The paper "Bring Your Own Device - Service Availability and Rollout" is an outstanding example of a marketing case study. With mobility consumerisation, scores of business organisations are turning to programs such as Bring Your Own Device (BYOD), or a crossbreed approach that includes a BYOD program as well as deployed corporate-owned devices (Armando et al. , 2014, p. 48.). Therefore, by implementing a BYOD program, the Education Commission will permit staff access to organisational resources from anyplace; thus, heightening productivity as well as bringing about worker satisfaction. However, supporting diverse mobile platforms as well as securing staff-owned devices, can generate multifaceted issues for the information technology department.
It is worth noting that organisations all over the world are persistently working towards boosting their workers’ flexibility, efficiency and productivity. For a number of IT executives, mobility has moved up in the list of proprieties given that they are intensifying the commonness of mobility programs all through the organization. Still, they are challenged to acknowledge the considerable rise in the number of mobile devices utilised by the employees in the workplace (Rose, 2012, p. 65). Workers are, on one hand, necessitating access from devices not just in the company, but as well further than the firewall with laptops, home PCs, tablets and smartphones.
Risk management, on the other hand, posits that organisational information/data have to remain secured. The paper seeks to report on how BYOD should be designed, implemented and administered, and how BYOD should be best organized given comparable industry interest in this aspect of IT service delivery. BYOD Plan By and large, BYOD can be described as a strategy that permits persons to make use of their individual mobile devices, whether rarely, mostly or solely, for work (Leavitt, 2013, p. 16).
Presently, scores of organisations permit individuals to add-on their enterprise-owned system(s) with other devices such as laptops, home PCs, tablets and smartphones as required for best productivity, mobility and flexibility. Several have gone further and get rid of certain types of the enterprise-owned device completely for qualified workers who rather desire to make use of their own devices; in a number of instances, payment is offered to assist in settling the worker’ s costs. Besides that, contractors are ever more needed to make use of their own devices instead of being offered with business-owned devices (Business-Backbon, 2014).
Preferably, practices within the organisation that are rooted in BYOD have to be detailed in official policy. The actuality as mentioned by Armando et al. (2014, p. 52) is that scores of individuals have already brought their own mobile devices in the workplace, in spite of whether the corporation has an implemented BYOD policy. Statistically, the present average number of mobile devices that have connected to the corporate-owned network is five per skilled employee, four devices across all employees, and by 2020 this is projected to increase to roughly six devices. Partly, this reveals a change in the endpoint setting nature, given that the supremacy of conventional desktop computers offers a means to a broader scope of alternatives that allow people decide the appropriate combination of device size, performance, mobility, as well as weight for their individual reasons, regardless if it will be a Smartphone, tablet or laptop.
So far, BYOD remains an unofficial practice for scores of organizations. Meanwhile, the lack of a BYOD approach that is more rational has left the organisation vulnerable to risks from gaps created by security and compliance to increasing IT intricacy (White-House, 2012).
Whereas consumerisation continues rising rapidly, the necessity for an inclusive BYOD strategy is clear, and the strategy must contain both technologies as well as policy. In this case, from a technology point of view, the most palpable query will be how workers will manage to access business information and enterprise applications on their own mobile devices. Basically installing applications onto the device directly could elevate serious compliance, privacy, and security risks, support difficulties, issues with license management and limiting BYOD to devices that are Window-based; thus, leaving behind other customer devices from the plan.
Armando, A., Costa, G., Verderame, L. & Merlo, A., 2014. Securing the "Bring Your Own Device" Paradigm. Computer, vol. 47, no. 6, pp.48 - 56.
Business-Backbon, 2014. BYOD policies in the workplace: guidance for accountants. [Online] Available at: http://www.businessbackbone.co.uk/cloud-accounting-saas/byod-series-part-3-byod-policies [Accessed 19 September 2014].
Citrix, 2012. Best practices to make BYOD simple and secure: A guide to selecting technologies and developing policies for BYOD. White Paper. Fort Lauderdale, FL, USA: Citrix Citrix (NASDAQ:CTXS).
Hayes, B. & Kotwica, K., 2013. Bring Your Own Device (BYOD) to Work: Trend Report. Boston: Newnes.
He, W., 2013. A survey of security risks of mobile social media through blog mining and an extensive literature search. Information Management & Computer Security, vol. 21, no. 5, pp.381 - 400.
Leavitt, N., 2013. Today's Mobile Security Requires a New Approach. Computer, vol. 46, no. 11, pp.16 - 19.
Rose, C., 2012. BYOD: an examination of bring your own device in business. Review of business information systems, vol. 17, no. 2, pp.65 - 69.
White-House, 2012. Bring Your Own Device. [Online] Available at: http://www.whitehouse.gov/digitalgov/bring-your-own-device [Accessed 19 September 2014].