Examine a particular problem, issue, or trend that has broad implications to the field of Information Technology particularly in computer networks. Describe the implications of the problem, issue, or trend to the field and to society today; and (a possible effect or result). Explain the importance of this topic to the field (primarily) and to yourself (secondarily).
The strategy indulges permitting the employees and the business partners to bring their personal gadgets in the organization. Tablets, Smart phones and virtual computers are the most common devices used for this purpose (Astani, Ready and Tessema 2013). The strategy was developed to increase the productivity of the organization along with the working efficiency of the employees. The benefits of BYOD had up-hilled the use of this practice. There are many advantages as well as risks associated with BYOD in the organizations.
This assignment deals with the various aspects of BYOD. The gadgets used for the purpose have been described. The advantages and disadvantages of the term have been discussed in the report. For a better understanding of the strategy, the report has been divided into various parts each giving a brief of the term.
Many technical as well as non-technical organizations have implemented the Bring Your Own Device strategy in their firms as there are numerous benefits associated with the term. The major reason which has driven the organizations towards using the strategy is that it eliminates the cost of hardware setup from the organizations (Miller, Voas and Hurlburt 2013). The cost of hardware setup is turned on the employees and the employees have to manage the hardware they would use for the task.
This strategy has been implemented by various firms all around such as many leading technical firms as well as the non-technical firms.
It is not essential that all the employees of the organization have the sane gadget that they use. Different employees use different gadgets for their purpose. If the employees bring their personal gadgets to the organizations, there will be a wide variety of gadgets in the organizations. The strategy has a wide impact on the IT infrastructure of the organization. The network in the organization has to be adaptable to the different gadgets that would be used by the professionals of the organizations. The organization has to implement the concept of Mobile Device Management properly in order to support, control and regulate the devices being used in the organization (Eslahi et al. 2014). The organization must have robust infrastructure for the implementation of the strategy. Wi-Fi is one of the primary means of access to network in today’s era. The organization has to provide an adequate quality of wireless experience in the organization (Astani, Ready and Tessema 2013). This can be implemented through the robust architecture in the firm. The robust architecture enables the organization to handle the humongous density of wireless clients in the organization and easy managing and upgrading the Wi-Fi technology to the latest updates being introduced,.
The IT department of the organization has to support the firm continuously. Possibilities are that the employee must be aware of the functioning of his/her own device but continuous technical support is needed as the employee may not be familiar to the technical problems that may rise in the gadget (Ghosh, Gajar and Rai 2013). The IT team has to be there always so that the technical problems arising in the employee’s gadget can be prevented.
The network of the firm has to be flexible with all the brands. Each mobile or laptop service provider has different way of managing things. The network and the IT team of the organization have to be sufficient enough to handle the load and the problems that may arise with any gadget that the employee uses at the workplace.
Thus, there are several changes that have to be made in the organization for the successful implementation of BYOD.
There are many advantages associated with the use of BYOD in the organizations. They are listed below
The key advantage of the use of this strategy is that the organization can eliminates the cost of hardware setup in the firm. The cost of hardware setup is turned on the employees as they have to manage the hardware they would need for the work. The investment cost of hardware is set up on the employees.
Accessibility to data- the employees has the gadget with oneself for all time and thus they can access the data at anytime they want. The access of data is not restricted to any fixed location for the employees. This helps in increment of level of communication in the organization. This way, the productivity of the organization can rise and the organization can have more number of satisfied clients (French, Guo and Shim 2014). This feature or benefit of BYOD provides empowerment to the employees and help them to give their full to the organization.
Increases the employee satisfaction in the organization- the strategy allows the employee to choose whatever gadget or technology they want to work with or are compatible with. This way the employee can choose the gadgets according to their work need and load. For instance, the sales representative would prefer a use a tablet for recording the notes in the meetings whereas the marketing executives would need a MacBook. This can provide a level of satisfaction to the employees. With the implementation of policies of BYOD, the employees of the organization tend to update their devices to a higher level and there is a personal feeling of ownership linked with the gadget (Miller, Voas and Hurlburt 2013). This factor increases the productivity in the organization as well because the employees have a feeling of responsibility for their jobs.
Increase in productivity of the organization- more and more organization is getting used to the strategy of BYOD now-a-days. The organizations permit the employees to bring their own device to the organization and hence do the work on their own devices. The employees tend to work even after office hours with their personal devices (Lebek, Degirmenci and Breitner 2013). They tend to perform the business related tasks and thus they provide more productivity to the organization. According to various surveys done by the organizations, the employees who are allowed to work with their own devices are more likely to work for longer hours. Thus, the implementation of BYOD helps the organization to increase the level of their productivity.
It attracts the best applicants to the organization- the strategy attracts more suitable applicants to the organization. The strategy can attract the applicants who prefer to work flexibly and independently. The employee who prefers to work on the go gets attracted to the job offered by the organizations.
There are various risks associated with the implementation of BYOD in the organizations which cannot be neglected. The risks associated are listed below
Loss of sensitive and confidential data in the organization- the greatest risk associated with the implementation of BYOD is loss of data (Vignesh and Asha 2015). The data can be stolen through the devices. The convenience and ease of the devices makes them easy to be dropped anywhere by the employees. If any person with ill-intentions gets the device, he/she can steal the data and thus the data can be misused. The data can be leaked while updating the devices as well. The data theft cannot be spotted in earlier times as it takes time to realize the data loss by the firm.
Lack of control over data and devices- the misuse and abuse of IT resources of the company is one of the major risks associated with implementation of BYOD in an organization. The data cannot be totally wiped out if stolen by anyone. It is difficult for the organization to audit and monitor the loss of data through the leak of safety measures.
Increment in vulnerability due to installation of malicious software in the devices- it may be possible that during the updating of the device, several harmful softwares are installed in it and that cause loss of sensitive data of the organization. Those softwares care also capable of destroying the drivers of the device which can lead to the destruction of device and thus destruction of all the data that was present in the device. This can have fatal effects on the organization.
Hence, from the above discussion it can be concluded that the major reason which has driven the organizations towards using the strategy is that it eliminates the cost of hardware setup from the organizations. The cost of hardware setup is turned on the employees and the employees has to manage the hardware they would use for the task. There are various advantages as well as disadvantages of implementing BYOD in the organizations. the greatest risk associated with the implementation of BYOD is loss of data. The data can be stolen through the devices. The convenience and ease of the devices makes them easy to be dropped anywhere by the employees. According to various surveys done by the organizations, the employees who are allowed to work with their own devices are more likely to work for longer hours. Thus, the implementation of BYOD helps the organization to increase the level of their productivity.
Astani, M., Ready, K. and Tessema, M., 2013. BYOD issues and strategies in organizations. Issues in Information Systems, 14(2), pp.195-201.
Miller, K.W., Voas, J. and Hurlburt, G.F., 2013. BYOD: Security and privacy considerations. It Professional, 14(5), pp.53-55.
Eslahi, M., Naseri, M.V., Hashim, H., Tahir, N.M. and Saad, E.H.M., 2014, April. BYOD: Current state and security challenges. In Computer Applications and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on (pp. 189-192). IEEE.
Ghosh, A., Gajar, P.K. and Rai, S., 2013. Bring your own device (BYOD): Security risks and mitigating strategies. Journal of Global Research in Computer Science, 4(4), pp.62-70.
Lebek, B., Degirmenci, K. and Breitner, M.H., 2013. Investigating the influence of security, privacy, and legal concerns on employees' intention to use BYOD mobile devices.
French, A.M., Guo, C. and Shim, J.P., 2014. Current status, issues, and future of bring your own device (BYOD). Communications of the Association for Information Systems, 35(10), pp.191-197.
Vignesh, U. and Asha, S., 2015. Modifying security policies towards BYOD. Procedia Computer Science, 50, pp.511-516.
No matter how close the deadline is, you will find quick solutions for your urgent assignments.
All assessments are written by experts based on research and credible sources. It also quality-approved by editors and proofreaders.
Our team consists of writers and PhD scholars with profound knowledge in their subject of study and deliver A+ quality solution.
We offer academic help services for a wide array of subjects.
We care about our students and guarantee the best price in the market to help them avail top academic services that fit any budget.
You will receive a confirmation email shortly in your subscribe email address.
You have already subscribed our newsletter.