logo

Bring Your Own Devices (BYOD).

   

Added on  2022-10-10

1 Pages811 Words1 Views
Bring Your Own Devices (BYOD) Strategy
USYD healthcare
Introduction:
The “Bring Your Own device” is
a leading practice and policy
at current workplaces. It
provides the advantages of
accessibility for technology
users and employers. However
there are few unique
challenges with this
innovation. In this is
presentation to understand
the technology the case of
USYD healthcare is chosen.
Furthermore, the current
technologies and the
challenges faced are
illustrated.
Current technologies:
Security:
It can consist of data about the
medical history of patent, medications,
treatments, current condition, lab test
data and radiology images. This
information gets susceptible to various
malware attacks with the scams of
phishing.
Misuse of facility network:
The network is vulnerable to attacks
coming from applications of third-party
that is downloaded to the staff’s
device (Leclercq-Vandelannoitte 2015).
Legislative consequences:
Every sensitive data of the patient is
susceptible to the misuse as the
device is lost or stolen.
Device fragmentation:
Implementing application on various
distinct systems can be brought to
Necessities to address the issues:
Alleviating the dependability of the devices owned by USYD
healthcare.
Using the system that USYD healthcare’s medical staff is been
familiar with
Deploy the 24-hour connections
Considering better and quicker actions and decisions
Develop the service quality (Brodin, Rose and Åhlfeldt 2015)
Proposed solution fulfilling every
requirement:
Enforcing organizational policies for USYD
healthcare such as data wipe, passcodes and
encryptions as the system is stolen and lost.
Mitigating IT efforts through implementing
particular applications to every device.
Containerizing professional and personal
information for maintaining the privacy of
employees.
Controlling devices for complying with various
policies of legislation.
Managing usages of the third-party applications
on the network and facility.
Delivering uninterrupted channel of
communication between the employees.Results and benefits as the solution get
implemented:
Having BYOD, the employees of USYD
healthcare never have to utilize backdated
systems prone to prolonged time of start-up
and malfunctions.
Staffs familiar with BYOD tend to quick access
accomplishing tasks in a short time.
Staffs are careful and prompter to update and
maintain the individual systems for efficiency.
Tech-savvy staffs of USYD healthcare tend to
update the latest system, fast devices through
cutting edge tools. This improves the entire
performance (Song and Kong 2017).
Development of staff’s onboarding time
Improvement of employee satisfaction
Increasing autonomy and flexibility
Resources required to gain the ultimate results:
At first, USYD healthcare is able to use the
BYOD FAQ for the staffs. Apart from this, there
can be BYOD policies and rules, Wiki, BYOD
network. As far as the web based resources are
concerned, downloadable mobile systems can
deliver the overview of the BYOD for the
employees. Apart from this, Pinterest is a smart
resource here. It involves the wide collection of
links regarding a particular issue (Fani, von
Conclusion:
BYOD in Healthcare is able to make inroads into
USYD healthcare. This has proved to be effective
and effectual for driving a better level of
processes. Using BYOD at USYD healthcare has
its individual set of issues nullified effective
through implementing powerful solutions.
Deploying strong policies of BYOD can lead to
effective healthcare services, connectives round-
the-clock taking place between the patients and
medical employees and lesser turn-around time
for making decision.
References:
Brodin, M., Rose, J. and Åhlfeldt, R.M., 2015.
Management issues for bring your own device. In
European, Mediterranean & Middle Eastern Conference
on Information Systems 2015 (EMCIS2015), 1-2 June,
Athens, Greece. European, Mediterranean & Middle
Eastern Conference on Information Systems (EMCIS).
Fani, N., von Solms, R. and Gerber, M., 2016, August. A
framework towards governing “Bring Your Own Device
in SMMEs”. In
2016 Information Security for South
Africa (ISSA) (pp. 1-8). IEEE.
Leclercq-Vandelannoitte, A., 2015. Leaving employees
to their own devices: new practices in the workplace.
Journal of Business Strategy,
36(5), pp.18-24.
Song, Y. and Kong, S.C., 2017. RETRACTED CHAPTER:
Affordances and Constraints of BYOD (Bring Your Own
Device) for Learning in Higher Education: Teachers’
Perspectives. In
Emerging practices in scholarship of
learning and teaching in a digital era (pp. 105-122).
Springer, Singapore.
Bring Your Own Devices (BYOD)._1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
BYOD Policy Design for Southern Cross University
|8
|1829
|264

Discussion on Bring Your Own Devices (BYOD)
|12
|3378
|259

Bring Your Own Device - (BYOD) Essay
|5
|827
|58

Security Consultation Tasks 2022
|8
|1840
|8

Aztek Risk Management & Assessment
|18
|5082
|30

Aztek IT Risk Assessment (DOC)
|17
|4326
|45