The paper 'Bring Your Own Device Phenomenon" is a good example of a management case study. The dynamics and the landscape of corporate mobility are gradually and steadily being integrated. Most workers are becoming confident and comfortable working with their own devices such as laptops, iPads, Smartphones, and tablets. This aspect has given rise to BYOD (Bring Your Own Device) phenomenon which is currently grounding its roots in contemporary business society. BYOD concept is gaining global recognition. Basically, most attention is being paid to its impact and benefits of the policy to organizational performance, cost incurred and cost benefits as well as the challenges it imposes on the security of organizational data and usability of mobile devices in the company.
Successful and effective adoption of BYOD programs requires a holistic and tactical evaluation of the potential costs, risks, and benefits of the policy. In support of organizational flexibility to the emerging business trends that have an impact on the organizational performance, this analysis strongly proposes the adoption of BYOD programs. The first part of this report displays a wide range of benefits that result from adoption BYOD programs which provide reasonable grounds to attract the attention of CEOs and CIOs of both service and product-based organizations.
One of the main benefits associated with the policy is enhanced productivity through employees’ job satisfaction. Furthermore, the concept is associated with other constructive aspects such as elevating employee mobility and boosting modes of attracting talents necessary for advanced innovation within the organization. However, the adoption of the BYOD policy is not a smooth experience as organizations encounter costs associated with upgrading the existing bandwidth platforms and data security challenges. Introduction Background of the Study The nature of organizational telecommunication has been deviating from the traditional mediums of communication such as email over the recent past.
The modern trend in which IT is being consumed within organizational context has become a force to reckon, sweeping the dynamics of industrial telecommunication in an entirely new direction. This report embarks on this relatively new dimension of organizational work procedure, popularly referred to as Bring Your Own Device (BYOD). The concept defines a business environment where employees execute their responsibilities using personally owned technological devices such as Smartphones, laptops, iPads, and tablets to gain access to the organizational database.
List of Reference
Adtran Inc. 2012, ADTRAN Announces Cloud-Ready BYOD Network Suite for More Efficient Scaling, Retrieved from: < http://www.virtualizationconference.com/node/2295541 > [ 28th October, 2014].
Alleau, B. & Desemery, J 2013, Bring Your Own Device: It’s all About Employee Satisfaction and Productivity not Cost. Retrieved from: < http://www.capgemini-consulting.com/resource-file-access/resource/pdf/bringyourowndevice_29_1.pdf> [ 28th October, 2014].
Bill, M 2012, “BYOD security challenges: control and protect your most sensitive data”, Journal of Networking Security Vol. 2012 (2),pp 5-8
Buser, C 2011, How Workers Can BYOD Without Risking Data, Networks Retrieved from:
Christian, C 2014, Tips for Mitigating BYOD Security Risks, retrieved from:
Dell Inc. 2013, Dell Unveils Global BYOD Survey Results: Embrace BYOD or Be Left Behind
Forrester Research, Inc. 2012, Enterprises Achieve a Wide Range of Benefits by Deploying Bring-Your-Own-Device Programs, Retrieved from:
Gartner, Inc. 2013, Gartner Predicts by 2017, Half of Employers will Require Employees to Supply Their Own Device for Work Purposes
Intega IT 2014, Calculating the True Cost of BYOD: The Hidden Costs of Bring-Your-Own-Device, Retrieved from: < http://www.intega.ca/wp-content/uploads/2014/01/Calculating-the-True-Cost-of-BYOD.pdf > [ 28th October, 2014].
Kaneshige, T 2012 “BYOD: Five Hidden Costs to a Bring-Your-Own-Device Programme,” Computerworld UK, Retrieved from: < http://www.computerworlduk.com/in-depth/mobile-wireless/3349518/byod--five-hidden-costs-to-a-bring-your-own-device-progamme/> [ 28th October, 2014].
Meru Networks Inc. 2013, BYOD Best Practices Requirements and Challenges, Retrieved from < http://www.merunetworks.com/collateral/white-papers/wp-byod-implementation-whitepaper-for-wlan-security.pdf> [ 28th October, 2014].
PricewaterhouseCoopers, 2012, Bring your own device: Agility through consistent delivery, Retrieved from < http://www.pwc.com/en_US/us/increasing-it-effectiveness/assets/byod-1-25-2012.pdf> [ 28th October, 2014].
Reddy, AS 2012, Cognizant Research Center, Making BYOD Work for Your Organization, Retrieved from:
Staten J & Cullen, A 2011 “BT 2020: IT’s Future in The Empowered Era,” Forrester Research, Retrieved from:
Waterfi, MR & Dilworth, CA 2014, “CA BYOD: Where the Employee and the Enterprise Intersect”, Employee Relations Law Journal, vol. 40(2), pp 22-36.