BYOD and the Mobile Enterprise - Organisational challenges and solutions to adopt BYOD

نویسنده

  • Andre Sobers
چکیده

Bring Your Own Device, also known under the term BOYD refers to the trend in employees bringing their personal mobile devices into organisations to use as a primary device for their daily work activities. With the rapid development in computing technology in smartphones and tablet computers and innovations in mobile software and applications, mobile devices are becoming ever more powerful tools for consumers to access information. Consumers are becoming more inseparable from their personal mobile devices and development in mobile technologies within the consumer space has led to the significance of Consumerization. Enterprises everywhere want to introduce BYOD strategies to improve mobility and productivity of their employees. However making the necessary organizational changes to adopt BYOD may require a shift away from centralized systems towards more open enterprise systems and this change can present challenges to enterprises in particular over security, control, technology and policy to the traditional IT model within organisations. This paper explores some of the present challenges and solutions in relation to mobile security, technology and policy that enterprise systems within organisations can encounter. This paper also reviews real-life studies where such changes were made in organisations aiming to implement BYOD. This paper proposes a mobile enterprise model that aims to address security concerns and the challenges of technology and policy change. This paper ends with looking ahead to the future of mobile enterprise systems. Keywords—BYOD, MDM, Policy, Security, Technology

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security

An emerging trend in corporate network administration is BYOD (Bring Your Own Device). Although with many advantages, the paradigm shift presents new challenges in security to enterprise networks. While existing solutions such as Mobile Device Management (MDM) focus mainly on controlling and protecting device data, they fall short in providing a holistic network protection system. New innovatio...

متن کامل

The "Bring your own device" conundrum for organizations and investigators: An examination of the policy and legal concerns in light of investigatory challenges

With the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to eliminate the need for two separate mobile devices fo...

متن کامل

Towards a User-Friendly Security-Enhancing BYOD Solution

Bring Your Own Device (BYOD) is attracting considerable attention nowadays. In BYOD scenarios, enterprises wish to integrate their employees’ mobile devices in enterprise operations (e.g., reading emails, editing documents). This clearly raises serious security concerns since the mobile device in question is not under the control of the enterprise and is vulnerable to a wide range of security t...

متن کامل

Bring Your Own Device Organisational Information Security and Privacy

BYOD is a growing trend in corporate environments, where employees bring their own devices to work. Factors that have led to the growing popularity of BYOD include the benefits of work flexibility, increased productivity, and efficiency of employees. Despite these benefits, there are concerns over information security and privacy. Since BYOD allows employees to access organisational data anytim...

متن کامل

A framework towards governing "Bring Your Own Device in SMMEs"

Information is a critically important asset that has been used for decades within organizations. Like any asset, there are threats to the information that impact processes such as; email retrieval and access to organizational system services. As a consequence of the threats, attention to the security of the information is important. Technology is utilized to secure information and the cost affi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1512.03911  شماره 

صفحات  -

تاریخ انتشار 2015