There is a need in today's environment to provide high performance, scalable, and robust systems to almost all business, regardless of size (Twitchell, Infrastructure of electronic information management, 2004). A strong network infrastructure is the key to providing reliable information technology (IT) systems with minimal downtime for mission critical applications. Twitchell further indicated that a major component of insuring data is the provision of network security. The research problem addressed in this study was the lack of Virtual Private Networks (VPNs) within organizations as a component of value-added IT network-based services to the business. This study used an existing conceptual framework developed by Babb (2004) in the context of Southern California. The purpose of this quantitative study is to identify particular management perceptions on the use of Virtual Private Networks to enable managers to make better informed decisions. In particular, it will help them determine whether the technology is becoming widely adopted and if security and reliability aspects of the system are generally acceptable to technology management professionals. A survey of senior executives and IT professionals from information technology organizations was sent to a list of 2500 companies operating in the Southeast. A sample of 154 participants had completed the online survey. The Statistical Package for Social Sciences (SPSS®) was used to perform a Chi-square test of independence and/or dependence. The results of the Chi-square tests performed supported each of the four alternate hypotheses. The research clearly show that security, reliability and cost-benefit are reasons technology professionals choose a solution and these topics will continue to be of utmost important to executives, managers and vendors of information technology.
|Advisor:||Ness, Lawrence R.|
|Commitee:||GRAHAM, GORDON, JIN, ZHENHU|
|Department:||School of Business|
|School Location:||United States -- Minnesota|
|Source:||DAI-A 70/07, Dissertation Abstracts International|
|Keywords:||IT, Information technology, Security, VPN, Virtual Private Networks|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be