The BYOD RevolutionWhat's in It for the Organization? So, What Can Go Wrong? Mobile Device Management Consumerization of IT Business as UsualMaking a Financial Case for BYOD Supporting BYOD Cost-Benefit Analysis Break-Even Analysis Estimating ROI for an IT Project Earned-Value Management Rapid Economic Justification Value Measuring Methodology Step 1: Develop a Decision Framework Task 1-Identify and Define Value Structure Task 2-Identify and Define Risk Structure Task 3-Identify and Define Cost Structure Task 4-Begin Documentation Step 2: Alternative Analysis-Estimate Value, Costs, and Risk Task 1-Identify and Define Alternatives Task 2-Estimate Value and Cost Task 3-Conduct Risk Analysis Task 4-Ongoing Documentation Step 3: Pull Together the Information Task 1-Aggregate the Cost Estimate Task 2-Calculate the Return on Investment Task 3-Calculate the Value Score Task 4-Calculate the Risk Scores Task 5-Compare Value, Cost, and Risk Step 4: Communicate and Document Task 1-Communicate Value to Customers and Stakeholders Task 2-Prepare Budget Justification Documents Task 3-Satisfy Ad Hoc Reporting Requirements Task 4-Use Lessons Learned to Improve Processes Uncertainty Analysis Sensitivity AnalysisGlossaryReferenceIntegrating BYOD into Performance Measurement and Management SystemsWhy Measure?Understanding Performance Management Define Organizational Vision, Mission, and Strategy Develop Performance Objectives, Measures, and Goals Give Measures Time to EvolveAttributes of Successful Performance Measurement SystemsDeveloping Benchmarks Plan Collect Analyze AdaptUsing Balanced Scorecard to Measure BYOD EffectivenessRepresentative IT...Balanced Scorecard Value MetricsKeeping Track of What's Going OnValidation and VerificationReferencesAssessment and Mitigation of Risks in a BYOD EnvironmentInitiating the Risk AssessmentA Typical Organization's Computer SystemSystem ArchitectureSystem Operational Authority/OwnershipThreats to A Typical Organization's AssetsCurrent Security MeasuresCOG Contingency PlanningDivisional Contingency PlanningProtection against Network-Related ThreatsVulnerabilities Reported by the Risk Assessment TeamRecommendations for Mitigating the Identified VulnerabilitiesSummaryReferenceGuidelines for Managing and Securing Mobile Devices in the EnterpriseMobile Device OverviewHigh-Level Threats and VulnerabilitiesUse of Untrusted Mobile Devices and NetworksUse of Applications Created by Unknown PartiesInteraction with Other SystemsUse of Untrusted ContentUse of Location ServicesTechnologies for Mobile Device Management Components and ArchitecturesCapabilities General Policy Data Communication and Storage User and Device Authentication ApplicationsSecurity for the Enterprise Mobile Device Solution Life Cycle Initiation Development Implementation Operations and Maintenance DisposalCase StudyCloud Best PracticesSelecting a Cloud ServiceCSP and End-User Agreements Terms of Service Agreements Non-Disclosure Agreements Service Level Agreements Terms and Definitions Measuring SLA Performance SLA Enforcement MechanismsCSP, Organization, and Integrator Roles and Responsibilities Contracting with Integrators Clearly Defined Roles and ResponsibilitiesStandardsSecurity Continuous Monitoring Incident Response Key Escrow Forensics Audit Logs Privacy Impact Assessments (PIA) Data Location Breach ResponseReferenceConfiguration Management in a BYOD EnvironmentCM and ProcessImprovementMeasurement and MetricsBenefits of BYOD CMCM ComponentsConfiguration IdentificationConfiguration Change ControlConfiguration Status AccountingConfiguration AuditingImplementing CM in the OrganizationManage the Risks of CMConfiguration Management and Data Management Document Identification Data Status Level Management Data and Product Configuration Relationships Data Version Control Digital Data Transmittal Data Access ControlContent Management, Mobile, and OtherwiseContent Management System (CMS)Document Management Systems/Electronic Document Management Systems (DMS/EDMS)Records Management Systems (RMS) Reliability Authenticity Integrity Usability What Are the Records Management Risks Associated with Websites?Digital Asset Management (DAM)Mobile Device Management and Mobile Content Management (MDM/MCM)Integrating BYOD into Resource ManagementData Management Roles Data Sponsor Data Steward Data Administration Database Administration System Administration and System SupportData Management Responsibilities Development and Management Requirements Identification and Enforcement Standards, Design, and Implementation Data and Mapping Standards Quality Control, Data Integrity, and Backup/Recovery Data Sharing Change Management and Impact Analysis Connectivity Input and Update Security Metadata TrainingGuidelines Guideline 1 Guideline 2 Guideline 3 Guideline 4 Guideline 5 Guideline 6 Guideline 7 Guideline 8 Guideline 9 Guideline 10 Guideline 11 Guideline 12 Guideline 13 Guideline 14 Guideline 15 Guideline 16 Guideline 17Glossary of Data Management TermsBYOD Means Social Networking Tools That Provide Networking Capabilities Wikis in Action Meaning-BasedComputing Semantic Web Virtual Worlds Knowledge Management Tools Mashups ReferencesQuick Start 1: Software-Based Authentication Procedures/Issues/Policies BibliographyQuick Start 2: BYOD: Making It Work for Your Firm Procedures/Issues/Policies BibliographyQuick Start 3: Software Selection from Multiple Packages Procedures/Issues/Policies BibliographyQuick Start 4: The Make-Buy Decision Procedures/Issues/Policies BibliographyQuick Start 5: Balanced Scorecard MetricsQuick Start 6: Common BYOD Mistakes Procedures/Issues/Policies BibliographyQuick Start 7: BYOD Corporate Policy Procedures/Issues/Policies BibliographyQuick Start 8: Mobile Device Management Functionality Guide Procedures/Issues/Policies BibliographyQuick Start 9: Legal Issues with BYOD Procedures/Issues/Policies The Fixes: How to Inoculate Your Company against Potential Legal Trouble BibliographyQuick Start 10: Managing Online Content Checklist Procedures/Issues/Policies General Content Management IssuesBibliographyQuick Start 11: Selecting a Content Management System Checklist Procedures/Issues/Policies Before You Start Determining Project Goals and Targets Determining and Documenting Business Requirements Producing Documentation Evaluating and Selecting a CMSBibliographyQuick Start 12: BYOD Lessons Learned Procedures/Issues/Policies Each Unique Survey...Survey...Survey Clarity Each and Every Platform Should Be IT's BFF The App Store Problem Virtualization: Might It Be a Temporary Savior?BibliographyQuick Start 13: BYOD Risks Procedures/Issues/Policies BibliographyQuick Start 14: Getting Started with BYOD Procedures/Issues/Policies BibliographyQuick Start 15: BYOD Security Tips Procedures/Issues/Policies
رده بندی کنگره
شماره رده
QA76
.
9
.
T43
نشانه اثر
J477
2016
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )