Professional Documents
Culture Documents
22.09.15
GROUP 1
Case Discussions
1. What are the advantages and disadvantages of allowing employees to use their
personal smart phones for work?
Advantages:
o Companies
a. Cost-saving: not responsible for the spending on employees
smartphones, while benefiting at the same level in comparison to
them actually investing on the smartphones for employees
o Employees
a. With anywhere and anytime access to corporate network increase
level of productivity and effectiveness
b. Feel comfortable to use their own devices
c. Feel convenient to carry only one device to work
Disadvantages:
o Employee Performance and Productivity: Difficult to maintain since
employees are involved with various types of mobile devices and
operating systems which is difficult to normalized measures and hard to
control over different systems. In addition, personal data and business
data are on the same mobile sometimes employee will focus on their
personal issues more than their work.
o Technical Support: linger more supporting teams and resources due to
various types of devices and operating platforms, this may include
providing updates and bug fixes.
o Information Security: Companys data and other valuable assets are
vulnerable to a greater deal of risks with mobility factor enhanced by
smartphones in comparison with storing them stationary at the company.
Employees may install their personal Apps along with corporate Apps
which could trigger information leakage.
MIS
22.09.15
GROUP 1
Organization Factor:
The organization needs to devise the followings:
Develop a different policies which will cover all ranges for different mobile
model and version in order to maintain security of the company
Implement an end-user service level agreement and policies to enable
mutual consent on data access and security awareness among the
employees
Develop network and IT support structure to support all users in the
organization
Develop inventory tracking system that keeps a record of the devices name,
device location, device activation status (whether it is still being used), and
device software etc. stored as database so that assistance can be dealt with
in a timely manner
Technology Factor:
Technology-wise, the firm should focus on the followings:
Corporate Data Protection: Using supplementary software to allow
information to be wiped from devices remotely when devices are stolen or
tracked to be transmitting confidential information elsewhere
Data Accessibility: Each device must be equipped with certain level
accessibility based on each employees responsibilities within the
organization
3. Compare the BYOD experiences of IBM and Intel. Why did BYOD at Intel work so
well?
BYOD experiences of IBM
Lacking Control over Devices: Software in employees devices are not controllable
by the IT Dept. at IBM, this means productivity and performance are difficult to track
MIS
22.09.15
GROUP 1
Has Control over Network: some security policy is imposed; the devices are only
usable when the network secures them. Moreover, public file transfers function is
turned off.
Lacking Cooperation from Employees: Blissfully unaware is the term describing
the employees attitude toward Security risks from popular applications. This means
confidential information can leak at any time through employees transferring
information in and between applications in their mobiles phones