
29
条,耗时:0.0389872 秒
在所有数据库中总计命中:
210
条
1.
To take or not to take the laptop or tablet to classes, that is the question
作者:
José
;
I. Castillo-Manzano
a
;
jignacio@us.es
;
Mercedes Castro-Nuñ
;
o
a
;
mercas@us.es
;
Lourdes Ló
;
pez-Valpuesta
a
;
lolopez@us.es
;
Marí
;
a Teresa Sanz-Dí
;
az
b
;
mtsanz@us.es
;
Rocí
;
o Yñ
;
iguez
b
;
ovando@us.es
关键词:
University teaching
;
M-learning
;
Mobile
device
s
;
Bring
your
own
device
;
Educational technologies research
;
Bivariate probit model
刊名:Computers in Human Behavior
出版年:2017
2.
Affordances and constraints of BYOD (
Bring
Your
Own
Device
) for learning and teaching in higher education: Teachers' perspectives
作者:
Yanjie Song
;
ysong@eduhk.hk
;
Siu Cheung Kong
关键词:
Affordances
;
Constraints
;
BYOD
;
Teachers' perspectives
;
Higher education
刊名:The Internet and Higher Education
出版年:2017
3.
Legal Issues in Secure Implementation of
Bring
Your
Own
Device
(BYOD)
作者:
Madhavi Dhingra
关键词:
BYOD
;
Legal issues in BYOD
;
BYOD Policy
;
BYOD Security
刊名:Procedia Computer Science
出版年:2016
4.
Data Management in Mobile Enterprise Applications
作者:
Marwah Hemdi
a
;
mah411@mail.usask.ca" class="auth_mail" title="E-mail the corresponding author
;
Ralph Deters
b
关键词:
Mobile Cloud Computing
;
Bring
Your
Own
Device
;
Data Management
刊名:Procedia Computer Science
出版年:2016
5.
BYOD security engineering: A framework and its analysis
作者:
Nima Zahadat
;
nzahadat@gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Paul Blessner
pbless@gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Timothy Blackburn
timb@gwmail.gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Bill A. Olson
bolson@gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Mobile
Device
Management system (MDM)
;
Mobile security
;
Bring
Your
Own
Device
(BYOD)
;
Policy management
;
BYOD Security Framework
;
BYOD Lifecycle
刊名:Computers & Security
出版年:2015
6.
Silent risk: new incarnations of longstanding threats
作者:
Duncan HughesAuthor Vitae
刊名:Network Security
出版年:2016
7.
Trusted Security Policies for Tackling Advanced Persistent Threat via Spear Phishing in BYOD Environment
作者:
Lau Lap Bann
;
Manmeet Mahinderjit Singh
;
Azman Samsudin
关键词:
Security policy
;
Spear Phishing
;
Access Control Policy Tool (ACPT)
;
OWASP risk rating methodology
刊名:Procedia Computer Science
出版年:2015
8.
鈥淏ring
Your
Own
Device
(BYOD)鈥?for seamless science inquiry in a primary school
作者:
Yanjie Song
;
ysong@ied.edu.hk" class="auth_mail
关键词:
BYOD
;
Seamless inquiry-based learning
;
Content knowledge
刊名:Computers and Education
出版年:May, 2014
9.
Smartphone information security awareness: A victim of operational pressures
作者:
Sean Allam
a
Author Vitae
;
Stephen V. Flowerday
a
;
Author Vitae
;
Ethan Flowerday
b
;
sflowerday@ufh.ac.za" class="auth_mail
Author Vitae
关键词:
Smartphone
;
Information security
;
Awareness
;
Bring
your
own
device
(BYOD)
;
Mobile computing
刊名:Computers and Security
出版年:May, 2014
10.
Own
ership versus on-campus use of mobile IT
device
s by university students
作者:
Martijn B.W. Kobus
;
Piet Rietveld
;
Jos N. van Ommeren
关键词:
Mobile IT
device
s
;
Tablet PCs
;
Laptops
;
Smartphones
;
Higher education
刊名:Computers and Education
出版年:2013
1
2
3
按检索点细分(29)
题名(2)
关键词(4)
文摘(26)
按出版年细分(29)
2027年及以后(9)
2017年(2)
2016年(3)
2015年(2)
2013年(6)
2012年(7)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.