It is a security framework that mandates that all users, whether inside or outside of an organization’s network, must be authenticated, authorized, and continually checked for security configuration and posture before gaining or maintaining access to apps and data.
Published in Chapter:
BYOD and the Evolving Workplace
Upasna Goyal (National Institute of Technology, Kurukshetra, India) and Geeta Sachdeva (National Institute of Technology, Kurukshetra, India)
Copyright: © 2024
|Pages: 24
DOI: 10.4018/979-8-3693-3124-8.ch002
Abstract
In the cutting-edge realm of IT, a new sensation takes center stage: the emergence of bring your own device (BYOD), demanding instant attention. This trend encourages employees to harness the potential of their own personal gadgets for tapping into the company's intricate systems and data repositories. BYOD, a subset of ‘IT consumerization', impact from the CEO's strategic position to hourly workers in the corporate hierarchy. In the exploration of BYOD policies, authors are set to uncover the challenges associated with their adoption. Additionally, the evolution of BYOD will be traced, providing statistical insights and examining legal cases that have shaped its trajectory. Along this journey, there will be a delve into the interplay between BYOD and cyberloafing, shedding light on this dynamic within the organizational context. Moreover, an analysis will be conducted on the benefits of implementing a BYOD policy, evaluating whether Indian Inc. companies should embrace this trend. Throughout, consideration is given to key market players, highlighting their pivotal roles.