S0274817 PA3 Week6 - assignment PDF

Title S0274817 PA3 Week6 - assignment
Author Divyesh Patel
Course Professional Skills in Information Communication Technology
Institution Central Queensland University
Pages 4
File Size 100.7 KB
File Type PDF
Total Downloads 52
Total Views 331

Summary

assignment...


Description

Divyesh Patel (s0274817) E-mail: [email protected] COIT20249 (Professional Skills in Information Communication Technology) Assessment Item I - Participation Activity 3 Due Date: Week 6 (Monday, 25 April 2016, 5:00 PM) Academic Referencing Style: Harvard Campus Lecturer/Tutor: Raj Sandu Course Coordinator: Jo Luck



Description of organisation

Organisation is adopting new policy called bring your own device (BYOD) in which organisation let their employees to bring their own electronic appliances (like Smartphone, laptop, tablet etc) to attend their work. Moreover, an organisation allows them to use Wi-Fi, intranet, useful applications and importantly private organisational information.



Aim of report

The main aim of the report is to find out how BYOD could be used to improve organisation’s business model (which includes mobile application development and information system development) either locally or globally over the next five years and to find possible opportunities. In addition to that, it is important to find out negative impacts of using BYOD to stop security breaches.

 Report outline: 1. About BYOD Firstly, this section represents a clear idea about what BYOD actually is and types of BYODs currently being used in IT companies. Additionally, it will also talk about various ranges of applications in distinct fields like education, medical and IT companies. Secondly, it will also discuss negative impacts on an organisation which could breach the security. 1.1 How BYODs are currently being used? BYOD is also known as bring your own tablet (BYOT), bring your own phone (BYOT), and bring your own laptop (BYOL) and so on. It is IT policy which permits employees to bring their own devices to improve their performance and morale. BYODs are being used as a 1. Tool to achieve high productivity gain and cost savings. 2. Too which has unlimited access to personal belongings 3. Device which has authorised access to sensitive system and data

1.2 Applications of BYOD in IT organisation In IT companies employees can be more productive when they are continuously in touch with familiar devices that they might use at home or at their comfort zone. Those will results into concrete outcome in less time and with better efficiency. So, alternatively it leads to reduction in company’s capital costs and resources. Some applications are mentioned here: 1. Employee can work from home in bad weather 2. Project manager is finishing his presentation while travelling in train 3. Flexible, centralized and virtual environment for work 1.3 Security and privacy threats There are some challenges behind excessive use of BYOD which must not be overlooked. Organisation must have adequate policies to protect company’s important information and regular check for lost/stolen devices.

2. Ways how BYOD could improve organisation This part of report will talk about three ways to improve business model to improve company’s global image. Furthermore, this part of report will discuss ways how BYOD could improve business growth in IT workplaces and also include possible ways to generate opportunities in IT fields. Moreover, recommendations will be listed out with respect to current and future use. Major areas of improvement are listed below: 2.1 Open innovation challenges 2.2 Cut-off economic principle cost 2.3 Dramatically improvement in employees’ productivity and morale

3. Pros and cons of BYOD This part will include advantages and disadvantages of using BYOD in IT organisation. It will also keep ethical, legal and social considerations in focus. Organisation will analyse how pros can help to improve its business and global image. On contrary, it will measure the impact of cons (of using BYOD) on business growth.

4. Conclusions According to statistical data analysis, it can be said that it is very good policy regardless of fields (Education, Healthcare, IT, etc) to bring your own device. There are overwhelming advantages of bringing own devices for a workplace to reduce capital investment cost, support and maintenance of an organisation. Although, an organisation must be aware of security breaches can happen with the illegal use of BYOD.

5. Recommendations BYOD permit at a workplace must be followed by strategy for policy and security. To avoid security related threat, policies must be strictly applied as a gateway to BYOD (to access organisational benefits). Some of the critical recommendations are mentioned below: 1. Device must obey each privacy and security policy statements 2. User experience and privacy issues must be predefined and according to that user must be trained properly. 3. There must be strict guest policy. 4. Electronic form with all terms, conditions and declarations must be signed by an employee....


Similar Free PDFs