BYOD (Bring Your Own Device), Mobile Technology Providers, and Its Impacts on Business/Education and Workplace/Learning Applications

BYOD (Bring Your Own Device), Mobile Technology Providers, and Its Impacts on Business/Education and Workplace/Learning Applications

Copyright: © 2018 |Pages: 11
DOI: 10.4018/978-1-5225-2255-3.ch520
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Outside the traditional business institutions and learning models, a number of organizations and academic institutions are looking to add bring your own device (BYOD) policies. Businesses and K-12 schools are supplying teachers with devices that can be an aid in working/learning; universities are increasingly allowing students to bring their own devices to add to the enrichment of the programs. BYOD–based technology and it applications have numerous benefits, but they can be difficult to implement. They usually result in lower costs for the business, but they often require the organization to adapt. Since there are so many constraints and situations that could inhibit the security of the business, some businesses are hesitant to use BYOD in their business.
Chapter Preview
Top

Introduction

Concepts of BYOD

Until recently, was the norm for the employee could only do company work on a company device. Technological advances are now assisting individual’s access to company information and applications on personally owned devices. BYOD (i.e., bring your own device), is making significant advances in the business world with about 44% of employees already using it at work. Companies are having a hard time controlling the employees from bringing their devices into the office and believe that implementing a BYOD policy will help employees be more productive.

The concept of BYOD was introduced in 2009 and has grown rapidly in the past few years. As of 2015, 74% managers/professional workers stated that their organization is using or planning to use BYOD” and “just over a quarter of have ruled it out entirely (Hammond). According to Apple, using BYOD can boost mobile workforce. “Users connect their mobile devices to the network without assistance from IT, and get first-tier technical support through online reference documents and instructional videos” (Apple). Being able to use these mobile devices in a group setting can substantially improve work efficiency. The devices are more mobile and are easily functioned.

Another process in information systems that BYOD could be implemented with is cloud computing. When the business has a cloud server, the employees will be able to access company data and information from their mobile devices and desktop computers in the firm. Some businesses that already have BYOD are using their devices to connect to cloud services in order to save space on the firm’s computers. Although cloud computing could be beneficial for the firms in terms of storage, some employees and administrators feel uneasy about cloud computing. Some of the data that needs to be stored is often confidential information about customers about the business. Allowing that information to be uploaded to the Internet and open for everyone to see could be hazardous for the firm in the long run. When employees bring their own device, they have to make sure that their devices are not jail broken or altered in anyway. This could cause data leakages within the company, which could later lead to lasting consequences. Anyone could get ahold of their information and leak data to the world. Ensuring that the firm’s cloud computing is secured and protected is one of the biggest challenges in implementing it.

According to Qrunfleh, Tarafdar, & Ragu-Nathan (2012), one main cost for any firm is a lack of knowledge of supply chain integration and how to manage a company's inventory. A company does not want to order as many products as they can and expect to sell items immediately and successfully. BYOD would allow the flexibility of all members in the supply chain to access the level of communication technology needed to develop long-term supplier integration. It is very important to understand how supplier management practices and IS strategies can help a business improve their supply chain performance. To improve supply chain performance, a business needs to adopt specific information systems that support the processes and activities of their supply chain. In order to have an effective and enhanced supply chain performance, IS that a focal firm deploys in its supply chain should support and enhance the objectives and goals of supplier management practices. IS can assist a company with inventory control and provide its suppliers with production planning, so that, the right amount of inventory is made and that not too much is in production. The alignment of these aspects can provide a company with a low-cost supply chain and can reduce its labor cost as well as inventory costs. By using certain IS application aligned with supplier practices a company can have an improved supply chain performance.

Outside the traditional business institutions, a number of academic institutions are looking to add BYOD policies. For example, some K-12 schools are supplying teachers with devices that can be an aid in learning and universities are allowing students to bring their own devices to add to the enrichment of the programs. BYOD–based technology and it applications have numerous benefits, but they can be difficult to implement. Obviously, as with any technological innovation, there will always be adoption considerations and issues (Bruner & Kumar, 2005; Burton-Jones & Hubona, 2005; Chau, 1996; Chen, Gillenson, & Sherrell, 2002). Such technological innovations usually result in lower operating costs for the business, but they often require the organization to adapt (Belmans, Mobley, Page, Uy, & Lambrette, 2012). Since there are so many constraints and situations that could inhibit the security of the business, some businesses are hesitant to use BYOD in their business.

Key Terms in this Chapter

e-Discovery: This term refers to all types of electronic information storage (e.g., e-mails, directories, documents, searches, etc.) that are either targets investigations in which the affected organization need to produce evidence of such transactions. In other cases, information have been mistakenly lost or deleted and mangers or employees need to retrieve message-level data.

Advanced Persistent Threats (APT): Advanced Persistent Threats typically employs a number of phases and techniques to break into a network, avoid detection, and gather customers’ or companies’ information over an extended time period. Unfortunately, such well-planned and extensive strategy is difficult to detect, as it many techniques and phases may be extremely complex and expensive to develop a counteroffensive that is successful.

CoIT (Consumerization of IT): CoIT refers to the strategic use of IT systems in order for a company to enhance its engagement with customers, vendors, and partners. Mutually beneficial relationships are the targets, with enhanced customer service and firms’ increased profitability.

Direct Cyberattack: Direct cyberattack causes data communications interception at the hands of a specific hacker who may have located a specific person or Wi-Fi area in order to perform such cybercrime. A type of direct attach is direct access, where the criminal gains physical access to either the computer or its network in order to compromise security by loading worms, Trojans, compromising data, etc.

BYOD: Types of AIDC-related technologies to leave the human element out of the data collection and storage functions of information derived from manufacturing, integrated through the manufacturing process, types of authentication concerns and/or e-security strategies, and relationship links to customer profiles. Typical types of AIDC include, bar-coding, RFID, magnetic strips, touch memory, and smart cards.

Global IDs: This term refers to identifications tied to software associated with social media platforms (e.g., Google ID and Live ID) as well as to more company-based application-wide URI that uniquely identifies a particular model. Global IDs as referred to in this chapter refers to simple identifier to reference a variety of classes of objects (i.e., payroll, operations planning, job scheduling). Global IDs typically reference a model object so that it can more easily locate a model and/or application at the time it needed to perform the specific task by employees/managers.

Cyberdeviance: Cyberdeviance refers to an employee’s use of the company’s Internet access during work hours for non-work related purposes, and is a subset of counterproductive work behavior. Counterproductive work behavior refers to any activity of an employee with the intended or unintended consequence of harm to the organization.

Personally Identifiable Information (PII): Personally identifiable information (PII) refers to all information, including personal financial and healthcare information that can be traced to an individual customer or patient.

Virtual Distance: Virtual distance is a psychological and emotional sense of detachment that may result from lack of human interactions or from the loss of the human moment. Students and employees that share cultural values, similarities in communication style, and attitudes toward work can directly mediate the effects of office isolation.

Complete Chapter List

Search this Book:
Reset