Charles Sturt University ITC595 Research Project Report: BYOD Analysis

Verified

Added on  2022/11/14

|4
|1699
|379
Report
AI Summary
This report provides a comprehensive analysis of the Bring Your Own Device (BYOD) concept, examining its impact on modern organizations. It begins with an overview of BYOD, highlighting its benefits such as increased employee flexibility and efficiency, and its applications across various business functions. The report delves into the challenges associated with BYOD, including data security risks, the complexities of device support, and compliance requirements. It identifies gaps in the existing literature, particularly the lack of comprehensive solutions to the challenges and the evolving security threats posed by mobile devices. The report concludes by suggesting future research directions, such as the implementation of advanced security measures, the adoption of VPNs, and the necessity for centralized device management to mitigate risks and improve the overall effectiveness of BYOD implementation. The report is based on academic research articles and follows the APA referencing style.
Document Page
Running head: BYOD
Bring Your Own Device (BYOD)
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
BYOD
Abstract: The use of personal smart devices have
been useful for employees in an organization. This
customer led movement has been transforming
organizational workplace by extending the notion in
21st century that employees can work from
anywhere and at any time on their devices.
Keywords: BYOD
I. INTRODUCTION
Modern technologies have been reshaping business
industry in the market. Utilization of modern devices
including smartphones and tablets have been offering
several benefits for consumers in the daily life. These
devices are easy to lift and carry. Therefore, it
becomes easy to lift and carry them to organizations.
This is the concept of Bring Your Own Device
(BYOD). The use of personal smart devices have
been useful for employees in an organization. This
customer led movement has been transforming
organizational workplace by extending the notion in
21st century that employees can work from anywhere
and at any time on their devices. This report has
focused on the concept of BYOD. Various benefits
and issues of the technology have been discussed in
the report. The future research recommendations
have been provided in the report.
II. OVERVIEW OF BYOD
Modernization of technologies have been increasing
efficiencies of work at workplace. Mobile
applications and affordability of smart devices have
been incorporating into the IT infrastructure
(Bratthall, Tideman & Lindström 2018). BYOD
helps in enabling companies for becoming more agile
and customer centered. It also helps increasing the
ace of work of employees for enhancing competitive
advantage. Consumerization of IT has been
transforming traditional IT landscape of
organizations (Song & Kong 2017).
III. APPLICATION OF BYOD
There have been various application of BYOD. Some
of the applications are mentioned below:
ï‚· Any BYOD policy used to get input from
across business that include developers and
software architects, users, business decision
makers and HR legal departments (Hong et
al. 2016).
ï‚· It helps in making policy guidelines with
clear and compliance. This policy need to be
legal and clear to all employees during
entering and leaving the BYOD program
(Dang-Pham & Pittayachawan, 2015).
ï‚· Policies regarding utilize of insecure Wi-Fi
networks have been making provision for
limitations of their security measure. Some
networks have been facing limitations of
their security measures (Carey et al., 2015).
Some of the networks have been have been
labeled off-limits based on security alerts.
IV. CHALLENGES OF BYOD
There have been various changes in the BYOD
technology. Some of the challenges have been
discussed below:
Protecting data: Employees have been bringing their
own personal devices to the office. His create risks of
losing their person la data over the organizational
network. In case of organizations, it became
challenging to track those lost personal data over the
huge database of the organization (Zahadat et al.,
2015).
Security: The security of data and information stored
in the own deices might be in risk due to several
cyber-attacks. The possibility of employees in
exposing their devices for malicious attacks during
using them for outside work (Dhingra, 2016).
Support: supporting various devices together in the
workplace for reducing overall support cost have
been a problem for the organization. IT department
have been overwhelming with the pressure crated by
the BYOD in the operations (Cheng, Guan & Chau,
2016).
BYOD Costs: The potential of saving money has
been depending in organizations manages required
expenditure. Companies have been running at risk of
unnecessary BYOD outlays including mobile
expenses, processing related expense reports and
investing in solutions for supporting heterogeneous
devices (Keyes 2016).
Compliance requirements: Compliance mandates
including HIPAA, PCI DSS and GLBA have been
particular safeguarding data and regardless of device
for data storage (Chou et al., 2017).
V. GAP IN THE LITERATURE
The above literature has described about concept of
BYOD and several challenges of BYOD in
organization including protecting data, security,
support, BYOD costs and compliance requirements.
The gap is that there is no information provided about
solution to these challenges in the BYOD. However
there are more issues and risks included in the
BYOD. Mobile devices have been facing most of the
Document Page
3
BYOD
security risks in BYOD. Cell phones right now are
clear pioneers in the rundown of the most critical
security dangers, as illustrated by an examination
including security specialists from organizations from
different parts (Hong et al., 2016). Scholastic writing
on BYOD surrenders the most consideration
regarding security. The essential estimations of
classification, uprightness, and realness of
organization information are especially undermined.
Privacy is undermined when unapproved parties get
access to touchy private data or classified
organization data by controlling gadgets or blocking
information transmissions (Carey, 2015). Control
performed utilizing inadequately verified gadgets
undermines the honesty of organization information.
Credibility is compromised when gadgets are utilized
to trigger business exchanges that can't be followed
clear without uncertainty. Cell phones that are
inadequately tied down lead to unapproved use and
adjustment of information due to conscious or
careless activities. At the point when individual
gadgets are being utilized, it must be accepted that
the careless or rash conduct of clients amid private
use will be exchanged to business use. Moreover,
there are legitimate stipulations and consistence
controls on organization use which must be met, for
example, necessities to record, file, and back-up. As
needs be, when cell phones are assigned for BYOD
access for both private and business purposes
("double use"), the end client's private information
(contacts, addresses, photographs, records) must be
secured against an organization's entrance while the
organization access to organization information is at
the same time ensured. An absence of division among
private and business circles yields huge dangers for
organizations (Dang-Pham & Pittayachawan, 2015).
Also, the dimension of multifaceted nature of the data
innovation to be aced increments when a
qualification must be made among private and
business use on countless channels. This yields extra
security dangers, in some cases figured to the point as
"Unpredictability is the adversary of security". Client
support for BYOD might be intricate and costly
because of the bigger degree and expanded
dimension of multifaceted nature (Chou et al., 2017).
VI. FUTURE WORK
For all methodologies, it must be guaranteed that the
working framework on the gadgets being utilized isn't
undermined by malware. When utilizing individual
gadgets, this can't be underestimated. Or maybe,
directed observing is required for this issue.
Furthermore, it is prescribed to actualize VPN or
another kind of encoded correspondence with limited
access to the organization arrange for the
correspondence between gadgets and servers. Every
one of the gadgets with access to organization
systems and applications ought to be enrolled what's
more, directed halfway by the organization.
Organizations ought to have the capacity, particularly
when information is put away locally, to eradicate all
organization information from a gadget (remote
crash) when access to information should never again
be allowed.
VII. REFERENCES
Bratthall Tideman, J., & Lindström, J. (2018). Key
components when utilising BYOD within
organisations-A framework for developing the
BYOD policy.
Carey, D. M. (2015). Bring Your Own Device: A
Case Study of a 10th Grade BYOD Program in a
Rural Pennsylvania School District.
Cheng, G., Guan, Y., & Chau, J. (2016). An
empirical study towards understanding user
acceptance of bring your own device (BYOD) in
higher education. Australasian Journal of
Educational Technology, 32(4).
Chou, P. N., Chang, C. C., & Lin, C. H. (2017).
BYOD or not: A comparison of two assessment
strategies for student learning. Computers in Human
Behavior, 74, 63-71.
Dang-Pham, D., & Pittayachawan, S. (2015).
Comparing intention to avoid malware across
contexts in a BYOD-enabled Australian university: A
Protection Motivation Theory approach. Computers
& Security, 48, 281-297.
Dhingra, M. (2016). Legal issues in secure
implementation of bring your own device
(BYOD). Procedia Computer Science, 78, 179-184.
Herrera, A. V., Ron, M., & Rabadão, C. (2017, June).
National cyber-security policies oriented to BYOD
(bring your own device): Systematic review. In 2017
12th Iberian Conference on Information Systems and
Technologies (CISTI) (pp. 1-4). IEEE.
Hong, S., Baykov, R., Xu, L., Nadimpalli, S., & Gu,
G. (2016, February). Towards SDN-Defined
Programmable BYOD (Bring Your Own Device)
Security. In NDSS.
Keyes, J. (2016). Bring your own devices (BYOD)
survival guide. Auerbach Publications.
Song, Y., & Kong, S. C. (2017). RETRACTED:
Affordances and constraints of BYOD (Bring Your
Own Device) for learning and teaching in higher
education: Teachers' perspectives.
Document Page
4
BYOD
Zahadat, N., Blessner, P., Blackburn, T., & Olson, B.
A. (2015). BYOD security engineering: A framework
and its analysis. Computers & Security, 55, 81-99.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]