logo

Discussion on Bring Your Own Devices (BYOD)

   

Added on  2022-10-10

12 Pages3378 Words259 Views
Running head: DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
Discussion on Bring Your Own Devices (BYOD)
Name of the student:
Name of the university:
Author Note
Discussion on Bring Your Own Devices (BYOD)_1
DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
1
Executive summary
BYOD indicates to the organizational policy and authorizing employees for bringing the distinct
personal systems like mobiles, tablets and laptops. It helps in getting connected to the organization’s
business. In the resent case, for evaluating the innovation, the real-life situation of USYD healthcare
is taken into consideration. It refers to the health services within University of Sydney. Further, the
problems include the requirements to denote the suggestions solutions and issues to fulfil the
necessities. Besides, the results and benefits as the solution must be implemented here. At last, the
resources needed to achieve the outcomes are assessed here.
Discussion on Bring Your Own Devices (BYOD)_2
DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
2
Table of Contents
Introduction:..........................................................................................................................................3
Understanding the present challenges:..................................................................................................3
The requirements for addressing the aforementioned challenges:........................................................5
The suggested solution to fulfilling the requirements mentioned above:..............................................7
The benefits and outcomes as the solution are deployed:......................................................................8
Resources required to achieve the results:.............................................................................................8
Conclusion:............................................................................................................................................9
References:..........................................................................................................................................10
Discussion on Bring Your Own Devices (BYOD)_3
DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
3
Introduction:
BYOD refers to the organizational policy authorizing staffs to bring their individual personal
systems such as tablets, laptops and mobiles. This is to get connected with the network of the
business. To understand the technology, the real-life scenario of USYD healthcare is considered
here. This denotes to the health services under the University of Sydney. The wellbeing and health of
the people are their topmost priority. This is the reason they encourage to take benefits of their
convenient healthcare benefits at their campus. Irrespective of the fact that one requires any
treatment for health concern, illness and injury the University Health Service is always there to help.
Here, the challenges involving the necessities to denote to the issues and suggested solutions
fulfilling the requirements are demonstrated. Next, the benefits and outcomes as the solution is
deployed are discussed here. Lastly, the resources required to gain the results are analyzed here.
Understanding the present challenges:
Deploying Applications Effectively:
It is estimated by FDA that till 2015, there must be about 500 million individuals who would
be utilizing mobile phones throughout the world. They must have the healthcare apps installed in
them. Within 2018, about half of the 3.4 billion users of mobiles across the globe can have a
minimum of one medical or any app related to health downloaded (Keyes 2016). Here, USYD
healthcare is found to be utilizing the threat management software that is unified in nature. Besides,
they have been using firewalls for monitoring the application utilized on mobile systems. This is to
assure that they have been running securely and safely. The process helps the medical professionals
in remaining compliant with the HIPPA. This occurs as the system is found to be accessing the
application from the third party (Al Ayubi et al. 2016).
Discussion on Bring Your Own Devices (BYOD)_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Bring Your Own Devices (BYOD).
|1
|811
|1

Bring your own device (BYOD) in workplace project Description: Aztek
|14
|6141
|64

Sitemap | Network for SJGHC
|5
|732
|15

Information Security Management- Assignment
|8
|1556
|188

Case Study on IT Risk Assessment
|15
|6227
|173

Assignment - Internet of Things
|12
|4143
|100