Week5 Discussion CIS 512: Advanced Computer Architecture

Week5 Discussion

Some organizations have implemented bring your own device (BYOD) policies. This enables organizations to save money on equipment costs because employees are now using their personal computers. At the same time, BYOD policies also present challenges for organizations. Now organizations are in the business of supporting personal computers.

Haven’t Found The Relevant Content? Hire a Subject Expert to Help You With
Week5 Discussion CIS 512: Advanced Computer Architecture
Post Your Own Question And Get A Custom Answer
Hire Writer

Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on BYOD policies and the challenges associated with them. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.

Please respond to the following in a post of at least 200 words:

  • Describe some of the specific challenges (for example, risks of employees going to various websites, viruses, and legal implications) associated with BYOD policies.
  • Recommend methods organizations can use to address the challenges associated with BYOD policies.
  • Provide full citations and references, formatted according to Strayer Writing Standards.
  • For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses.

Post from Austyn that you have to respond

Hello professor and classmates,

I hope everyone is doing great this week. This week has been a struggle still. Please keep us all in your prayers.

Many companies currently allow you to BYOD. There are pros and cons of BYOD, and they are very evident. Many companies feel that this option is desirable as it allows them to reduce costs. There are some advantages to allowing employees to BYOD. It will help reduce administrative support of devices and usually leave IT resources vacant to be able to support other organizational needs. It will also help to reduce equipment costs unless the organization is compensating employees for their devices. The organization will not own the devices, resulting in not being tasked to replace the lost or stolen device. The deployment time is much more accelerated as the user does bring their device, and the IT team no longer in charge of the deployment.

They are also several cons in regards to BYOD. Agreements in company policy may indicate who is responsible for personal devices’ support. However, the IT team will often find themselves spending support time fixing a device owner’s problem.

There may be the need for less management overhead on devices, but there is still a cost involved for the platform that allows for a BYOD environment to exist. Several examples are software cost and licensing. Understanding what devices are in the BYOD environment and making specific unauthorized devices are present takes incredible time and effective monitoring. The need to be able to support multiple OS platforms and hardware is a challenge and costly.

Data loss is a massive possibility since information copied to BYOD devices can be transferred to external destinations without the organization’s knowledge. A way to avoid this is to ensure the MDM policy does not allow e-mail and attachments to be copied to the BYOD. The inability to enforce wireless connection rules on personal devices provides a high potential for a user to connect to an insecure network. This will allow others to intercept or redirect traffic between the device and the organization’s network. Without total control over the device, the organization could be exposed to risk by devices with vulnerable software.

I enjoyed answering the discussion this week. I hope you all have a wonderful and blessed day!

Austyn Raines

References:

Liwen Chen, Tung-Liang Chen, Hsu-Kuan Liu. Identifying Students’ Perception of Clickers via Bring Your Own Device (Byod) in Flipped Classrooms. International Journal of Organizational Innovation. 2020;13(1):105-117. Accessed February 1, 2021. https://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=144310451&site=eds-live&scope=site

Kang Q, Xue L, Morrison A, Tang Y, Chen A, Luo X. Programmable In-Network Security for Context-aware BYOD Policies. 2019. Accessed February 1, 2021. https://search.ebscohost.com/login.aspx?direct=true&db=edsarx&AN=edsarx.1908.01405&site=eds-live&scope=site

Week5 Discussion CIS 512: Advanced Computer Architecture

Although organizations are slowly adapting to the trend of letting their employees use their own devices such as laptops to access their IT systems, many remain uncomfortable with this practice. This is understandable given the challenges that organizations have on this front. One of the challenges that organization may face with implementing BYOD is physical theft. The chances of losing a personal device is greater when compared to losing a device owned by an organization (Brodin, Rose & Åhlfeldt, 2015). This aspect provides little comfort for the IT team responsible for safeguarding sensitive corporate data. Placing control on personal devices has the implication that unauthorized individuals can access sensitive firm data. To mitigate against this threat and challenges, it is recommended that IT implement security controls which employees must utilize every time they want to access company information form their devices.

Another challenge that organizations face when it comes to implementing BYOD is privacy concerns. That is, with use of personal devices, there is the risk that that personal information forms these devices may overlap with corporate data. This can infringe upon the privacy of employees causing more challenges to the human resource department. In this case, what an organization may do is to set policies that would guide on access of information on personal devices used for work (Olalere, Abdullah, Mahmod & Abdullah, 2015). This would ensure that employees are aware of the guidelines and processes to prevent overlap of personal and corporate data. Despite these challenges, some of the advantages that organizations face implementing BYOD is reduces costs on equipment. That is, with employees using their devices, companies spend less on such devices hence cost effective.

References

Brodin, M., Rose, J., & Åhlfeldt, R. M. (2015). Management issues for bring your own device. In European, Mediterranean & Middle Eastern Conference on Information Systems 2015 (EMCIS2015), 1-2 June, Athens, Greece. European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS).

Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A. (2015). A review of bring your own device on security issues. Sage Open5(2), 2158244015580372.

Response

Hi Austyn,

It must be particularly daunting task for the IT department to ensure that personal devices used at work pass the security checks and are protected from malware. This is further complicated with the fact that the company has no authority if limited for instance application or websites that an employee visits which to be honest can increase the risk of hacking. What are some of the recommendations for a company to improve the security when implementing BYOD?

Thanks for sharing.

tina biche (28431)
New York University
DO YOU HAVE A SIMILAR ASSIGNMENT?

Hire an Expert to Help you

Hire Verified Expert

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Have a homework question? Get help from verified tutors now!

Are You Looking For Assignment Help? We Can Certainly Assist You