Bring Your Own Devices in Business Organizations

Verified

Added on  2022/12/01

|4
|3045
|432
AI Summary
This report discusses the concept of Bring Your Own Devices (BYOD) in business organizations. It explores the benefits and challenges of implementing BYOD, such as increased employee satisfaction, cost-saving, and flexibility. The report also highlights the importance of data security and proposes a design for a successful BYOD implementation. The research is based on the current situation and suggests that BYOD can be a profitable approach if managed properly.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
ITC595 Research Project
BRING YOUR OWN DEVICES IN BUSINESS
ORGANISATIONS
A. Author
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au
ABSTRACT The report consists of the thought of Business
Your Own devices is beneficial for business organizations or
not.
INTRODUCTION
Several technologies have been used in this topic. Bring
your own device means to add new and various techniques in
this case to solve the procedure of the business properly. It can
be said that business strategy and process depend on several
new technologies like mobile phone, personal computers etc.
Customer activity is traced to mobile phones. The order access
and the update of the online product delivery can also be
completed with mobile phones [1]. The main research has
been done in the policies with the personal devices which is
involved in the information and the application.
A. Research Problem
After implementation, various data of the
organization will be easily available for several
employees. So it will create huge difficulties to
maintain the sensitive data appropriately.
Data arrange and the backup will be a huge problem
for the organization.
Enterprise data loss and leakage will create a huge
problem.
If accessed devices are rooted or jail broken; then it
will create a huge problem for the company [2].
B. Research Justification
The new technology is very much important for each and
every companies. The computer and mobile devices are
essential for it. But after giving the access; it has been stated
that various data loss or leakage may have happened through
this procedure. So the research has been stated in this
situation where the technology is needed for the business [3].
LITERATURE REVIEW
BYOD concept: In the past 2004 the term has been
used in Astricon. After that the Intel had used the
term in 2009 when the laptops, computers, tablets
and mobile phones were involved in the networking
system. After that, the business your own devices
concepts are used in the enterprise thoughts to
complete the process of business development. After
the technology has been established, the Middle East
were fully dedicated to this technology. Near about
80% people in the IT industry in the year 2012 have
been involved in the BYOD concepts. The
International Business Machine Corporation of
IBM’s employee think that (near about 82%)
smartphones have a huge role in the business
industry. Because the employees are very much
comfortable with personal device usage, this concept
will help to increase productivity, easy navigation of
the device and updating the work process. Not only
the IT team, can the device be handy for the other
department also [6]. So it is said that BYOD help to
increase job satisfaction and productivity. Sometimes
there are several methods used in the process that
will help to upsurge the thought. Suppose an
employee has an issue to attend the office, then
he/she could easily provide the solution from other
places. So it is a huge advantage to carry the laptop
and the other devices. Also, the company does not
have to invest money for providing the devices for
the usage; so the concept is very much cost-efficient
for the company.
Benefits of the BYOD
It has several points that have been needed to be
0discussed properly. Those are:
It will increase employee satisfaction hugely;
because a huge amount of delay may occur for the IT
department. So the employee will happily accept
their own devices for work.
The devices are generally following the up to date
version. There is chance in the employees to use a
useful new device always. That is how company will
get the benefit of new updated features for BYOD
usage [11]. Also the companies do not need any type
of investment with the equipment, so it can be said
that investment level will below.
A huge amount of networking cost can be saved
through this BYOD. If the user is using their own
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
device, then the internet is used by their own
network. That is how the internet/networking cost
will below.
So if the majority will be low, and the company can
invest its money in other expansion.
All of the employees will feel more comfortable with
their devices in portal handling; thus the productivity
will increase a lot.
The employee will take care of their own device with
their own responsibility. So the IT team will have
more time to spend with the critical issue.
The working time will be flexible because the
employee can perform well for the companies at
24x7 because they always carry their own device.
Sometimes the working hours may increase for them,
so the productivity will increase for the companies.
That is how the BYOD has several benefits in the
organization. Though there is a RISK for the data
loss in this matter or maybe the device can be lost,
but still it is a profitable step for any company. It can
be said that the new advance IoT technology can be
involved in the system for more accomplishments.
The enterprise will always try to save money from
the various field, and apply it into the other new
employee and that is why the BYOD is so much
important.
Challenges in the BYOD
There are several challenges needed to discuss to
solve the matter. It is very much easy to carry and
upload the data from the employees own devices. But
this cause also the various risk for the company. In
the IDG survey near about 1600 It experts have
confirmed serious violation report. All of these
caused by the BYOD concept. That is why the
BYOD should follow policies made by the company.
BYOD also has the end node problem (When any
companies give the authority for using the personal
device for work, then several devices are used to
access the unauthorized network, which is risky for
the companies)[8].
Another one problem that has been situated, is the
data bridge problems. Sometimes the employee uses
their own phone in the company network. After that,
if the phone will be lost; then the sensitive data will
be lost for this matter. Except that if the employee
sold the device without formatting it; then the data
will be explored. Sometimes the other family
member (those have the permission of using the
employ’s phone) accidentally share the sensitive
data. All of these are data bridge problem [4]. So the
child activity and the lack ness of employees’ activity
may cause a huge problem for the organizations. It
can be said that risk is always faced for the process of
BYOD. It can be said with the advantage, there are
also disadvantages. The primary data is needed to
explore the research properly. It can be said that the
data is the main thing; which is private and cannot be
accessible for the other companies[12].
This technology will help to complete the process of
work properly with the help of own technology like
the own phone and the personal computers. Now it
can be stated that the laptop, smart phone and tablets
are useful of the accessing the information
application. This phenomenon is denoted as the IT
consumerization. As previously said that it has been
started in the year 2009; till today’s date it is one of
the main featured system to controlling the system
[13]. There are some main challenges or Risks should
be discussed:
Sunk Cost: various companies have been changed
their system to BYOD system to save the cost. Some
of the companies are providing their mobile phone,
with the selected models. After that it will be given to
the employee for work purpose. Now it can said that
initially it is very much profitable. But in the It
industry several employees will leave the job and
joined in other company. After that they will not
return the device that has been given by the
company. After that it can be said that amount has
been invested for the BYOD for those employees
device will be lost. Except that those data has been
saved in that devices; will lost. That is how the
company may face huge loss [14].
Security: As per the previous point; one of the
problem have to be faced, that any employee has a
chance to leave the company. Then not only will the
device cost, the stored data of that device be hamper
the company hugely. Another point is, the device
should be maintained properly. In the personal usage
most of the employees are not interested in installing
proper antivirus; that is how a chance of attack has
been taken places [15]. It can be said various
application will be installed in the used mobiles. That
is how the problem has arisen. If the user
unconsciously clicked in the fake links from the
application and the applications; then the hacker will
steal the sensitive data from the device. Also
blackmailing against the data can be taken places
through the system. So the mobile device
management and the mobile application management
should be maintained properly[16]. The protected
devices like the iPhone and blackberry should be
used for this type of situation.
Higher IT cost: Though the concept of the BYOD
will help to reduce the cost of the overall situation.
But one of situation has been already situated, if any
employee leave the company with the devices; then it
will effect the economy. In the other hand, if normal
system will be converted into BYOD technology;
then there is a chance to invest a huge amount of
money for the overall changes. It will cost a lot.
Another one aspect needed to discuss; after getting
their own devices the employee will take extra leave,
Document Page
because work from home is applicable for them. For
that reason productivity may hamper. On the other
hand they will have a tendency to work when
travelling. At that time the roaming cost has to be
paid by the company. So the overall cost may
increase; which will create a huge problem [9].
So it can be stated that there are several facts are
analyzed. The research has been done with the fact of
the current situation. In one hand it is productive and
cheap; on the other hand, it is costly and less
productive; all of the situation can be handled
through the situation. So the negative situation
should be maintained properly to make the system
more productive and profitable. After all the
technology is new with the BYOD concept. So it can
be said that employee has scope to culture their topic
for completing and modifying the task. If the
employees are dedicated, then each and every
organization should follow the BYOD concept. In
future the Artificial Intelligence will be also included
with this technology [10].
C. Figures and Tables
Figure 1: Mobile device ownership
Source: [7]
PROPOSED DESIGN
It can be said that technology has been grown day by
day. In today’s world business should be more profitable and
less invested business. So it can be said that both BYOD and
data security. Now if the BYOD used by any company, then it
can be said that; it is profitable for the company. Except that
the employee can access the data from the home or another
area. But there are several risk issue that has discussed
previously. So it can be said that if the employees are very
much conscious about their data; and the passcode used by it
protected[5]. Then the data will be safe. So it is highly
recommended to provide the BYOD to any business
organisation with the terms and condition and the employee
awareness to make the product more profitable.
CONCLUSION
The BYOD is the main concept which will help to
complete the business procedure more productive and
effortless. So if the employee of the organisation is a little bit
couscous about their own device from wrong hand; then this
thought is highly recommended for each and every
organisation; because productivity will increase without
investments. So according to the proposal, the BYOD
approach is little bit positive for organisations. But the
primary data collection of the research will help to sketch the
actual result, that which one is truly profitable for any
organisations.
REFERENCES
[1]M. Dhingra, "Legal Issues in Secure Implementation of Bring Your Own
Device (BYOD)", Procedia Computer Science, vol. 78, pp. 179-184, 2016.
Available: 10.1016/j.procs.2016.02.030.
[2]S. Al Ayubi, A. Pelletier, G. Sunthara, N. Gujral, V. Mittal and F.
Bourgeois, "A Mobile App Development Guideline for Hospital Settings:
Maximizing the Use of and Minimizing the Security Risks of "Bring Your
Own Devices" Policies", JMIR mHealth and uHealth, vol. 4, no. 2, p. e50,
2016. Available: 10.2196/mhealth.4424.
[3]"Security Issues with Mobile IT: A Narrative Review of Bring Your Own
Device (BYOD).", Journal of Information Engineering and Applications,
2019. Available: 10.7176/jiea/8-1-07.
[4]S. Smith, "10 steps to Bring Your Own Device", SecEd, vol. 2013, no. 3,
2013. Available: 10.12968/sece.2013.3.1714.
[5]P. Baillette, Y. Barlette and A. Leclercq-Vandelannoitte, "Bring your own
device in organizations: Extending the reversed IT adoption logic to security
paradoxes for CEOs and end users", International Journal of Information
Management, vol. 43, pp. 76-84, 2018. Available:
10.1016/j.ijinfomgt.2018.07.007.
[6]A. Garba, J. Armarego, D. Murray and W. Kenworthy, "Review of the
Information Security and Privacy Challenges in Bring Your Own Device
(BYOD) Environments", Journal of Information Privacy and Security, vol.
11, no. 1, pp. 38-54, 2015. Available: 10.1080/15536548.2015.1010985.
[7]J. Adhikari, A. Mathrani and C. Scogings, "Bring Your Own Devices
classroom", Interactive Technology and Smart Education, vol. 13, no. 4, pp.
323-343, 2016. Available: 10.1108/itse-04-2016-0007.
[8]A. Weeger, X. Wang and H. Gewald, "It Consumerization: Byod-Program
Acceptance and its Impact on Employer Attractiveness", Journal of Computer
Information Systems, vol. 56, no. 1, pp. 1-10, 2015. Available:
10.1080/08874417.2015.11645795.
[9]A. Weeger, X. Wang and H. Gewald, "It Consumerization: Byod-Program
Acceptance and its Impact on Employer Attractiveness", Journal of Computer
Information Systems, vol. 56, no. 1, pp. 1-10, 2015. Available:
10.1080/08874417.2015.11645795.
[10]A. Hovav and F. Putri, "This is my device! Why should I follow your
rules? Employees’ compliance with BYOD security policy", Pervasive and
Mobile Computing, vol. 32, pp. 35-49, 2016. Available:
10.1016/j.pmcj.2016.06.007.
[11]S. Marshall, "IT Consumerization: A Case Study of BYOD in a
Healthcare Setting", Technology Innovation Management Review, vol. 4, no.
3, pp. 14-18, 2014. Available: 10.22215/timreview/771.
[12]A. Leclercq - Vandelannoitte, "Managing BYOD: how do organizations
incorporate user-driven IT innovations?", Information Technology & People,
vol. 28, no. 1, pp. 2-33, 2015. Available: 10.1108/itp-11-2012-0129.
[13]R. Al-Okaily, "Mobile learning and BYOD: implementations in an
intensive English program", Learning and Teaching in Higher Education:
Gulf Perspectives, vol. 10, no. 2, 2013. Available: 10.18538/lthe.v10.n2.141.
Document Page
[14]F. Nwebonyi, "BYOD NETWORK: Enhancing Security through Trust–
Aided Access Control Mechanisms", International Journal of Cyber-Security
and Digital Forensics, vol. 4, no. 1, pp. 272-289, 2015. Available:
10.17781/p001410.
[15]D. Cristol and B. Gimbert, "Academic Achievement in BYOD
Classrooms", QScience Proceedings, vol. 2013, no. 3, p. 15, 2013. Available:
10.5339/qproc.2013.mlearn.15.
[16]X. Wang, A. Weeger and H. Gewald, "Factors driving employee
participation in corporate BYOD programs: A cross-national comparison
from the perspective of future employees", Australasian Journal of
Information Systems, vol. 21, 2017. Available: 10.3127/ajis.v21i0.1488.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]