We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAxel Fane
Modified over 2 years ago
BYOD: The Corporate Dilemma Seeking an Approach Virtuous Insights Consulting Services Aug 2012 Virtuous Insights © Virtuous Insights Consulting
Contents 2 1. Introduction 2.Framework 3.Understanding – Employee Adoption, Complexities & Concerns 4.Assessing – Cost and Utility 5.Accepting the Adversities 6.Advocacy through Policy 7.Future Evolution 8.Conclusion Virtuous Insights © Virtuous Insights Consulting
Introduction 3 Television Video recorder Personal computer Mobile Phones Laptops Smart Phones Tablets Overlap in devices as a result of convergence Evolution of technology has enabled convergence of media and platform devices, which has diluted the distinction between personal and professional tools /devices. Proliferation of such tools or devices has caught corporate world on crosshairs as employees have started using their multi-tasking devices for business use which has developed into a trend described in corporate jargon as Bring Your Own Device (BYOD). How should organizations approach this trend of BYOD? Virtuous Insights © Virtuous Insights Consulting
Understanding - Employee Adoption, Complexities and Concerns 4 Develop an understanding on employees adoption of new technologies and devices Employee Adoption Are employees really interested in bringing their own devices? The nature and purpose of such devices in day to day work is needed to be understood by company. Company needs to understand whether the adoption is role specific or is it widespread, is there any pattern in employee adoption of personal devices for business use? Numerous and varied devices are going to bring complexities in workspace and business execution Complexities Company will have to be very mindful of understanding the hardware capabilities of such devices in managing corporate data and information. Variance in the software platform of such devices and the complexities it will bring in sharing information and execution of work. Company will have to understand how and whether it would be able to manage software and hardware complexities on its own and efficiently. BYOD will throw open concerns relating to privacy, confidentiality, business continuity and economy of such move Concerns Company would have to understand the concerns relating to loss or theft of confidential information stored on such devices. Company will also have to address the concern relating to privacy of employees as such devices will have abundance of personal information. Concern also stems from the performance and breakdown of such devices which may have impact on business continuity. Company will also have to address the economic concerns which will arise with increased expenditure related to use of data, also identification of such expenses as personal or corporate. Virtuous Insights © Virtuous Insights Consulting
Assessing - Cost and Utility 5 Assess It is absolutely essential for the company to assess the UTILITY of personal devices in efficiency, productivity, infrastructure creation and as a non monetary benefit tool for employees. Assessing the COST is paramount for company to determine the possibilities for engagement and encouragement. Company would have to assess how much personal devices help employees in several situations to act efficiently, thereby increasing the productivity for the company. As large corporations have global business set ups, employees may be required to work in different time zones; personal devices may become crucial in efficient functioning under such situation. Allowing employees to work from home in certain situations with their personal devices, will help company in citing it as benefit to employees; and assess such benefit in terms of retaining employees and benefit for the company. Securing corporate data and information is of utmost importance and BYOD may lead to additional cost of securing corporate data in future. Company may incur expenditure to make internal sites compatible to mobile devices and assess if it will be required to invest in any apps for such devices. They will have to invest in technology solutions to ensure compatibility among various kinds of devices. Company will have to assess if it would be required to invest in training its technology support resources or recruit additional resources. Asses If company will have to share operational and maintenance costs of such devices. © Virtuous Insights Consulting Virtuous Insights
Accepting the Adversities 6 Major Adversities Company, be a large corporate or a small entity, will always remain laggard in adopting new technology and devices as technology and product innovation gestation period will continue to shrink thereby bringing more and more advanced devices in hands of consumers more frequently than ever. Companies will have to understand the fact whether it formally allows bringing personal devices or not, adversities will remain for the organization as employee might be using such devices informally. Companies may face the issue of data security breach if employee transfers such information on personal devices. Despite the fact that companies always limit the access to confidential information, some amount of corporate information is always lost, use of personal mobile devices may not always prove to be the reason for such loss of data. Company will have to accept that adversities will exist irrespective of whether it goes ahead with use of personal devices or completely bans such use. © Virtuous Insights Consulting Virtuous Insights
Advocacy through Policy: Decision Parameters and Policy Outcomes 7 Complete Rejection Company may cite its nature of business and confidentiality in managing operations as reason for complete rejection. Complete prohibition. No support policy irrespective of situation. Partial Acceptance Company may partially accept BYOD by deciding the level of its engagement and support to such activity. Support limited to a few devices and their software. Limitations on access to specific enterprise databases and information. Partial sharing of data cost. Complete Acceptance Company may fully accept such move by employees. Fully update its network management capabilities to support such activity. Full support to various software platforms and successive versions. Might tune its enterprise software accordingly. After understanding and assessing BYOD trend, company can frame a policy determined by a few parameters critical for companys business. © Virtuous Insights Consulting Virtuous Insights
Conclusion 8 It would be most appropriate for the company to make a decision on BYOD after carefully examining its merits and demerits. However, a functional existence of BYOD on a limited scale is not likely to pose a larger threat to the company as a significant proportion of employees would unlikely to investing in mobile devices keeping in mind their corporate application over a period of time. Such a move will give company time to understand, experiment and examine the efficacy and impact of BYOD on workforce and its productivity. Company will also come know any significant impact on work culture. It is improbable to believe that any concept with certain application will only have benefits attached to it, and hence it would be harsh to judge BYOD trend with one aspect in mind. BYOD concept in the present scenario exists as a trend, business and technology ecosystems are very mature in a liberal world and any such concept can well be tested. It the concept and its application has distinguished strength and merit then it will survive in the business and technology ecosystem. If BYOD trend survives this phase then it is most likely to evolve in future. © Virtuous Insights Consulting Virtuous Insights
For More… 9 If you have any query related to BYOD and how it is impacting your organization ; Or if you would like to know what approach your company should undertake and what would be the future evolution of BYOD and its impact on business performance and culture, Kindly get in touch with us at firstname.lastname@example.org@virtuousinsights.com Or Call Nishant Srivastava : 91-9902070070 © Virtuous Insights Consulting Virtuous Insights
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
1 SOFTWARE PRODUCTION. 2 DEVELOPMENT Product Creation Means: Methods & Heuristics Measure of Success: Quality f(Fitness of Use) MANAGEMENT Efficient &
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Management Information Systems
Internet of Things Business Case Template. Powered by InfoTech, provided by Atlantic BT Summarize the business case for analyzing the Internet of Things.
Internet of Things, Are You Ready?. Contents ●Introduction ●IoT Examples? ●IoT Benefits ○For Industries ○The Internet of Things In Organizations ○The.
BRING YOUR OWN DEVICE Presenter: Rachelle R. Green Duffy & Sweeney, Ltd.
Workshifting Transform your business – empower your people.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Principles of Information Systems Eighth Edition Chapter 1 An Introduction to Information Systems.
BUSINESS PLUG-IN B2 Business Process.
Why Managers Must Understand IT Managers play a key role –Frame opportunities and threats so others can understand them –Evaluate and prioritize problems.
Principles of Information Systems Eighth Edition
©Ian Sommerville 2000Software Engineering, 7th edition. Chapter 5 Slide 1 Chapter 5 Project Management Modified by Randy K. Smith.
HUMAN RESOURCE CHALLENGES IN RESEARCH MANAGEMENT WITHIN THE CONTEXT OF RESOURCE LIMITED SETTINGS By Mrs Margaret Mayiga and Catherine Tugaineyo Association.
1 Project management. 2 Topics covered Management activities Project planning Project scheduling Risk management.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 5 Slide 1 Project management.
Economic security of enterprise.. By economic security of the enterprise (ESE) we mean the state of protection of it’s vital interests from internal and.
Chapter 1- Introduction Lecture 1 Ready, fire, aim (the fast approach to software development). Ready, aim, aim, aim, aim... (the slow approach to software.
Project management 1/30/2016ICS 413 – Software Engineering1.
Project management DeSiaMore 1.
Engineering, 7th edition. Chapter 5 Slide 1 Project management.
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
Security for Mobile Devices
New System Proposal Automatic truck to inventory database (Hardware & Software)
PCS – BYOD Are you ready for devices in your classroom? August 2013.
Mobile Application Architectures
Comparing Political Systems
Conducted by Phase II Quantitative Study Sept, 2001.
Chapter 1- Introduction
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
1 Chapter 5 Project management. 2 Project management : Is Organizing, planning and scheduling software projects.
Customer Success Stories. How BlackBerry ® Enterprise Service 10 and BlackBerry ® 10 are helping to solve mobility challenges for leading enterprises.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
MBA (Finance specialisation) & MBA – Banking and Finance (Trimester)
HP Network and Service Provider Business Unit Sebastiano Tevarotto February 2003.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Introduction to Computer Ethics
Manajemen Basis Data Pertemuan 8 Matakuliah: M0264/Manajemen Basis Data Tahun: 2008.
Chapter 4 Creativity and the Business Idea McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 3 Project Management Chapter 3 Project Management Organising, planning and scheduling software projects.
COOP Seminar – Fall 2008 Slide 1 HOUSTON COMMUNITY COLLEGE SYSTEM SAIGONTECH SAIGON INSTITUTE OF TECHNOLOGY Software Project Management.
© 2017 SlidePlayer.com Inc. All rights reserved.