BYOD: The Corporate Dilemma Seeking an Approach Virtuous Insights Consulting Services Aug 2012 Virtuous Insights © Virtuous Insights Consulting.

Slides:



Advertisements
Similar presentations
Project management.
Advertisements

1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
BRING YOUR OWN DEVICE Presenter: Rachelle R. Green Duffy & Sweeney, Ltd.
Security for Mobile Devices
PCS – BYOD Are you ready for devices in your classroom? August 2013.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
BUSINESS PLUG-IN B2 Business Process.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Conducted by Phase II Quantitative Study Sept, 2001.
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
Basic guidelines for the creation of a DW Create corporate sponsors and plan thoroughly Determine a scalable architectural framework for the DW Identify.
Introduction to Computer Ethics
1 SOFTWARE PRODUCTION. 2 DEVELOPMENT Product Creation Means: Methods & Heuristics Measure of Success: Quality f(Fitness of Use) MANAGEMENT Efficient &
Why Managers Must Understand IT Managers play a key role –Frame opportunities and threats so others can understand them –Evaluate and prioritize problems.
HUMAN RESOURCE CHALLENGES IN RESEARCH MANAGEMENT WITHIN THE CONTEXT OF RESOURCE LIMITED SETTINGS By Mrs Margaret Mayiga and Catherine Tugaineyo Association.
D ELEGATION H UMAN RESOURCE. H UMAN RESOURCE In a business environment, the basic resource of any organization made ​​ up of people and their ability,
Lecture 1.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Chapter 1- Introduction
贾银山 Software Engineering, Chapter 5 Slide 1 Project management.
©Ian Sommerville 2000Software Engineering, 7th edition. Chapter 5 Slide 1 Chapter 5 Project Management Modified by Randy K. Smith.
Chapter 1- Introduction Lecture 1 Ready, fire, aim (the fast approach to software development). Ready, aim, aim, aim, aim... (the slow approach to software.
Project management DeSiaMore 1.
MobeSys Technologies MobeSys – helping you overcome mobile technology challenges.
1 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Management Information Systems
Principles of Information Systems Eighth Edition
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
1 Chapter 5 Project management. 2 Project management : Is Organizing, planning and scheduling software projects.
Engineering, 7th edition. Chapter 5 Slide 1 Project management.
Economic security of enterprise.. By economic security of the enterprise (ESE) we mean the state of protection of it’s vital interests from internal and.
Introduction to Accounting Topic 1 10/26/2015Topic 1: Introduction to accounting.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 5 Slide 1 Project management.
COOP Seminar – Fall 2008 Slide 1 HOUSTON COMMUNITY COLLEGE SYSTEM SAIGONTECH SAIGON INSTITUTE OF TECHNOLOGY Software Project Management.
Chapter 3 Project Management Chapter 3 Project Management Organising, planning and scheduling software projects.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
1 Project management. 2 Topics covered Management activities Project planning Project scheduling Risk management.
Basics of testing mobile apps
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 5 Slide 1 Project management.
Project management 1/30/2016ICS 413 – Software Engineering1.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Internet of Things Business Case Template. Powered by InfoTech, provided by Atlantic BT Summarize the business case for analyzing the Internet of Things.
Principles of Information Systems Eighth Edition Chapter 1 An Introduction to Information Systems.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Project management (2) By: Zhou Chunlin School of Tourism, Conference and Exhibitions Henan University of Economics and Law.
Principles of Information Systems Eighth Edition Chapter 1 An Introduction to Information Systems.
Internet of Things, Are You Ready?. Contents ●Introduction ●IoT Examples? ●IoT Benefits ○For Industries ○The Internet of Things In Organizations ○The.
Workshifting Transform your business – empower your people.
New System Proposal Automatic truck to inventory database (Hardware & Software)
CompSci 280 S Introduction to Software Development
Information Technology Acceptable Use An Overview
Building evaluation in the Department of Immigration and Citizenship
INTRODUCTION The economies of ALL developed nations are dependent on software. More and more systems are software controlled Software engineering is concerned.
Data and database administration
Emerging Trends in Information Technology
Initiating systems development
Video Conferencing
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Unified Communications and Collaboration Market to grow at 9% CAGR from.
Chapter 29 Emerging Technologies and the Generation of Knowledge
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Port Salerno Elementary School BYOD
Introduction to BYOD EIT, Author Gay Robertson, 2017.
Smart Learning concepts to enhance SMART Universities in Africa
Best Mobile App Development Practices by AppSquadz Technologies.
Agenda The current Windows XP and Windows XP Desktop situation
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

BYOD: The Corporate Dilemma Seeking an Approach Virtuous Insights Consulting Services Aug 2012 Virtuous Insights © Virtuous Insights Consulting

Contents 2 1. Introduction 2.Framework 3.Understanding – Employee Adoption, Complexities & Concerns 4.Assessing – Cost and Utility 5.Accepting the Adversities 6.Advocacy through Policy 7.Future Evolution 8.Conclusion Virtuous Insights © Virtuous Insights Consulting

Introduction 3 Television Video recorder Personal computer Mobile Phones Laptops Smart Phones Tablets Overlap in devices as a result of convergence Evolution of technology has enabled convergence of media and platform devices, which has diluted the distinction between personal and professional tools /devices. Proliferation of such tools or devices has caught corporate world on crosshairs as employees have started using their multi-tasking devices for business use which has developed into a trend described in corporate jargon as Bring Your Own Device (BYOD). How should organizations approach this trend of BYOD? Virtuous Insights © Virtuous Insights Consulting

Understanding - Employee Adoption, Complexities and Concerns 4 Develop an understanding on employees adoption of new technologies and devices Employee Adoption Are employees really interested in bringing their own devices? The nature and purpose of such devices in day to day work is needed to be understood by company. Company needs to understand whether the adoption is role specific or is it widespread, is there any pattern in employee adoption of personal devices for business use? Numerous and varied devices are going to bring complexities in workspace and business execution Complexities Company will have to be very mindful of understanding the hardware capabilities of such devices in managing corporate data and information. Variance in the software platform of such devices and the complexities it will bring in sharing information and execution of work. Company will have to understand how and whether it would be able to manage software and hardware complexities on its own and efficiently. BYOD will throw open concerns relating to privacy, confidentiality, business continuity and economy of such move Concerns Company would have to understand the concerns relating to loss or theft of confidential information stored on such devices. Company will also have to address the concern relating to privacy of employees as such devices will have abundance of personal information. Concern also stems from the performance and breakdown of such devices which may have impact on business continuity. Company will also have to address the economic concerns which will arise with increased expenditure related to use of data, also identification of such expenses as personal or corporate. Virtuous Insights © Virtuous Insights Consulting

Assessing - Cost and Utility 5 Assess It is absolutely essential for the company to assess the UTILITY of personal devices in efficiency, productivity, infrastructure creation and as a non monetary benefit tool for employees. Assessing the COST is paramount for company to determine the possibilities for engagement and encouragement. Company would have to assess how much personal devices help employees in several situations to act efficiently, thereby increasing the productivity for the company. As large corporations have global business set ups, employees may be required to work in different time zones; personal devices may become crucial in efficient functioning under such situation. Allowing employees to work from home in certain situations with their personal devices, will help company in citing it as benefit to employees; and assess such benefit in terms of retaining employees and benefit for the company. Securing corporate data and information is of utmost importance and BYOD may lead to additional cost of securing corporate data in future. Company may incur expenditure to make internal sites compatible to mobile devices and assess if it will be required to invest in any apps for such devices. They will have to invest in technology solutions to ensure compatibility among various kinds of devices. Company will have to assess if it would be required to invest in training its technology support resources or recruit additional resources. Asses If company will have to share operational and maintenance costs of such devices. © Virtuous Insights Consulting Virtuous Insights

Accepting the Adversities 6 Major Adversities Company, be a large corporate or a small entity, will always remain laggard in adopting new technology and devices as technology and product innovation gestation period will continue to shrink thereby bringing more and more advanced devices in hands of consumers more frequently than ever. Companies will have to understand the fact whether it formally allows bringing personal devices or not, adversities will remain for the organization as employee might be using such devices informally. Companies may face the issue of data security breach if employee transfers such information on personal devices. Despite the fact that companies always limit the access to confidential information, some amount of corporate information is always lost, use of personal mobile devices may not always prove to be the reason for such loss of data. Company will have to accept that adversities will exist irrespective of whether it goes ahead with use of personal devices or completely bans such use. © Virtuous Insights Consulting Virtuous Insights

Advocacy through Policy: Decision Parameters and Policy Outcomes 7 Complete Rejection Company may cite its nature of business and confidentiality in managing operations as reason for complete rejection. Complete prohibition. No support policy irrespective of situation. Partial Acceptance Company may partially accept BYOD by deciding the level of its engagement and support to such activity. Support limited to a few devices and their software. Limitations on access to specific enterprise databases and information. Partial sharing of data cost. Complete Acceptance Company may fully accept such move by employees. Fully update its network management capabilities to support such activity. Full support to various software platforms and successive versions. Might tune its enterprise software accordingly. After understanding and assessing BYOD trend, company can frame a policy determined by a few parameters critical for companys business. © Virtuous Insights Consulting Virtuous Insights

Conclusion 8 It would be most appropriate for the company to make a decision on BYOD after carefully examining its merits and demerits. However, a functional existence of BYOD on a limited scale is not likely to pose a larger threat to the company as a significant proportion of employees would unlikely to investing in mobile devices keeping in mind their corporate application over a period of time. Such a move will give company time to understand, experiment and examine the efficacy and impact of BYOD on workforce and its productivity. Company will also come know any significant impact on work culture. It is improbable to believe that any concept with certain application will only have benefits attached to it, and hence it would be harsh to judge BYOD trend with one aspect in mind. BYOD concept in the present scenario exists as a trend, business and technology ecosystems are very mature in a liberal world and any such concept can well be tested. It the concept and its application has distinguished strength and merit then it will survive in the business and technology ecosystem. If BYOD trend survives this phase then it is most likely to evolve in future. © Virtuous Insights Consulting Virtuous Insights

For More… 9 If you have any query related to BYOD and how it is impacting your organization ; Or if you would like to know what approach your company should undertake and what would be the future evolution of BYOD and its impact on business performance and culture, Kindly get in touch with us at Or Call Nishant Srivastava : © Virtuous Insights Consulting Virtuous Insights