Factors influencing the adoption of wireless networks in New Zealand businesses
|dc.contributor.author||Bryce, Stefan John||en_NZ|
|dc.identifier.citation||Bryce, S. J. (2004, November 12). Factors influencing the adoption of wireless networks in New Zealand businesses (Dissertation, Bachelor of Commerce with Honours). Retrieved from http://hdl.handle.net/10523/1198||en|
|dc.description.abstract||Wireless networking is a current topic in information science and the business world is beginning to adapt to this new technology. This study proposes to assess what percentage of New Zealand businesses have adopted wireless, and try to determine what the major influences are on companies adopting a wireless network. Based upon the literature review, suitable companies to target were determined and surveyed. This study questioned the top 500 businesses in New Zealand and 250 government agencies as to their wireless use, and what was, or is the major factor influencing their decision to adopt wireless networking. It also addressed the differences in perceptions of wireless between those companies that have adopted wireless, and those that have not. It was discovered that the most influential factor on businesses adopting wireless was security. Some of the other factors that influenced businesses decisions were cost, range and bandwidth. It was also discovered that of those companies that were concerned about security, there was a difference between the perceptions of wireless between those that have adopted wireless, and those that have not.||en_NZ|
|dc.subject.lcsh||T Technology (General)||en_NZ|
|dc.subject.lcsh||Q Science (General)||en_NZ|
|dc.title||Factors influencing the adoption of wireless networks in New Zealand businesses||en_NZ|
|thesis.degree.name||Bachelor of Commerce with Honours|
|thesis.degree.grantor||University of Otago||en_NZ|
|dc.description.references||Arbaugh, W. A. (2003). "Wireless Security is different." IEEE Computer. Cappel. L (2003, May – Last Update). WiFi Worries - What's all the fuss about Available: http://www.istart.co.nz/index/HM20/PC0/PVC197/EX245/AR23995 (Accessed: 2004, July 10) Davison, N. Guide to Ad-Hoc wireless home networks, Hardware. Avenue Reviews. http://www.hardavenue.com/reviews/adhocguide.shtm1,2004 (Accessed: 2004, April 26) Dell Oro' Group (2004 – last update) Dell'Oro Group 5-Year Forecast Available: http://www.deloro.com (Accessed 2004, September 11) Garber, L. (1999). "Rise of Wireless Technology." IT Professional: 77-80. Gartner (2004) "Wireless Lan Equipment by region, 2002-2008 Executive summary, Avaliable: http://www.gartner.com (Accessed 2004, Septmber 20) Gedda, R. (2004). Wireless not yet the recommended answer. Computer World. Griffith, E (2002, October 25 1 Last Update) Mapping the Lack of Security, (siliconvalley.internet.com) Available: http://siliconvalley.internet.com/news/article.php/1488541 (Accessed 2004, September 20) Huber, N. (2003). Wireless is on the rise in UK firms. Computer Weekly: 5. ITtoolbox (2004, April 14 – Last Update) 2004 ITtoolbox Wireless Security Survey. Available: http://security.ittoolbox.com/research/VernierSurvey.asp (Accessed:2004, May 10) Keizer. G. (2003, March 27 – Last Update). Gartner Predicts Wireless Use To Grow Sevenfold By 2007. (TechWeb). Available: http://www.techweb.com/tech/mobile/20030414_mobile Leedy, P. D & Ormrod. (2001). Practical Research - Planning and Design. Columbus, Ohio, Merrill Prentice Hill. Leyden J. (2004, April 30 – Last Update). Global IT security spend hits $42bn (SecurityFocus). Available: http://www.securityfocus.com/columnists/237 (Accessed: 2004, May 04). Mitchell, B (2004) Wired vs. Wireless Networking (About.com). Avaliable: http://compnetworking.about.com/cs/homenetworking/a/homewiredless.htm Molta, D. (2001). Is Perception Everything. Air Time. Nasaw, D. (2004). "Technology (A Special Report); Wary of Wireless: How vulnerable are WiFi networks? Perhaps less than many companies fear." Wall Street Journal. (Eastern edition). 10. Pahlavan, K. and P. Krishnamurthy (2002). Principles of Wireless Networks. New Jersey, Prentice Hall PTR, Potter, B. (2003). "Wireless Security's Future." IEEE Security & Privacy: 68-72. Reilly, R. (2002). "The Net Works: I just got comfortable with wired networks...and now We're thinking of going wireless." Multimedia Schools 9(4): 68-70. Rendon, J. (2003, May 07 – Last Update). Putting wireless LAN fears to rest, SearchNetworking.com). Available: http://searchnetworking.techtarget.comigna/0,289202,sid7_gci899811,00.html (Accessed: 2004, April 13). Robotics (2004). "U.S. Robotoics Boosts 802.11g wireless speeds up to 25 MBPS." Tele - Service News 16(5). Rolelberg, S. G., & Luoing, A (1998). Nonresponce to mailed surveys: A review and guide, Current Directions in Psychological Science, v7, p60-65 Shim, R. (2003, November 07 – Last Update). Businesses warm to WiFi. (CNET). Available: http://computercops.biz/article4043.html (Accessed: 2004, April 30) Smith, B. (2004). Next Generation Of Internet Protocol Inches Closer. Wireless Week. 10: 46. Snow, S. (2002). "Avoid wireless interference." Frontline Solutions 3(5): 38. Stallings, W. (2001). "IEEE 802.11: Moving Closer to practical wireless LANs." IT Professional: 17- 22. Vaughan-Nichols, S. J. (2003). "The Challenge of WiFi Roaming." IEEE Computer: 17-19. Winterford. B. (2003, August 27 – Last Update). Wireless: The next wave. (ARNnet). Available: http://www.arnnet.com.au/index.php?id=278180250 Infopeople(2003, February 13 – Last Update). Network Security - Securing Wireless Networks, (Infopeople.org) Avaliable : http://www.infopeople.org/howto/security/networic/wireless.html (Accessed 2004, September 9) Nichols, Randall K., Panos C. Lekkas. (2002) Wireless Security. New York: McGraw-Hill, 2002. Stripling, T. (2003) "History and Best Practices of Wireless Network Security." GIAC security essentials (GSEC)||en_NZ|
Files in this item
There are no files associated with this item.
This item is not available in full-text via OUR Archive.
If you would like to read this item, please apply for an inter-library loan from the University of Otago via your local library.
If you are the author of this item, please contact us if you wish to discuss making the full text publicly available.