BYOD: Information Systems Architectures and IT Asset Investment

Verified

Added on  2023/05/29

|5
|621
|112
Essay
AI Summary
This essay delves into the complexities of Bring Your Own Device (BYOD) policies within organizations, highlighting both the potential benefits and significant risks associated with their implementation. It discusses the importance of establishing robust governance strategies to manage mobile and cloud platforms, emphasizing the need for careful consideration of information systems architectures and IT asset investments. The essay also explores the evolution of BYOD, from its initial stages to the updated version (BYOD 2.0), which prioritizes enhanced security measures and professional management of IT resources. Ultimately, the essay advocates for a balanced approach that considers both employee convenience and company security to maximize the advantages of BYOD while mitigating potential threats.
Document Page
BYOD (BRING YOUR OWN DEVICE)
BYOD (Bring Your Own Device)
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1BYOD (BRING YOUR OWN DEVICE)
Table of Contents
Information systems architectures..............................................................................................2
Investing in IT related assets......................................................................................................2
BOYD........................................................................................................................................2
Reference....................................................................................................................................4
Document Page
2BYOD (BRING YOUR OWN DEVICE)
Information systems architectures
The extensive development in the field of IT has led to the growth of new mobile and
cloud platforms; almost every global organisation plans an effective governance strategy to
meet the organisational objectives. The project management practices and the business
decisions can be taken quite easily with the help of the advanced IT based systems. However,
it is also seen that efficient governance plans can do more damage to the system more than it
contributed over the years (Boehm & Thomas, 2013). Both software and hardware used in
the business enterprises fall under the category of IS architecture should be efficiently used as
per the governance plans so that the risks related to it can be minimized.
Investing in IT related assets
The potentials risks associated with the IT assets need to be eliminated to achieve a
scalable and compliant environment. The IT related assets should be following the industrial
regulations and restrict the use of every unauthorised device. The policy associated with the
IT assets should be revised accordingly as new means of threat are arising every day
(Scholtens, 2014). The IT assets which are maintained by the employees of the business
organisation should be evaluated critically before integrating them into a sensitive
environment. Investment in the IT related assets should be supported by IT assets and
inventory management in order to minimise the incremental risks associated with the IT
assets.
BOYD
The practice of BYOD was thought to be successful in its initial stages but there were
complexities associated to it. This resulted in the rise of the updated version of BYOD which
states that the business enterprises will be giving employees their authorised device as it will
Document Page
3BYOD (BRING YOUR OWN DEVICE)
provide more security to the networking system (McDonald, 2014). In this way, all the
personal data considering the practise of the earlier version of BYOD can be saved from the
external threats. Conveniency of data can be maintained with the use of BYOD 2.0 as it deals
with the unsanctioned IT resources in a professional manner (Silva, 2013). The cloud services
are also an exquisite feature of the BYOD policy as it gives security even if multiple devices
are connected to a particular file. The practice of the updated version of BYOD will benefit
both from the point of view of the employees as well as from company’s perspectives.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4BYOD (BRING YOUR OWN DEVICE)
Reference
Boehm, M., & Thomas, O. (2013). Looking beyond the rim of one's teacup: a
multidisciplinary literature review of Product-Service Systems in Information
Systems, Business Management, and Engineering & Design. Journal of Cleaner
Production, 51, 245-260.
McDonald, C. (2014). The dark side of shadow IT. Risk Management, 61(3), 52.
Scholtens, B. (2014). Indicators of responsible investing. Ecological Indicators, 36, 382-385.
Silva, P. (2013). BYOD 2.0: Moving Beyond MDM. F5 White Paper, Retrieved on, 9, 20.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]