BYOD and the Evolving Workplace

BYOD and the Evolving Workplace

Upasna Goyal, Geeta Sachdeva
Copyright: © 2024 |Pages: 24
DOI: 10.4018/979-8-3693-3124-8.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In the cutting-edge realm of IT, a new sensation takes center stage: the emergence of bring your own device (BYOD), demanding instant attention. This trend encourages employees to harness the potential of their own personal gadgets for tapping into the company's intricate systems and data repositories. BYOD, a subset of ‘IT consumerization', impact from the CEO's strategic position to hourly workers in the corporate hierarchy. In the exploration of BYOD policies, authors are set to uncover the challenges associated with their adoption. Additionally, the evolution of BYOD will be traced, providing statistical insights and examining legal cases that have shaped its trajectory. Along this journey, there will be a delve into the interplay between BYOD and cyberloafing, shedding light on this dynamic within the organizational context. Moreover, an analysis will be conducted on the benefits of implementing a BYOD policy, evaluating whether Indian Inc. companies should embrace this trend. Throughout, consideration is given to key market players, highlighting their pivotal roles.
Chapter Preview
Top

Introduction

The increasing demand for modernized educational and professional experiences, driven by the rapid evolution of technology, has led students and employees alike to seek institutions and workplaces that embrace the effective use of mobile devices. Mobile learning has gained prominence, proving to be a powerful tool for education and professional development, accessible to teachers, students, and employees (Franklin & Peng, 2008; Scott Perkins & George Saltsman, 2010; Thomas A. Peters & Lori Bell, 2013).

Furthermore, the Bring Your Own Device (BYOD) concept has become a universal language in the world of technology, applicable not only to educational institutions but also to modern workplaces. The framework is readily embraced by educators, learners, and professionals recognizing the growing prevalence of personal devices in our interconnected world. It underscores the idea that individuals are most at ease and proficient when using their own familiar devices whether they are in an educational or professional setting. This shift represents a fundamental change in how we approach learning and work in today’s technologically driven environment.

According to “The Global BYOD (Bring Your Own Device) Market Industry Report (2023-2029)”, the increasing phenomenon of BYOD is observed across various global regions. This paradigm entails the allowance for employees to bring forth their mobile implements, encompassing tablets, laptops, and smartphones, within the professional settings and connect them to the company’s systems, rather than using devices provided by the company itself (R.D.S.P Samarathunge et al., 2018). In professional settings, BYOD can occur surreptitiously or be formally integrated into company protocols that all employees are required to follow. When it comes to the market share for BYOD it is also on the riser side, projected to surge from 35.10 billion USD in 2016 to 73.33 billion USD by 2021 (Ali Sharfadeen Al-Azazi et al., 2022).

In 2022, the global BYOD market saw remarkable growth, notably in North America, where it dominated with a commanding 35.2% share. This was largely fueled by the availability of high-speed data services like 4G and 5G. Among the various segments, smartphones emerged as the top revenue contributor, holding a substantial 46.2% share. Looking ahead, laptops are projected to experience the most rapid growth, with an expected Compound Annual Growth Rate (CAGR) of 19% over the forecast period. Within the market segments, IT led the pack in revenue share, accounting for 24% in 2022. Projections indicate that this growth trend will persist, with the global market poised to reach USD 114.09 billion by 2024. Furthermore, a steady CAGR of 15.89% is anticipated, leading to a market value of USD 238.49 billion by 2029 (Bring Your Own Device Market Size & Share Report, 2030).

The covid-19 pandemic has triggered an unprecedented shift, towards remote work, arguably the most remarkable transition of its kind in history. The pandemic has also sparked a substantial shift in employee’s work culture. As a result, a larger portion of businesses embraced the BYOD trend, finding it favorable. This approach is not only cost-effective for IT departments but also enables employees to conduct business on their devices, eliminating the need for commuting to the office. In the realm of reality, entities like Citrix systems, Intel, Apple, Unisys, and even the esteemed White House are actively embarking on the journey of incorporating the BYOD policy into their operations (Eke et al., 2023).

The prevailing viewpoint indicates that BYOD is either on the horizon or already in play across various scenarios. Hence, it’s an inescapable reality that all enterprises will need to lay down the foundations for a BYOD initiative (Bob E. Hayes & Kathleen Kotwica, 2013). However, when considering the complexities of data security, privacy, and robust security measures in line with current norms, it facilitates making appropriate program decisions and successfully implementing a BYOD project.

Key Terms in this Chapter

EDP: EDP (Employer-Provided Device) refers to a technological instrument that is provided by an employer to an employee for use in connection with their employment, such as a computer, smartphone, tablet, or other electronic device.

Malware: Malware constitutes software with malevolent objectives, aiming to inflict harm on computer systems. Occasionally, this malicious software unintentionally opens a gateway due to errors, glitches, or bad code.

Custodians: A person in charge of safeguarding, caring for, or maintaining something in good condition.

Kickback: It is an illegitimate payment made in exchange for special treatment or any other sort of improved service received. Kickbacks are often referred to as a type of bribery. It could be in the form of cash, credit, a gift, or anything of value.

Malicious Intent: It refers to the intention that an individual or entity has to harm people or their reputation or negative consequences to others.

Mobile Devices: It encompasses a wide range of portable electronic gadgets that connect to the internet. These include cell phones, smartphones, laptops, tablets, iPods, iPads, e-readers like Kindle as well as devices like Palms, etc.

Defendant: The defendant designates the individual or entity against whom a legal lawsuit is brought forth.

IT Consumerization: The concept of IT consumerization originated in 2001 from the Leading Edge Forum, gaining traction in 2005 when Gartner stated that the consumerization of IT would have a major impact on the field of technology over the following decade. This phenomenon involves the migration of software and hardware products intended for individual use into the corporate environment, where they are employed for business-related tasks.

Cybersecurity: It refers to the action taken to defend a person, organization, or nation as well as their computer information from online crimes or attacks.

Zero Trust: It is a security framework that mandates that all users, whether inside or outside of an organization’s network, must be authenticated, authorized, and continually checked for security configuration and posture before gaining or maintaining access to apps and data.

Plaintiff: The plaintiff, akin to a legal protagonist, is the party instigating a legal action or on whose behalf the action is initiated within the realm of jurisprudence.

Complete Chapter List

Search this Book:
Reset