Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Answers to the case questions. a)What are the advantages and disadvantages of allowing employees to use their personal smartphones for work? b) What management, organization,

Answers to the case questions.

a)What are the advantages and disadvantages of allowing employees to use their personal smartphones for work?

b) What management, organization, and technology factors should be addressed when

deciding whether to allow employees to use their personal smartphones for

work?

c) Compare the BYOD experiences of IBM and Intel. Why did BYOD at Intel work so well?

d) Allowing employees to use their own smartphones for work will save the company

money. Do you agree? Why or why not?

image text in transcribedimage text in transcribedimage text in transcribed
The Pleasures and Pitfalls of BYOD CASE STUDY uat about everyone who has a smartphone using a proprietary software and networking wants to be able to bring it to work and use it on platform that is company-controlled and protected he job. And why not? Employees using their for outsiders.) own smartphones would allow companies Ibday, the mobile digital landscape is much to enjoy all of the same benefits of a mobile work- more complicated, with a variety of devices and force without spending their own money to purchase operating systems on the market that do not have these devices. Smaller companies are able to go well-developed tools for administration and secu mobile without making large investments in devices ity. Android has over 79 percent of the worldwide and mobile services. One [E:M-sponsored study by smartphone market, but it is more difficult to use Forrester Consulting found that a BYOD program for corporate work than apple mobile devices using using mobile enterprise services from IBM achieved a the 105 operating system. IOS is considered a closed 106 percent meturn on investment and payback within avatom and runs only on a limited number of dif one month, 'Anywhere/anytime' access to comput- ferent Apple mobile devices. In contrast, Android's ing tools increased workplans productivity and raised fragmentation makes it more difficult and costly effective employee work time by 45-60 minutes per for corporate IT to manage. As of July 2013, them week. According to Gartner Inc., by 2017, 50 percon: were at least 11, 868 different Android-based devices of employers will require employees to supply their were available from more than 1,700 different own mobile devices for the workplace, BYOD is brands, according to a report by OpenSignal, which becoming the "new normal." researches wireless networks and devices, Android's But...wait a minute. Nearly three out of five huge consumer market share attracts many hackers. enterprises believe that MYOD represents a grow- Android is also vulnerable because it has an open- ing problem for their organizations, according to a source architectureand comes in multiple versions. survey of 162 enterprises conducted by Osterman If employees are allowed to work with more than Research on behalf of Dell Inc. Although BYOD can one type of mobile device and operating system, improve employee job satisfaction and productivity, companies need an offective way to keep track of it also can cause a number of problems it out man- all the devices employees are using. To access cum aged properly: support for pomonally owned devices pany information, the company's networks must be is more difficult than it is for company-supplied configured to receive connections from that device. devices, the cost of managing mobile devices can When employees make changes to their personal increase, and protecting corporate dats and net phone, such as switching cellular carriers, changing works becomes more diff cult Research conducted their phone number or buying a new mobile device by the Aberdeen Group found that on average, an altogether companies will need to quickly and flex- enterprise with 1,000 mobile devices spends an extra ibly ensure that their employees are still able to $170,900 per year when it allows BYOD. So it's not remain productive, Firms need an officiant inven- that simple. tory management system that keeps track of which BYOD requires a significant portion of corporate devices employees are using, where the device is IT resources dedicated to managing and maintain- located, whether it is being used, and what software ing a large number of devices within the organiza- it is equipped with. For unprepared companies, tion. In the past, companies tried to limit business keeping track of who gets access to what data could smartphone use to a single platform. This made it be a nightmare. Basicr to keep track of each mobile device and to roll With the large variety of phones and operating out software upgrades or fixes, because all employ- systems available, providing adequate technical cos were using the same devices, or at che very support for every employee could be difficult. When icast, the swine operating system. The most popular employees are not able to access critical data or employer-issued smartphone used to be Research in encounter other problems with their mobile devices, Motion's BlackBerry, because it was considered the they will need assistance from the information "most secure" mobile platform available. (BlackBerry mobile devices access corporate s-mail and data systems department. Companies that rely on desktop computers tend to have many of the same computerswith the same specs and operating systems, making of the person using it. Goms poopie are only allowed tech support that much easier Mobility introduces a to receive IBM e-mall, calendars, and contacts on new layer of variety and complexity to tech support their portable devices, while others can access that companies need to be prepared to handle. internal IBM applications and files (ace Chapter 8). There are significant concerns with securing IBM equips the mobile devices of the latter category company information accessed with mobile devices. of employees with additional software, such as If a device is stolen or compromised, companies programs that encrypt information as it travels to need ways to ensure that sensitive or confidential and from corporate networks, information isn't freely available to anyone. Mobility One company that has successfully implemented puts ussets and data at greater risk than if they were BYOD is Intel Corporation, the giant semiconductor only located within company walls and on company company. About 70 percent of the 39,000 devices machines. Companies often use technologies that registered on its network are personal devices. Intel allow them to wipe data from devices remotely, or approached in BYOD in a positive manner, trying encrypt data so that il it is stolen, it cannot be used. to find ways to make it work rather than to defeat You'll find a detailed discussion of mobile security it. Diane Bryant, then Intel's CIO. didn't want to be issuca in Chapter 8. dependent on a single mobile vendor or device. IBM's CIO Jeanette Horan believes that BYOD Intel hammered out a BYOD strategy and created may cause as many problems as it solves. BYOD was on end-user service-level agreement that clarified not saving IBM any money and had actually created that end users were voluntarily using BYOD rather new challenges for the IT department because than being mandated by Intel. The company deval- employees' devices are full of software that IBM oped different policies, rules, and abosss limits doesn't control. IBM provides secure BlackBerry's for each type of device-smartphone, tablet, or lap- for about 40,000 of its 400,000 workers whils top-with multiple levels of controls in place. Intel allowing 50,CO0 more employees to use their own maintains a list of approved devices. If a device smartphones or tablets to access 1RM networks. does not meet its requirements, it is blocked from The IBM IT department found it had no grasp of the network. Intel's BYOD program today offers 40 which apps and services employees wom using on proprietary applications, including travel tools to their personal devices, and employees themselves help schedule a flight and conference room finders. were "blissfully unaware" of the accurity risks posed The company has an Internal 'spp store" and uses by popular appa. IBM decided to ban the use of such popular services as the Dropbox cloud-based a variety of software and security tools, including mobile device management (MOM) software and cyberlockon, fearing that employees would put IBM- mobile app management (MAM) software. sensitive information in their personal Dropbox Intel's goal for BYOD is not to save money but accounts, forwind internal email to public Web mail to make cmployees happier and more produc- services, or use their smartphones as mobile Wi-Fi tive. Employees like being shis co use their own hotspots. According to research by the International device and apps alongside specialized Intel apps. Data Company (IDO), 20 percent of corporate On average, Intel workers report that bringing employees using personal cloud storage services their own devices saves them about 57 minutes per admitted to using them to store enterprise dats, an day, which amounts to 5 million hours annually this is becoming a serious problem. company-wide IBM will not allow an employee to access its Canadian Tire decided not to allow BYOD at all corporate networks with his or her personal device and issued new BlackBarry Q10 and 210 smart- unless it secures the device. The IT department phones to its 3,000 corporate employees. (Canadian configures the device so that its memory can Tire is one of Canada's largest companies, with an be erased remotely if it is lost or stolen. The IT online e-commerce store and 1,200 retail outlets sall- group also disables public file-transfer programs ing automotive, sports, leisure, home products, and like Apple's iCloud; instead, employees usc an apparel; petroleum outlets; and financial services.) IBM-hosted version called MyMobileHub, IRM even The company felt that for its purposes, the bring- turns off Siri, the volos-activated personal assistant, your own-device model was not sufficiently secure. on employees' iPhones because the spoken queries Canadian Tire's chief technology officer (CTO) are uploaded to Apple servers. Eugene Roman worries that an email could sent Each employee's device is treated differently, a virus into the company's core Infrastructure. At depending on the model and the job responsibilities present, Canadian Tire's management thinks BYODis interesting but is not yet ready for the company's Barastain, "1RM4 Faces the Perils of 'Bring Your Own Device"," mainstream business applications. MiT' Technology Review, May 21, 2014, and Man Hamblen In order to successfully deploy mobile devices, "Canadian Tore forapes BYCI, [sauce BlackBerries to Workers," companies need to carefully examine their business Computerworld, May 20, 2013. processes and determine whether or not mobility makes sense for them. Not every firm will benefit CASE STUDY QUESTIONS from mobility to the same degree, Without a clear 5-14 What are the advantages and disadvantages of idea of how exactly mobile devices fit Into the long allowing employees to uss their personal term plans for the firm, companies will end up smartphones for work? wasting their money on unnecessary devices and 5-15 What management, organization, and technol programs. ogy factors should be addressed when deciding Sources: Dennis McCafferty, "Surprising Faols About Mobility whether to allow employees to use their and DYOD, ' Paneline, January 29, 201d; Beatrice Piquer-Durand, personal smartphones for work? "BYOD and WYOn: Dangers and Complications ' Tackaradar Pro, 5-16 Compare the BYOD experiences of IBM and March 24, 2014: Them Harbert, "Android Invades he Enterprise," Intel, Why did BYOD at Intel work so well? Computerworld BYOD Conan merixation of IT," November 3013; Forrester Consulting, The Total Economic Impact of IBM 5-17 Allowing employees use their own smart- Manneed Mobility for BYOD,' May 2013; Fred Donovan, 'The phones for work will save the company Growing BYOD Problem," FierceMobileTT, February 13, 2013; Brian money. Do you agree? Why or why not

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Management Fundamentals

Authors: Robert N. Lussier

3rd Edition

0324226063, 978-0324226065

More Books

Students also viewed these General Management questions

Question

List the ten essential rules for dimensional modeling.

Answered: 1 week ago

Question

Name and briefly describe the five product mix pricing decisions.

Answered: 1 week ago

Question

Please help me evaluate this integral. 8 2 2 v - v

Answered: 1 week ago

Question

Choosing Your Topic Researching the Topic

Answered: 1 week ago

Question

The Power of Public Speaking Clarifying the

Answered: 1 week ago