INFO5306 - USYD Healthcare: Bring Your Own Device (BYOD) Strategy

Verified

Added on  2022/10/10

|1
|811
|1
Presentation
AI Summary
This presentation provides an overview of the Bring Your Own Device (BYOD) strategy within USYD healthcare. It begins by introducing the concept and its advantages, followed by an examination of current technologies used, including data security measures and potential vulnerabilities such as malware attacks, misuse of the facility network, and legislative consequences due to data breaches. The presentation identifies key issues like device fragmentation and the need for a familiar system for medical staff. It proposes solutions such as enforcing organizational policies, implementing specific applications, containerizing personal and professional information, controlling device usage, and ensuring uninterrupted communication channels. The presentation also outlines the benefits of BYOD, including quicker task completion, staff familiarity, and improved performance through access to cutting-edge tools. It details the resources required for successful implementation, such as BYOD FAQs, policies, and web-based resources. Finally, it concludes that BYOD can be effectively implemented in USYD healthcare, offering benefits like better processes, improved healthcare services, and reduced decision-making turnaround times.
Document Page
Bring Your Own Devices (BYOD) Strategy
USYD healthcare
Introduction:
The “Bring Your Own device” is
a leading practice and policy
at current workplaces. It
provides the advantages of
accessibility for technology
users and employers. However
there are few unique
challenges with this
innovation. In this is
presentation to understand
the technology the case of
USYD healthcare is chosen.
Furthermore, the current
technologies and the
challenges faced are
illustrated.
Current technologies:
Security:
It can consist of data about the
medical history of patent, medications,
treatments, current condition, lab test
data and radiology images. This
information gets susceptible to various
malware attacks with the scams of
phishing.
Misuse of facility network:
The network is vulnerable to attacks
coming from applications of third-party
that is downloaded to the staff’s
device (Leclercq-Vandelannoitte 2015).
Legislative consequences:
Every sensitive data of the patient is
susceptible to the misuse as the
device is lost or stolen.
Device fragmentation:
Implementing application on various
distinct systems can be brought to
Necessities to address the issues:
Alleviating the dependability of the devices owned by USYD
healthcare.
Using the system that USYD healthcare’s medical staff is been
familiar with
Deploy the 24-hour connections
Considering better and quicker actions and decisions
Develop the service quality (Brodin, Rose and Åhlfeldt 2015)
Proposed solution fulfilling every
requirement:
Enforcing organizational policies for USYD
healthcare such as data wipe, passcodes and
encryptions as the system is stolen and lost.
Mitigating IT efforts through implementing
particular applications to every device.
Containerizing professional and personal
information for maintaining the privacy of
employees.
Controlling devices for complying with various
policies of legislation.
Managing usages of the third-party applications
on the network and facility.
Delivering uninterrupted channel of
communication between the employees.
Results and benefits as the solution get
implemented:
Having BYOD, the employees of USYD
healthcare never have to utilize backdated
systems prone to prolonged time of start-up
and malfunctions.
Staffs familiar with BYOD tend to quick access
accomplishing tasks in a short time.
Staffs are careful and prompter to update and
maintain the individual systems for efficiency.
Tech-savvy staffs of USYD healthcare tend to
update the latest system, fast devices through
cutting edge tools. This improves the entire
performance (Song and Kong 2017).
Development of staff’s onboarding time
Improvement of employee satisfaction
Increasing autonomy and flexibility
Resources required to gain the ultimate results:
At first, USYD healthcare is able to use the
BYOD FAQ for the staffs. Apart from this, there
can be BYOD policies and rules, Wiki, BYOD
network. As far as the web based resources are
concerned, downloadable mobile systems can
deliver the overview of the BYOD for the
employees. Apart from this, Pinterest is a smart
resource here. It involves the wide collection of
links regarding a particular issue (Fani, von
Conclusion:
BYOD in Healthcare is able to make inroads into
USYD healthcare. This has proved to be effective
and effectual for driving a better level of
processes. Using BYOD at USYD healthcare has
its individual set of issues nullified effective
through implementing powerful solutions.
Deploying strong policies of BYOD can lead to
effective healthcare services, connectives round-
the-clock taking place between the patients and
medical employees and lesser turn-around time
for making decision.
References:
Brodin, M., Rose, J. and Åhlfeldt, R.M., 2015.
Management issues for bring your own device. In
European, Mediterranean & Middle Eastern Conferenc
on Information Systems 2015 (EMCIS2015), 1-2 June,
Athens, Greece. European, Mediterranean & Middle
Eastern Conference on Information Systems (EMCIS).
Fani, N., von Solms, R. and Gerber, M., 2016, August. A
framework towards governing “Bring Your Own Device
in SMMEs”. In 2016 Information Security for South
Africa (ISSA) (pp. 1-8). IEEE.
Leclercq-Vandelannoitte, A., 2015. Leaving employees
to their own devices: new practices in the workplace.
Journal of Business Strategy, 36(5), pp.18-24.
Song, Y. and Kong, S.C., 2017. RETRACTED CHAPTER:
Affordances and Constraints of BYOD (Bring Your Own
Device) for Learning in Higher Education: Teachers’
Perspectives. In Emerging practices in scholarship of
learning and teaching in a digital era (pp. 105-122).
Springer, Singapore.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
[object Object]