Roehampton University: BYOD Challenges in IT Networks Essay
VerifiedAdded on 2023/04/05
|6
|934
|283
Essay
AI Summary
This essay explores the challenges associated with Bring Your Own Device (BYOD) in IT networks. It begins by introducing BYOD and its growing prevalence in business environments. The essay then identifies and discusses two primary categories of challenges: technical and policy/regulatory. Technical challenges include access control, providing ongoing support, maintaining secure and stable connections, and protecting organization data stored in the cloud. Policy and regulation challenges involve government regulations and ethical/privacy issues. The essay highlights the need for research and development in BYOD security, emphasizing the importance of addressing limitations and closing loopholes. The conclusion summarizes the main points, reinforcing the need for a robust framework to mitigate the risks associated with BYOD implementation. The essay also includes a figure illustrating BYOD security challenges and a reference list with academic sources used to support the arguments.

Running head: BRING YOUR OWN DEVICE
Bring Your Own Device
Name of the Student
Name of the University
Author Note:
Bring Your Own Device
Name of the Student
Name of the University
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1BRING YOUR OWN DEVICE
Introduction
BYOD stands for bringing your own device is known to be as one of the rapidly growing
businesses which is very much concerned with information technology (Lee Jr et al. 2017). It
aims to provide a list of security concern which needs to be considered for implementing policies
of BYOD. There is some recent publication of proper awareness of various kind of risk which is
there involved in incorporation of BYOD in business (Dawson 2016). It is considered to be as
one of the underrated problem which is compared with other IT security concerns.
In the coming pages of the essay, an idea has been provided with respect to two key
challenges for BYOD in IT-based network. There is mainly two kinds of challenges like
technical challenges and policy and regulation challenges.
Discussion
Technical Challenges
Access Control: This particular challenge coincides with the deployment challenge.
Organization needs to understand the permission level for each of the given employee at the time
of accessing the resources. It can be both within the personal device and connection within the
external network (Keyes 2016). There are some other factors which help in understanding the
access control which comes up with time limits. The fact is all about limiting the number of
people who can gain easy access to resources at the given instance. It is all about understanding
the fact that how employee can easily gain access to the resources of the organization. Problem-
related to access control can vary as per the size of the business and number of employees in the
industry.
Introduction
BYOD stands for bringing your own device is known to be as one of the rapidly growing
businesses which is very much concerned with information technology (Lee Jr et al. 2017). It
aims to provide a list of security concern which needs to be considered for implementing policies
of BYOD. There is some recent publication of proper awareness of various kind of risk which is
there involved in incorporation of BYOD in business (Dawson 2016). It is considered to be as
one of the underrated problem which is compared with other IT security concerns.
In the coming pages of the essay, an idea has been provided with respect to two key
challenges for BYOD in IT-based network. There is mainly two kinds of challenges like
technical challenges and policy and regulation challenges.
Discussion
Technical Challenges
Access Control: This particular challenge coincides with the deployment challenge.
Organization needs to understand the permission level for each of the given employee at the time
of accessing the resources. It can be both within the personal device and connection within the
external network (Keyes 2016). There are some other factors which help in understanding the
access control which comes up with time limits. The fact is all about limiting the number of
people who can gain easy access to resources at the given instance. It is all about understanding
the fact that how employee can easily gain access to the resources of the organization. Problem-
related to access control can vary as per the size of the business and number of employees in the
industry.

2BRING YOUR OWN DEVICE
Providing ongoing Support: There is huge number of policies for BYOD which look
for some extra resources for maintaining the level of security of devices connected in a network.
There is huge amount of responsibilities of various security professionals so that they meet the
increasing need (Agudelo et al. 2016). BYOD security solution needs proper commitment and
money at the time of development.
Maintaining secure and stable connection: The main focus is on the corporate network
resources and devices which is connected to through external network. It is considered to be
common issue for BYOD business (Dhingra 2016). There is some wireless access point which
contains threats like malware that can install on device.
Protecting organization data which is stored in cloud: It is a sensitive issue as the
cloud application can help data to be accessed at any anytime. It can be used as an alternative
form which removes the need for storing data on various mobile devices (Cheng, Guan & Chau
2016). When the cloud-based storage is accessed from various mobile devices it can result in
various kind of security threats similar to the device like hacking and software-based attacks.
Providing ongoing Support: There is huge number of policies for BYOD which look
for some extra resources for maintaining the level of security of devices connected in a network.
There is huge amount of responsibilities of various security professionals so that they meet the
increasing need (Agudelo et al. 2016). BYOD security solution needs proper commitment and
money at the time of development.
Maintaining secure and stable connection: The main focus is on the corporate network
resources and devices which is connected to through external network. It is considered to be
common issue for BYOD business (Dhingra 2016). There is some wireless access point which
contains threats like malware that can install on device.
Protecting organization data which is stored in cloud: It is a sensitive issue as the
cloud application can help data to be accessed at any anytime. It can be used as an alternative
form which removes the need for storing data on various mobile devices (Cheng, Guan & Chau
2016). When the cloud-based storage is accessed from various mobile devices it can result in
various kind of security threats similar to the device like hacking and software-based attacks.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3BRING YOUR OWN DEVICE
Fig 1: BYOD Security Challenges
(Source: Created by Author)
Policy and Regulation Challenges
Government Regulation: There are some local government laws and regulation which
can incorporate into the organization. There is some level of control within the organization that
enforce the devices owned by employees (Lee Jr et al. 2017). Various organization around the
globe require to adjust with BYOD policies of each of the country. It can align with the local
laws which can make the streamline of employee contract along with monitoring of laws.
Ethical and Privacy Issues: There are some ethical and privacy issues which can
coincide with the legal implication. Employees can provide various kind devices which can be
used for work (Dawson 2016). Organization around the globe can consider various areas of
Fig 1: BYOD Security Challenges
(Source: Created by Author)
Policy and Regulation Challenges
Government Regulation: There are some local government laws and regulation which
can incorporate into the organization. There is some level of control within the organization that
enforce the devices owned by employees (Lee Jr et al. 2017). Various organization around the
globe require to adjust with BYOD policies of each of the country. It can align with the local
laws which can make the streamline of employee contract along with monitoring of laws.
Ethical and Privacy Issues: There are some ethical and privacy issues which can
coincide with the legal implication. Employees can provide various kind devices which can be
used for work (Dawson 2016). Organization around the globe can consider various areas of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4BRING YOUR OWN DEVICE
security measures and how they can comply with privacy rights. There is some sensitive kind of
data which needs to have tight surveillance so that it can avoid any kind of data leaks (Agudelo
et al. 2016). Data privacy laws around the globe focus on the fact that employees need to be
consent before employees install security measures for accessing data. Organization needs to
provide adequate information about the protection of data (Cheng, Guan & Chau 2016). The
security concern needs to be always active and it can give restriction on how the employees can
interact with the devices which are outside the work.
Conclusion
From the above pages, the fact can be concluded that this essay is all about two
challenges for BYOD in IT network. From above discussion, it can be concluded that BYOD
security requires research and development. The provided framework discussed is considered to
be effective but there can be some further improvement in it. The main focus is all about
reducing limitation and closing any kind of loopholes.
security measures and how they can comply with privacy rights. There is some sensitive kind of
data which needs to have tight surveillance so that it can avoid any kind of data leaks (Agudelo
et al. 2016). Data privacy laws around the globe focus on the fact that employees need to be
consent before employees install security measures for accessing data. Organization needs to
provide adequate information about the protection of data (Cheng, Guan & Chau 2016). The
security concern needs to be always active and it can give restriction on how the employees can
interact with the devices which are outside the work.
Conclusion
From the above pages, the fact can be concluded that this essay is all about two
challenges for BYOD in IT network. From above discussion, it can be concluded that BYOD
security requires research and development. The provided framework discussed is considered to
be effective but there can be some further improvement in it. The main focus is all about
reducing limitation and closing any kind of loopholes.

5BRING YOUR OWN DEVICE
References
Agudelo, C.A., Bosua, R., Ahmad, A. and Maynard, S.B., (2016). Understanding knowledge
leakage & BYOD (Bring Your Own Device): A mobile worker perspective. arXiv preprint
arXiv:1606.01450.
Cheng, G., Guan, Y. and Chau, J., (2016). An empirical study towards understanding user
acceptance of bring your own device (BYOD) in higher education. Australasian journal of
educational technology, 32(4).
Dawson, P., (2016). Five ways to hack and cheat with bring‐your‐own‐device electronic
examinations. British Journal of Educational Technology, 47(4), pp.592-600.
Dhingra, M., (2016). Legal issues in secure implementation of bring your own device
(BYOD). Procedia Computer Science, 78, pp.179-184.
Keyes, J., (2016). Bring your own devices (BYOD) survival guide. Auerbach Publications.
Lee Jr, J., Warkentin, M., Crossler, R.E. and Otondo, R.F., (2017). Implications of monitoring
mechanisms on bring your own device adoption. Journal of Computer Information
Systems, 57(4), pp.309-318.
References
Agudelo, C.A., Bosua, R., Ahmad, A. and Maynard, S.B., (2016). Understanding knowledge
leakage & BYOD (Bring Your Own Device): A mobile worker perspective. arXiv preprint
arXiv:1606.01450.
Cheng, G., Guan, Y. and Chau, J., (2016). An empirical study towards understanding user
acceptance of bring your own device (BYOD) in higher education. Australasian journal of
educational technology, 32(4).
Dawson, P., (2016). Five ways to hack and cheat with bring‐your‐own‐device electronic
examinations. British Journal of Educational Technology, 47(4), pp.592-600.
Dhingra, M., (2016). Legal issues in secure implementation of bring your own device
(BYOD). Procedia Computer Science, 78, pp.179-184.
Keyes, J., (2016). Bring your own devices (BYOD) survival guide. Auerbach Publications.
Lee Jr, J., Warkentin, M., Crossler, R.E. and Otondo, R.F., (2017). Implications of monitoring
mechanisms on bring your own device adoption. Journal of Computer Information
Systems, 57(4), pp.309-318.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.