BYOD Research Paper

Superior Essays
Bring Your Own Device (BYOD)
David L. Haywood
CIS 333 – Networking Security Fundamentals Professor Arend Clayborn
Strayer University
25 January 2015

Bring Your Own Device (BYOD)
Within this paper I will attempt to give a clear picture of this new concept of Bring Your Own Device (BYOD) is about. I’ll do this by compartmentalizing several areas that will be discussed to ensure clarity and understanding of the information I am presenting. The first area of discussion focuses on the meaning of this new concept of BYOD along with identifying the primary benefits of BYOD in organizations, and determining the key ways in which its concepts can enhance an end user’s overall working experience. Next, I’ll make an attempt to analyze in detail
…show more content…
The two primary benefits of BYOD in many organizations is first wiping out the need to purchase a different number of gadgets and the circulation of those devices for every region of operation all through the organization. Notwithstanding the past advantage organizations appreciate the lower price tag, lower operational expenses, and supportability of clients and applications, which supporters of the BYOD accept this bodes well for consolidate in its standard operating procedures. Moreover some key ways in which its concepts can enhance an end user’s overall working experience is in today 's business world the gadgets are versatile and lightweight. (Kim & Solomon, 2013) found that “users want small devices that are multifunctional and connected” (p. 78). Furthermore “it allows users to use a single device to make phone calls, access e-mail, and manage schedules” (Kim & Solomon, 2013, p. 78). But with all of this flexibility there are risks. So organizations utilize a BYOD strategy, which is a situated of principles overseeing a corporate IT, division 's level of backing for employee-owned PCs, smartphones and tablets. This BYOD strategy serves to control the utilization and moderate its different issues connected with this new pattern. So organizations employ a BYOD policy, which is a set of rules governing a corporate IT, department’s level of support for employee-owned PCs, smartphones and tablets. This BYOD policy helps to control the usage and mitigate its various problems associated with this new trend. Lets now take a gander at the significant dangers incorporating BYOD and look at security controls and apparatuses that are as of now accessible and being used to deal with these

Related Documents

  • Decent Essays

    Working alone, I immersed myself in this environment and worked toward removing inefficiencies, security oversights, and business continuity issues. As I hope you’ll see, the high-security, HIPAA-compliant environments that I’ve worked in have exposed me to policies, products, and procedures that I can bring to your organization to help strengthen your information security program. Additionally, my expertise in securing iOS and Android mobile devices means that I can help mitigate threats to this increasingly significant portion of your computing…

    • 320 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Healthcare landing page SEO: HIPAA COMPLIANCE - 5 Page title: HIPAA Compliance Endpoint Security How Visibility, Control & Automated Response Helps Healthcare Organizations Compensate for BYOD and IoT security Gaps The rise in IoT, BYOD and mobile devices, has made network endpoints one of the most vulnerable security gaps in most networks. What makes the healthcare industry unique, is its need to secure information while maintaining the delicate balance between patient privacy and the need for readily available information to ensure efficient, accurate diagnosis and treatment.…

    • 370 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    EOD Research Paper

    • 610 Words
    • 3 Pages

    EOD (Explosive Ordnance Disposal) requires and in-depth knowledge about a wide range of destructive devices. To an outsider, it might seem a brave but simple thing, disarming devices meant to cause so much destruction. To do so without killing yourself or innocent bystanders, requires a data base of some 10,000 technical orders and manuals. Knowledge from the chemical composition of explosives, to specific functions of fuzes (yes that is spelled correctly), to the latest intelligence on enemy ordnance, creates a knowledge base no single person could possible commit to memory. This problem is were information technology has streamlined the EOD emergency response process, and still promises to make the job more efficient and therefore safer in the future.…

    • 610 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Laptop Policy Paper

    • 346 Words
    • 2 Pages

    By setting executions and keeping control of privileged content, companies sensitive data will be protected. By having company’s employees work remotely, it cost the company more money, BYOD would save the company money on equipment and maintenance. With BYOD policy there are disadvantages like security and the fact that the device is not the companies could also be another problem. Since the sales group only has 10 employees, implementing the BYOD policy would be a smooth…

    • 346 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    BYOD Policy

    • 609 Words
    • 3 Pages

    INTRODUCTION Change has been a constant matter in technology. With technology’s interminably redefinition, its remarkable impact in the population has been apparent extensively. Indeed, technology has significantly changed the way humans live. It changed the way they perceive various circumstances and the way they interact with one another. To a certain extent, it has become a concept that people won’t survive without.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Texting In Nursing

    • 1129 Words
    • 5 Pages

    If organizations are going to implement the use of smartphones and tablets, policies and procedures must be in place to inform and protect the user and the patients. In addition, it is recommended the policies routinely be reviewed by executives, risk management and legal counsel to ensure adequate coverage and to ensure appropriate implementation. Another suggestion is the use of password protection phones/tablets to secure confidential…

    • 1129 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This project is a milestone in easing the life of the clients. This project overcomes the frustrations in waiting for one's turn in a long queue. The use of mobile phones was established and it was a whole new factor in the communications access mode. This was proved correct based on the test conducted by the researcher in the UNO-R accounting office.…

    • 598 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With the introduction of the iPhone, consumer’s bargaining power will continue to decline. The threat of having an alternative device that is a music player, a phone, a organizer, and mobile is very low. Each additional feature that the iPhone provides is one less opportunity to substitute another device. Computers have many of the features, but aren’t mobile. A PDA is a great device for oranizing schedules and activities, but doesn’t provide the ability to make a phone call.…

    • 701 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    When users think about a divorce from their Apple or Android devices, the idea of exclusivity vs. variety comes to mind. Each company offers different models at different price points, but with Android variety is their key selling point. There are over eighty Android models to choose from within all the major carriers. This is a way to ensure that there is a clear cut option that satifiys a user’s lifestyle and meets their mobile needs precisely. On the contrary, Apple only offers six basic models that are currently…

    • 731 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    BYOD Business Strategy

    • 1751 Words
    • 8 Pages

    With the new innovations technology has brought to the business world, the model “bring your own device,” or BYOD, is becoming a popular strategy for many organization to continue to keep up with new trends as well as keep customers and employees happy. Today, this model is quickly becoming one of the main drives behind most enterprise mobility investment decisions. While this strategy can be financially rewarding, as well as positively impact the employees and productivity of an organization, the journey to make this practice widespread is…

    • 1751 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Executive summary With the change in economic environment, technology is also changing. In the recent few years, the number of smart phone users has increased rapidly. The Smartphone has created a different image in the minds of people and became a part of their life. The Smartphone is not only the mode of communication, but also best medium of entertainment. Its different qualities and features have made it popular worldwide.…

    • 3878 Words
    • 16 Pages
    Improved Essays
  • Improved Essays

    Technology is evolving every day and with new technology comes new security issues. Many of today’s technology relies on “trusted” operating systems. Only a true developer will be able to navigate through other uncommon operating systems. Some of the most popular operating systems are Microsoft Windows, Apple’s iOS, and Google’s Android. Though many people use these operating systems, they are not always secure.…

    • 830 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Hence, it has emerged as the next tendency in revolution of Information Technology. Currently, mobile technology is gaining significance and popularity in businesses (Singh and Peszynki 2014). Some applications of mobile technology in organizations involve mobile brokerage (Looney, Jessup and Valacich 2004,), access to firm Intranet (Nah, Siau, and Sheng 2005), mobile payment and banking services (Herzberg 2003), and electronic procurement on a basic of WAP by using mobile phones and laptops (Gebauer and Shaw 2004). Impacts of mobile technology The speedy pace of advancement and adoption mobile technology provides opportunities of new services (Perry et al. 2001).…

    • 878 Words
    • 4 Pages
    Improved Essays