Introduction
According to Davis (2012), “Nine out of 10 technology pros think smartphones and tablets will become more important to business productivity in the next couple of years. Seventy-two percent expect to offer more bring-your-own-device options so that employees can access company data with their personal gadgets.” The use of personal electronic device usage is on the rise in the corporate workplace. Although there are opportunities associated with this; there are also risks involved. Companies and government IT divisions need to evaluate these risks, and put specific mitigation plans in place to establish policies to assure that business information is secure.
This paper will walk through the difference between Company Issued Devices and Bring Your Own devices (BYOD) in the workplace, the top identified risks that companies need to be aware of and what should be a part of the companies mitigation plan before allowing employees to bring their own devices to work and use it to access the companies information.
Difference between Company Issued Devices and Personal Devices
Company issued devices
Bring Your Own Device also known for short BYOD, is a new corporate that allows employees to use their own devices to do their work.
I am totally fine with using company devices separate from my own personal device. They have so much restriction on their devices, and they would just have the same restrictions on my personal device. For example on my business laptop, they have removed the wireless network card, microphone, and webcam and restricted me from accessing specific websites or downloading software. I can see it being convenient to use a personal device for work, but you would get frustrated during your personal time at ho...
... middle of paper ...
...ld.com/article/246760/pros_and_cons_of_byod_bring_your_own_device_.html
Davis, M. A. (2012). BYOD. InformationWeek, (1352), 21-25. Retrieved from http://search.proquest.com.library.capella.edu/docview/1237629501?accountid=27965
Hassell, J. (2012, May 17). 7 Tips for Establishing a Successful BYOD Policy. CIO. Retrieved March 25, 2014, from http://www.cio.com/article/706560/7_Tips_for_Establishing_a_Successful_BYOD_Policy
Smith, K. J. and Forman, S. (2014), Bring Your Own Device—Challenges and Solutions for the Mobile Workplace. Empl. Rel. Today, 40: 67–73. doi: 10.1002/ert.21436
Raza, S., & Perlin, M. (2012, August 8). 10 Fascinating Insights From the Experts on BYOD. IT Operations Analytics Configuration Management and Change Management Software. Retrieved March 16, 2014, from http://www.evolven.com/blog/10-fascinating-insights-from-the-experts-on-byod.html
Having a daily routine is a great way to keep track of obligations and engagements, but so is a cell phone. You can add events to your calendar, send alerts to yourself, take notes, and have the world at your fingertips. These days’ electronics serve
As technology improves, businesses expand and recruitment pools decrease, organizations contemplate ways to, not only reduce the overhead costs of doing business but, to attract new talent in a competitive employment marketplace (Darleen, 2012). To do so, many organizations have redefined what it means to ‘go to work’, in terms of not only the act of getting there, but how work is accomplished and where (Lojeski & Yuva, 2008). A study conducted three years ago by the Society For Human Resource Management (SHRM) reported that almost half of the organizations surveyed utilized virtual teams (Minton-Eversole, 2012). Anyone who conducts business using mobile technology devices is considered
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
A Capital One Financial Corporation has established such workplace by providing mobility and flexibility to their employees in business units. They implemented a concept “virtual workplace” which is based on reconfiguring office space and use of up to date mobile technology. It gives employees opportunity to be more productive since they are able to work from any place they would choose. According to the Benefits Survey Report from the Society for Human Resource Management published i...
Cellphones have become an asset in people's everyday lives. Gone are the days when cellphones are depicted as luxurio...
With the increasingly ubiquitous nature of mobile devices and online availability, including smartphones and tablets, there is also an understandable concern about the level of security that is afforded to such devices. This can be considered as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which are being used by diverse organizations as a way of lowering the cost of ownership for such devices while also leveraging the flexibility advantages that their utilization can bring. It is therefore an area of immense interest due to the changing and emerging nature of both the technology itself as well as the security concerns. Due to the sensitive and confidential information that would exist on such devices, it is imperative that security solutions and processes are implemented in order to protect and secure such content from the proliferation of threats and vulnerabilities which can affect mobile devices (Juniper Networks, n.d.). Mobile devices are being exposed to a record number of security threats, with potentially alarming statistics indicating a 400 percent increase in Android malware, for example, while Wi-Fi connections are also being increasingly targeted.
For the most part we have addresses the needs of our sales force on a case by case basis but going forward we really need to ensure we have a defined policy to streamline remote access. To accomplish this there are a few benchmarks we need to achieve. First of all the network has to be reliable or in more technical terms it needs to have high availability. Most importantly we need to make sure that the network is secure as much as it is possible with all the different types of users asking for access. Lastly, we need to address how we handle employees using personal or non-company issued computers and how we ensure that those machines meet of other remote access policies.
Even as I sit here typing this paper, my own shiny, rectangular piece of molded plastic and metal lies inches away from my fingertips, beckoning me to use it. Looking out the window, one of the first sights I see are people walking with one hand up to their ear, evidence this technology is in use. I can count on one hand the number of adults I know who do not own one these mobile devices. People are now able to be virtually accessible almost anywhere at any time.
The world is getting smaller, yet remains full of possibilities due in part to technology. Interestingly, the very first emails could only be sent to someone using two computers, literally side by side. Technology dates back to the first manipulations of materials to assist in human survival. There are many definitions for technology, John D. Carl describes technology stating,” it deals with the creation, use, and application of knowledge and its’ interrelation with life, society, and the environment” (Carl, J.D., 2011, p.301). For the purpose of this paper, any instrument, invention, or method influencing and allowing people to control or adapt to their environment, is technology. With the increased availability of technological tools (smart phones, text messaging, image scanning, email, and social media), communication is rapidly changing. Society has moved beyond the Industrial Age and into the Information Age, where the sharing of knowledge and ideas is the new driver of power and world economy. Technology possesses many merits, and as with any tool, it carries drawbacks. Misuse and overuse creates unsavory dependence. This dependence can have adverse affects on people, business, and education. Technology receives vast criticism for reducing face-to-face interactions. Although the information technology of today is widely held as impersonal, it promotes communication; technology reduces costs and leverages productivity by facilitating access to information and knowledge, and augmenting interaction amongst those who utilize technology.
A leading force is today’s technology driven world and that if the latest device is not in your possession then it is in sense a wrong doing. This is not as much of a major concern, the concern is the lack of personal sufficiency when without your device for the smallest amount of time. In the survey...
Since 2008, the smartphone, a device that combines a normal cell phone with a computer, typically offering Internet access, data storage, e-mail capability, etc. all in your hand was deemed as ground-breaking technology and created one of the largest and most competitive markets in terms of technology to date. Their increased popularity continued to grow and today, it is very hard to encounter someone without a smartphone. These devices allow people to disconnect from reality and grant them access to the world as a whole. People use these devices to manage their daily routine, dictating what they should do and when they should do it.
The integration of a variety of information systems into business operations is necessary for growth in the dynamic business environment. These information systems can be minimized and fixed into mobile devices such as smartphones. The use of smartphones can play an important role in supporting business processes and operations, developing strategies for competitive advantage and decision making. These smartphones allow employees to be linked to the office, its data and resources, without being in the office. The use of smartphones for business processes can make the business more efficient and effective. They make it easier for co-workers to communicate among themselves and facilitates better communication between the business and its employees, customers, suppliers and even other businesses, and makes it possible in real-time. For CPS Energy and Lloyd’s Construction, although they were doing well, they realised that they could do much better. They needed to find new ways to further cut costs and maximize profitability. They both decided that the best way to do that was through the introduction of smartphones in their business operation.
But in the use of the term “technology” today, there is far more associated meaning than automobiles or washing machines. It has ushered in an entirely new way of working, and in increasing numbers of organizations, increased options of just where work associated with a particular job will be done. More employees than ever have the option of working at home yet still being employed either full...
This is one reason why cell phones are a significant asset to technology. Furthermore, workplaces are becoming more and more involved with technology. In almost every company, there is an advanced computerized system which makes tasks easier and quicker. Information can be expressed through words, numbers, sounds, and images.
fixture in everyday life then ever before, from housewives planning meals, to checking bank balances and paying bills, to looking up recipes. Children have the ability to do their homework, playing games and chatting to a friend on the internet. Business executives carrying PDA's, [personal digital assistants] with the ability to do their everyday business duties, from anywhere in the world that they may be at any time of the day or night.