Bring your Own Device

Name:

Tutor:

Course:

Date:

Bring your Own Device

Introduction

Information Technology consumerization has enabled a policy where companies can allow their workers use their own devices at the workplace in order to access privileged  information, applications and resources of the organization. The significant inroads made by the discoveries of Bring Your Own Device have had tremendous impact towards productivity, comfort, and generated innovation at the workplaces. However, concerns have been raised with the risk issues associated with the policy in equal measure. Information Technology analysts cannot ignore the benefits realized with the policy as the growth markets of the technology are on the continuous increase across the world. Bring Your Own Device policy should be eliminated within organizations in order to ensure maximum safety.  

Discussion

User policies are a major concern within organizations especially where shred information can be obtained with relative ease. The risk factors are heightened when the type of information available is of a highly sensitive nature and relates to the end node problem. When BYOD policies make it easier to access and overwrite the end node identity, the company’s information becomes available to anyone, thereby leading to vulnerability (Hayes and Kotwica 17). It I easier to attack the organization, misappropriate the information available or spread malicious intent into the shared network without being compromised on the source. The results are potential losses to the resources and increased danger from external targeting through the shard network.

            The cost of ensuring BYOD policies are available within the framework structures of organizations is usually high. One of the fundamental procedures deliberated before the availability of the resources on the network is enabled through issuer compliance. In this case, the policy is determined as a means of entrusting the users on the analyzed basis of confidentiality and pegging on the organization’s liability. It is then followed by numerous efforts in ensuring that the security systems are always updated and preventive from any form of attacks or illegal ownership. Garba, Armagero, Murray, and Kenworthy (42) note that with the robust nature of network availabilities and technological advancements, the policy increases the sophistication levels each day. Therefore, it maintenance becomes an added cost to the management.

              End-user support and cross-platform services in networks determine the relative ease of using shared resources, communication, and management. The support mechanisms available for networks are determined by the individual hot retention on interfaces within the networks as well as ensuring cross-platform mechanism are smooth. However, with the different availabilities in the present world, uniformity is never possible within networking, especially with large organizations (Olalere, Abdullah, Mahmod, and Abdullah 14). BYOD is therefore responsible for troubleshooting of host complexities at the network resources, leading to the focus on its management rather than its utilities for compliance and reliability. It is strengthened with decreased value in user interfaces and trust issues. Changes have to be in effect on constant basis, placing the strain on network management and required assurances.

Conclusion

Bring Your Own Device policy should be eliminated within organizations in order to ensure maximum safety. The policy allows workers in organizations use their own devices at the workplace in order to access privileged information, applications, and resources of the company. The benefits realized include technology budget of the hardware costs, familiarity, digital literacy, and improved output and productivity levels with comfort. However, numerous disadvantages with the policy become a burden with the organization through End-user support and cross-platform services, increased costs, security risks, high requirements for user policies and reliance issues.

Works Cited:

Garba, Abubakar, Jocelyn Armagero, David Murray, and William Kenworthy. “Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments.” Journal of Information Privacy and Security 11 (2015): 38-54. Print.

Hayes, Bob E, and Kathleen Kotwica. Bring Your Own Device (byod) to Work: Trend Report. Oxford: Elsevier, 2013. Print.

Olalere, Morufu, Mohd Abdullah, Amlan Mahmod, Azizol Abdullah. “A Review of Bring Your own Device on Security Systems” SAGE Journals 10 (2015): 11-24.  

Calculate your order
275 words
Total price: $0.00

Top-quality papers guaranteed

54

100% original papers

We sell only unique pieces of writing completed according to your demands.

54

Confidential service

We use security encryption to keep your personal data protected.

54

Money-back guarantee

We can give your money back if something goes wrong with your order.

Enjoy the free features we offer to everyone

  1. Title page

    Get a free title page formatted according to the specifics of your particular style.

  2. Custom formatting

    Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.

  3. Bibliography page

    Don’t pay extra for a list of references that perfectly fits your academic needs.

  4. 24/7 support assistance

    Ask us a question anytime you need to—we don’t charge extra for supporting you!

Calculate how much your essay costs

Type of paper
Academic level
Deadline
550 words

How to place an order

  • Choose the number of pages, your academic level, and deadline
  • Push the orange button
  • Give instructions for your paper
  • Pay with PayPal or a credit card
  • Track the progress of your order
  • Approve and enjoy your custom paper

Ask experts to write you a cheap essay of excellent quality

Place an order
Verified by MonsterInsights