设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
知网期刊论文(99)
在“
Elsevier电子期刊
”中,
命中:
26
条,耗时:0.0119991 秒
在所有数据库中总计命中:
99
条
1.
Affordances and constraints of
BYOD
(
Bring
Your
Own
Device
) for learning and teaching in higher education: Teachers' perspectives
作者:
Yanjie Song
;
ysong@eduhk.hk
;
Siu Cheung Kong
关键词:
Affordances
;
Constraints
;
BYOD
;
Teachers' perspectives
;
Higher education
刊名:The Internet and Higher Education
出版年:2017
2.
Legal Issues in Secure Implementation of
Bring
Your
Own
Device
(
BYOD
)
作者:
Madhavi Dhingra
关键词:
BYOD
;
Legal issues in
BYOD
;
BYOD
Policy
;
BYOD
Security
刊名:Procedia Computer Science
出版年:2016
3.
Data Management in Mobile Enterprise Applications
作者:
Marwah Hemdi
a
;
mah411@mail.usask.ca" class="auth_mail" title="E-mail the corresponding author
;
Ralph Deters
b
关键词:
Mobile Cloud Computing
;
Bring
Your
Own
Device
;
Data Management
刊名:Procedia Computer Science
出版年:2016
4.
BYOD
security engineering: A framework and its analysis
作者:
Nima Zahadat
;
nzahadat@gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Paul Blessner
pbless@gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Timothy Blackburn
timb@gwmail.gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Bill A. Olson
bolson@gwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Mobile
Device
Management system (MDM)
;
Mobile security
;
Bring
Your
Own
Device
(
BYOD
)
;
Policy management
;
BYOD
Security Framework
;
BYOD
Lifecycle
刊名:Computers & Security
出版年:2015
5.
Silent risk: new incarnations of longstanding threats
作者:
Duncan HughesAuthor Vitae
刊名:Network Security
出版年:2016
6.
Trusted Security Policies for Tackling Advanced Persistent Threat via Spear Phishing in
BYOD
Environment
作者:
Lau Lap Bann
;
Manmeet Mahinderjit Singh
;
Azman Samsudin
关键词:
Security policy
;
Spear Phishing
;
Access Control Policy Tool (ACPT)
;
OWASP risk rating methodology
刊名:Procedia Computer Science
出版年:2015
7.
鈥淏ring
Your
Own
Device
(
BYOD
)鈥?for seamless science inquiry in a primary school
作者:
Yanjie Song
;
ysong@ied.edu.hk" class="auth_mail
关键词:
BYOD
;
Seamless inquiry-based learning
;
Content knowledge
刊名:Computers and Education
出版年:May, 2014
8.
Bring
your
own
software
作者:
Danië
;
lle van Leeuwen (G Data Software)Author Vitae
刊名:Network Security
出版年:March, 2014
9.
Smartphone information security awareness: A victim of operational pressures
作者:
Sean Allam
a
Author Vitae
;
Stephen V. Flowerday
a
;
Author Vitae
;
Ethan Flowerday
b
;
sflowerday@ufh.ac.za" class="auth_mail
Author Vitae
关键词:
Smartphone
;
Information security
;
Awareness
;
Bring
your
own
device
(
BYOD
)
;
Mobile computing
刊名:Computers and Security
出版年:May, 2014
10.
Own
ership versus on-campus use of mobile IT
device
s by university students
作者:
Martijn B.W. Kobus
;
Piet Rietveld
;
Jos N. van Ommeren
关键词:
Mobile IT
device
s
;
Tablet PCs
;
Laptops
;
Smartphones
;
Higher education
刊名:Computers and Education
出版年:2013
1
2
3
按检索点细分(26)
题名(2)
关键词(2)
文摘(24)
按出版年细分(26)
2027年及以后(7)
2017年(1)
2016年(3)
2015年(2)
2013年(6)
2012年(7)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.