首页> 外文OA文献 >Data-centric security : towards a utopian model for protecting corporate data on mobile devices
【2h】

Data-centric security : towards a utopian model for protecting corporate data on mobile devices

机译:以数据为中心的安全性:面向用于保护移动设备上的企业数据的乌托邦模式

摘要

Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries through mobile devices. Mobile devices continue to evolve as multi-functional tools for everyday life, surpassing their initial intended use. This added capability and increasingly extensive use of mobile devices does not come without a degree of risk - hence the need to guard and protect information as it exists beyond the corporate boundaries and throughout its lifecycle. Literature on existing models crafted to protect data, rather than infrastructure in which the data resides, is reviewed. Technologies that organisations have implemented to adopt the data-centric model are studied. A utopian model that takes into account the shortcomings of existing technologies and deficiencies of common theories is proposed. Two sets of qualitative studies are reported; the first is a preliminary online survey to assess the ubiquity of mobile devices and extent of technology adoption towards implementation of data-centric model; and the second comprises of a focus survey and expert interviews pertaining on technologies that organisations have implemented to adopt the data-centric model. The latter study revealed insufficient data at the time of writing for the results to be statistically significant; however; indicative trends supported the assertions documented in the literature review. The question that this research answers is whether or not current technology implementations designed to mitigate risks from mobile devices, actually address business requirements. This research question, answered through these two sets qualitative studies, discovered inconsistencies between the technology implementations and business requirements. The thesis concludes by proposing a realistic model, based on the outcome of the qualitative study, which bridges the gap between the technology implementations and business requirements. Future work which could perhaps be conducted in light of the findings and the comments from this research is also considered.
机译:以数据为中心的安全性对于理解,评估和减轻公司边界外共享信息的各种风险和影响非常重要。信息通常通过移动设备离开公司边界。移动设备已经成为用于日常生活的多功能工具,其用途已超出最初的用途。这种增加的功能和越来越广泛地使用移动设备并非没有一定的风险-因此,需要保护和保护信息,因为它存在于公司范围之外并且贯穿其整个生命周期。审阅了旨在保护数据而不是数据所驻留的基础结构的现有模型的文献。研究了组织为采用以数据为中心的模型而实施的技术。提出了一种乌托邦模型,该模型考虑了现有技术的缺点和通用理论的不足。报告了两套定性研究。第一项是初步的在线调查,以评估移动设备的普遍性以及为实现以数据为中心的模型而采用的技术的程度;第二部分包括针对组织为采用以数据为中心的模型而实施的技术的焦点调查和专家访谈。后者的研究表明,在撰写本文时,数据不足,因此结果具有统计学意义;然而;指示性趋势支持文献综述中的断言。这项研究回答的问题是,旨在减轻移动设备风险的当前技术实施方案是否真正满足了业务需求。通过这两组定性研究回答了这个研究问题,发现了技术实施与业务需求之间的不一致。本文的结论是基于定性研究的结果,提出了一个现实的模型,该模型弥合了技术实施与业务需求之间的差距。还考虑了可能会根据研究结果和评论进行的未来工作。

著录项

  • 作者

    Mayisela Simphiwe Hector;

  • 作者单位
  • 年度 2014
  • 总页数
  • 原文格式 PDF
  • 正文语种 English
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号