Empirical Research: Supply Chain and BYOD – Hand in Hand for the Future

274 views
201 views

Published on

This study is aimed at reducing the investments of companies in buying devices for the employees and help employees to use their own devices to improve their efficiency at work and in turn improving the efficiency of the Supply Chain

Published in: Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
274
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Empirical Research: Supply Chain and BYOD – Hand in Hand for the Future

  1. 1. Supply Chain Management & BYOD…Hand In Hand For Future Growth.Rahul Bansal FT 13460Saket Sharma FT 13468Great Lakes Institute of Management, Chennai Great Lakes Institute of Management, Chennai
  2. 2. Supply Chain Management & BYOD…Hand in Hand for future growth.AbstractSupply Chain today is one of the major areas for differentiation between vendors fortheirrespective customers. The most effective supply chains try to reduce costs andincrease efficiency, although investment from the vendor also increases.Most of the people today buy smartphones to enjoy the various benefits of the Internetas well as the various applications that have been developed to make their experiencepleasurable. BYOD or Bring Your Own Device helps industries in reducing theirinvestments and help employees to use their own devices to improve their efficiency atwork and in turn improving the efficiency of the Supply Chain.Since all the data will be transferred from the company Wi-Fi network / Data Network,the inventory levels can also be controlled irrespective of the location of the responsiblepersonnel.The benefits of BYOD are as follows: - Helps reduction in Capital Costs and hence reductionof Over-Heads. No training required on new devices as the employee is well versed with their own device. Image 1 Great Lakes Institute of Management, Chennai
  3. 3. The benefits of BYOD in SCM are asfollows: - Easier Traceability. Improves efficiency. Cost Cutter, Revenue Growth. Faster, better and on-time communication. Image 2Academic Guide: Mr S. Ramanathan - +91 9176643039 - (Email Id: ram1951@hotmail.com)Focus Company: WABCO INDIA LIMITED - Mr M. S. Ravi Kumar Phone Number: +91 9840270205 - (Email ID: RaviKumar.MS@wabco-auto.com) Deloitte Touché Tohmatsu India Private Limited Accenture IndiaKey words:Supply Chain Management, Bring Your Own Device (BYOD), IT Innovation,Firm Performance, Inventory, Empirical Research, Manufacturing Industry. Great Lakes Institute of Management, Chennai
  4. 4. IntroductionSupply Chain and Supply Chain ManagementChristopher (1998) during his research defines Supply Chain management as themanagement of Upstream and Downstream relationships in order to deliver superiorcustomer value at a lesser cost to the Supply Chain. In their work, Croxton et al (2001)then suggested that the following activities need to be defined prior to the orderfulfillment process: Generating, Communicating, Entering, Processing, Picking anddelivering customer orders.For any Supply Management to function effectively, the following entities have to workin cordial relations: - •For Raw Supplier Material, Labor & Other Services •For conversion of Raw material into final Manufacturer products using labor and other services. •Helping the manufacturer distribute his produce to Distributor the reach of the end customer. •The medium through Retailer which the distributors reach the customers. Diagram 1The flow of information and money goes from through the opposite route i.e., from thecustomers to the retailers and through the distributors reaching the manufacturer whothen repay their suppliers. Great Lakes Institute of Management, Chennai
  5. 5. Since there is a feedback circuit that is in place and relates the customer directly to themanufacturer, this area has become one of the most studied area by the academicians.Be it with the perspective of designing the model for Supply Chain or even trying toimprove the customer delight with the help of Supply chains. This has also led todifferent academicians defining Supply chains in their own words. Few of the definitionsthat we have used to leverage our study on the development of Supply Chains (SC) andSupply Chain Management (SCM) is as under:As defined by Benita M Beamon (1998), a Supply Chain is an integrated manufacturingprocess where the raw materials are converted into final products before they aredelivered to the customers.Wikipedia defines SCM as; it is management of a network ofinterconnected businesses involved in the provision of product and service packagesrequired by the end customers in a supply chain. Supply chain management recordsmovement and storage of raw materials, WIP inventory, and finished goods frommanufacturer to end customer.Council for Supply Chain Management Professionals or CSCMP’s defines Supply ChainManagement as the process that comprehensively includes all activities relating toprocurement, conversion and logistics.Importantly, it requires channel partners to collaborate and coordinate. The channelpartners as mentioned above could be the intermediaries, suppliers, third party serviceproviders, or even customers. In essence, it integrates the supply and demand withinand across companies.In their work, Gunasekaran et al. (2001) identified outsourcing as an important trendpresent in industry. Indeed, outsourcing is becoming one of the main strategies adoptedby organizations that find it increasingly difficult and less economical to produce theirneeds on their own. The authors emphasized that the ever-increasing trends inglobalization and customer responsiveness demand logistics-sensitive organizations.Reduction of time to market, switching from mass production to mass customizationand compression of product life cycles are trends forcing permanent changes to the waycompanies do business. Business drivers affecting supply chain management policies insectors such as retailing and manufacturing include: Cost management including cost reduction and efficiency (Mehta, 2004; Olhager and Selldin, 2004); Great Lakes Institute of Management, Chennai
  6. 6. Fluctuations in customer needs (Coronado et al., 2002); Unpredictable yet new business opportunities (Gunasekaran et al., 2001); Environmental sustainability (Turkay et al., 2004); Adoption of IT resources (Ho and Lin, 2004); Adoption of manufacturing technology (Khouja and Kumar, 2002); Performance and Stabilization (Bullinger et al., 2002; Chan, 2003); Reduction or complete elimination of waste in business operations (Mason- Jones et al., 2000); and Slim profit margins (Munson et al., 2003).For SCM implementation, developing a long-term relationship within the chain links isthe prerequisite for success. In order to alleviate conflict or any understanding betweenthe links, it is essential to set confirmed goals for all members of the supply chain at thevery beginning.The notion of Supply Chain management as used in many research findings is usuallylinked with the globalization of manufacturing and the tendency for manufacturers tosource their inputs, which requires management of profitable ways of regulatingworldwide flows of inputs or outputs. The principal focus of market competition in suchsituations is not only between goods, but also between the Supply Chains delivering thegoods, suggests Assey Mbang Janvier-James (2011).The aim of supply chain management is to establish a link between the entireproduction and distribution channels of a product or service in order to satisfy customerneeds and requirements. Such requirements include product quality, price, product line,order fill rate, order cycle time, order/shipment information, and frequency of delivery(Tracey, 1997). Thus, members of the supply chain network must maintain and sustaincustomer-driven culture and offer the right product at the right place at the right timeand at the right prices (Fisher et al., 2000). Great Lakes Institute of Management, Chennai
  7. 7. Information Technology and Supply Chain Image 3The focus of this integration in the context of internet-enabled activities is generallyreferred to as e-SCM. Merging these two fields (SCM and the internet) is a key area ofconcern for contemporary managers and researchers. Managers have realized that theinternet can enhance SCM decision making by providing real-time information andenabling collaboration between trading partners.As mentioned by Ila Manuj, John T. Mentzer (2008), in the supply chain industry, thereare many different types of risk. Risks are all those things that keep you away from theperfect path and perfect outcomes and (you) got to be able to translate (risks) intodollars somehow.David L. Olson, Desheng Dash Wu suggest that strategy such as information sharing andpooling demand, increased flexibility and capability can be employed to improve end-to-end transparency leading to more efficient risk management.Christina W.Y. Wong, Kee-hung Lai, and T.c.e. Cheng suggest that the conceptualizationof information integration revolves around the fundamental notion of developinginformation sharing infrastructure in the Supply Chain with electronic linkages to Great Lakes Institute of Management, Chennai
  8. 8. facilitate timely, accurate, and standardized data exchange across internal and externalorganizational functions.Effective information sharing is considered as one of the most basic capabilities of thesupply chain process, information shared in interactive systems and supply chain isincluding information between direct partners and also in the entire supply chainnetwork. Effective information sharing is considered as one of the most basiccapabilities of the supply chain process (Rahman Seresht and Afsar, 2008).Bring Your Own Device (BYOD)Two very different, but interrelated phenomena have been occurring over the lastdecade. The first is commonly referred to as the “Consumerization of InformationTechnology.” The second is the diminishing difference between work life and personallife experienced by many employees of the organization. The result of this is the growthof BYOD of Bring Your Own Device.As mentioned by Zielinski, Dave (HRMagazine, 2012), BYOD or Bring Your Own Device,began with a simple question posed by frustrated employees: "Why is the laptop orsmart phone I use at home so much better than what I have in the workplace?" Today,fueled by the growing popularity of Apples iPad and iPhone, more organizations areallowing workers-beyond just the executive and information technology staffs-to usepersonal mobile devices at work.“New technologies and new implementations of existing technologies, such as mobiledevices, exploded, Bring your own device [BYOD] has exploded. People want to beconnected everywhere.” says Seth Shestack, associate director of information securityat Temple University, in Philadelphia (CIO Digest, July 2011 Page 34).Supply Chain Management and Information Technology, Bring Your Own DeviceThe flow diagram for the Supply Chainhas been mentioned below for Supplierreference and easy explanation of themanagement of the chain. As we allknow, each and every link in the chain is Manufactureras important as the previous and thenext one. If any link in the chain falls Distributorshort of perfect, the chain can be adisaster and cannot be managedefficiently. Retailer Diagram 2 Great Lakes Institute of Management, Chennai
  9. 9. Though the above chain we realize that the Retailer is as important as the Supplier orthe manufacturer or the distributor. Most executives today, view globalization as asource of competitive advantage (Trent and Monczka, 2003).The implementation of BYOD in the above chain can help us leverage the performanceof the chain making each link as strong as the other. For Example, if our suppliers areaware of the stocks availability at our end, it would be very easy for them to replenishtheir stocks and our inventories for a smooth working and non-stop production.Similarly, If the manufacturer is aware of the current / live status of the availability ofthe product at the distributor’s end or even the retailer’s end, it would be easy for us tostart with the production & processing of the raw material in order to feed the endcustomer in time. The above example stated is one of the easiest ways in which anefficient supply chain can be described.The most important aspect of an efficient supply chain which is evident from the aboveexample is the tracking of inventories / stocks at one link before and after your own link.This is generally done today with the help of high end computers systems with heavilyloaded servers with software for ERP, CRM, security systems and various other ITinfrastructure developed by various industries. In spite of the above heavy investmentsdone in the industry, the employee feels left out of the whole process when he issuddenly bombarded with the news of deficient supplies from any supplier.Even though the companies have invested heavily in the above infrastructuredevelopment, the end result leaves employees in not being able to perform to their bestdue to the live data unavailability. To increase the productivity and satisfaction ofemployees the companies/ industries again invested in devices like Blackberry® whichhelps them to keep in touch with each other through mails. But yet again this strategyimplemented by the companies led to higher level of investment and dissatisfactionamongst its employees, as most of them needed time to get accustomed to the devices.This also led to the thought "Why is the laptop or smart phone I use at home so muchbetter than what I have in the workplace?” Zielinski, Dave (HRMagazine, 2012). Great Lakes Institute of Management, Chennai
  10. 10. Image 4To overcome the same, most of the companies have now implemented the BYODstrategy or the Bring Your Own Device policy. This policy defines the requirement of thedevice by an employee that shall be then re-configured to the Companies personalnetwork giving access to the employees with real-time data across various links of theSupply Chain. Since the employee as opposed to the earlier situation of company givingthe device now selects the device, the employee is more confident and efficient whileworking.To understand the causative factors that may reinforce employee attitudes andbehaviors, Herzberg et al. (1959), in his classical work, suggests, “Workers can be askedto indicate spontaneously what they like or dislike about their jobs. An analysis of thesecomments would reveal the existence of some of the factors listed. Their relativeimportance can be deduced either by the frequency with which they are given by theworkers or by some method of weighting the vigour of like or dislike” (pp. 6-7). Great Lakes Institute of Management, Chennai
  11. 11. Image 5The companies have now been able to reduce their IT Capital costs as the devices forworking are now bought by the employees rather than picking it up from the ITdepartment. Though this has considerably increased the risk of data theft, many companies such as Littler, an Employer and Labor Law Solutions provider, have also come up with the LITTLER strategy or the Lead, Inspect, Teach, Train, Launch, Examine and Report Strategy. Image 6 Great Lakes Institute of Management, Chennai
  12. 12. Method Marketing research is the systematic and objective identification, collection,analysis, dissemination, and use of information for the purpose of assistingmanagement in decision making related to identification and solution of problems andopportunities. It consists of six steps that define the tasks to be accomplished inconducting a marketing research study. We tested the benefits of implementing BYOD in Supply Chain. In defining thisproblem, we had considered the purpose of the study, the relevant backgroundinformation, the information needed and how it had been used in decision-making. Wediscussed with the decision makers, took interviews with industry experts, and perhaps,some qualitative research. After the problem had been identified, research design formulation is done. It isa blueprint or a framework for conducting the marketing research project. Researchdesign is of two types. Since, we do not need to determine any cause and effectrelationships, we will not go for causal research. We would conduct exploratoryresearch, precisely defined the variable and also designed appropriate scales to measurethem. Market Research data is of two types – Primary Data and Secondary Data.Primary data may be qualitative or quantitative. The objective of qualitative research isto gain a qualitative understanding of the underlying reasons and motivations. But theobjective of this research is to quantify the data and generalize the results from thesample to the population of interest. Hence, we would be doing Quantitative analysis ofthe data. To consider a set of respondents for the data, we choose employees of WABCOIndia Limited from different departments such as Sourcing & Procurement, Production,Quality, Sales, Stores and Logistics. To obtain information from these respondents, wehad formalized a set of questions in the form of a questionnaire. A questionnaire helpsto minimize the response error and it also uplifts, motivates and encourages therespondents to become involved in the interview. A questionnaire containing constructs with multiple items is devised to measurethe identified variables in agreeable scales. The scale used in our research is onlynominal scale. The survey responses wereanalyzed through SPSS.Reliability Factor In statistics, Cronbachs α (alpha) is a coefficient of reliability, named after by LeeCronbach. It is commonly used as a measure of the internal consistency or reliability ofa psychometric test score for a sample of examinees. The reliability score of each scale will be taken and the score would be above thedesired value of 0.60. The scales, which fail to deliver the optimum Cronbach’s Alpha,will be omitted from the final test statistics. After finalizing the scales for the SPSS, then we would do a correlation check onthe data set obtained from the survey. After collating the data, we would do the One- Great Lakes Institute of Management, Chennai
  13. 13. way ANOVA to find the significance of the variables that we have considered. By findingthe values of significance <0.05, we would accordingly accept or reject the hypothesis. When examining the differences in the mean values of the dependent variablerelated to the effect of the controlled independent variables, this analysis will concludeour postulates and would clearly give us a picture of whether the independent variablesare significant on the dependent variables or not.Hypothesis Postulated: Hypothesis 1 (H0): BYOD does not increase the risk of Security Breaches. Hypothesis 2 (H1): BYOD reduces capital costs in industries. Hypothesis 3 (H2):BYOD increases employee satisfaction.Variables: Independent Variables: Cost, Employee Satisfaction, Security Risk Dependent Variables: Revenue, Working Efficiency, Risk ManagementCorrelation We have created one null Hypothesis and two Hypotheses to test the constructs.To test the significance of the constructs, we will be analyzing the Variance (ANOVA). Itis used to measure how much the dependent variable varies within a group related todifferences.Results The data collected from WABCO Limited consists of 133 samples. Using theQuestionnaire, we created constructs by combining various questions. The constructsare as follows: - BYOD 1. Are you satisfied with the device provided by the company 2. Using my Personal Device at work, I will EFFICIENCY 1. I were given a choice by the company to use my own device at work, I think that my Productivity 2. I were given a choice by the company to use my own device at work, I think that my effectiveness in decision making 3. Would you support the BYOD Program at your place of work 4. I am okay with the company downloading software in my personal device 5. What percentage of hours/ week you use your own device during work hours 6. What percentage of hours/ week you use your own device after work hours COST 1. How much am I willing to spend on my personal Mobile? Great Lakes Institute of Management, Chennai
  14. 14. 2. How much am I willing to spend on my personal Laptop? SECURITY 1. I am not looking for refund If I am allowed to use my own device at work 2. I trust the IT department of my company to secure all the devices HAPPINESS 1. I am worried that using my device at work could release my personal data in the company network. 2. If I bring my own device, I believe the cost to the company. 3. I believe employees will use the company data against the company. For Regression, the Independent Construct is BYOD and the DependentConstructs considered are EFFICIENCY, COST, SECURITY, and HAPPINESS. After doing theanalytic treatment, weanalyzed that the entire hypothesis was significant.All the hypotheses that were assumed were absolutely in line with the regression resultsthat were received.DEPENDENT INDEPENDENT R – SQUARE ANOVAEFFICIENCY BYOD .600 SignificanceCOST BYOD .697 SignificanceSECURITY BYOD .772 SignificanceHAPPINESS BYOD .401 SignificanceDiscussionThe implication of the research on future growth of Supply Chain and BYOD has beenestablished quantitatively. The results indicate the importance of the concept of BYODused in order to enhance the capability of regular Supply Chains. Supply ChainManagement is the differentiating factor for any industry today. As budgets continue totighten, initiatives like BYOD become more and more appealing to the companies. Thisin-turn will help the industries to cater to global needs effectively. The use of owndevices will help them engage more productively in their daily work. The concern ofsecurity breaches that were raised during the inception of the BYOD concept have beenwell managed by the respective IT departments. This has enabled the users to moveforward with integration of their devices to the company infrastructure.The research initially was based on variables like Cost, Security and Efficiency. However,while working closely with the industry we found that Happiness was also one of the Great Lakes Institute of Management, Chennai
  15. 15. reasons for implementing BYOD. This shows us that the companies today not only focuson the requirements of their clients but also make sure that the employees are happy inthe new culture while new technologies are being implemented.The limitations of this research are as follows: 1. The respondents could be novice in terms of the emerging concepts used in the survey. 2. Survey is also limited in terms of the restriction to a single business unit of a big group of WABCO Ltd. 3. The business unit was working on the concept of BYOD and has not completely implemented this in their daily working. This hides the response of BYOD to Guest Access and Security Zoning. 4. BYOD is only one part of the solution as the systems become more complex so do the work-place.Future research in this regard could explore the possibilities of establishing therelationship between centrally coordinated IT Infrastructure of Global Business Unit andconcept of BYOD applicable to the devices of the employees. This will be of help insituation where we need to study a market or client behavior. In addition to the currentresearch, further research can be extended in the areas of BYO mentality. As of nowprogress has already been made in the areas of Bring Your Own Service (BYOS) andBring Your Own Applications (BYOA). Great Lakes Institute of Management, Chennai
  16. 16. List of References A New Introduction to Supply Chains and Supply Chain Management: Definitions and Theories Perspective Assey Mbang Janvier-James (October 2011). Automotive supply chain models and technologies: a review of some latest developments Adrian E. Coronado Mondragon, Andrew C. Lyons, Zenon Michaelides and Dennis F. Kehoe, The University of Liverpool Management School, Liverpool, UK (2002). Benita M Beamon 1998, Supply Chain Design and Analysis: Models and Methods Bullinger, H., Kuhner, M. and Van Hoof, A. (2002), “Analysing supply chain performance using a balanced measurement method”, International Journal of Production Research, Vol. 0 No. 15, pp. 3533-43. Christina W.Y. Wong, Kee-hung Lai, and T.c.e. Cheng, Value of Information Integration to Supply Chain Management: Roles of Internal and External Contingencies. Christopher, M. (1998), Logistics & Supply Chain Management: Strategies for Reducing Cost and Improving Service, Financial Times Pitman Publishing, London. Council for Supply Chain Management Professionals, available online - http://cscmp.org/aboutcscmp/definitions.asp. Cristina Giménez, Helena R. Lourenço, (2008),"e-SCM: internets impact on supply chain processes", The International Journal of Logistics Management, Vol. 19 Iss: 3 pp. 309 – 343. Cristina Giménez, Helena R. Lourenço, (2008),"e-SCM: internets impact on supply chain processes", The International Journal of Logistics Management, Vol. 19 Iss: 3 pp. 309 – 343. Croxton, K.L., Garcı´a-Dastugue, S.J., Lambert, D.M. and Rogers, D.S. (2001), “The supply chain management processes”, The International Journal of Logistics Management, Vol. 12 No. 2, pp. 13-36. Fisher, M.L., Raman, A. and McClelland, A.S. (2000), Rocket science retailing is almost here - are you ready? , Harvard Business Review, July-August, pp. 115-24. Gunasekaran, A., Patel, C. and Tirtiroglu, E. (2001), “Performance measurement and benchmarking in manufacturing”, International Journal of Operations & Production Management, Vol. 21 Nos 1/2, pp. 71-87. Herzberg, F., Mausner, B. and Snyderman, B. (1959), The Motivation to Work, Wiley, New York, NY. Ho, L. and Lin, G. (2004), “Critical success factor framework for the implementation of integrated-enterprise systems in the manufacturing environment”, International Journal of Production Research, Vol. 42 No. 17, pp. 3731-42. Great Lakes Institute of Management, Chennai
  17. 17. Ila Manuj, John T. Mentzer, (2008),"Global supply chain risk managementstrategies", International Journal of Physical Distribution & LogisticsManagement, Vol. 38 Iss: 3 pp. 192 – 223.Image 1 : http://www.indianjournals.com/glogift2k6/glogift2k6-1-1/theme_1/Article%2018.htmImage 2: http://www.networkworld.com/community/node/28342Image 3: http://www.networkworld.com/community/node/28342Image 4: http://blogs.t-systems.de/mws/2012/02/19/byod-bring-your-own-device/Jendy P.F. Leung, K.S. Chin, "An AHP Based Study on Critical Success Factors forthe Supply Chain Management in Hong Kong Manufacturing Industry", AsianJournal on Quality, Vol. 5 Iss: 2 pp. 132 - 140David L. Olson, Desheng Dash Wu,(2010),"A review of enterprise risk management in supply chain", Kybernetes,Vol. 39 Iss: 5 pp. 694 – 706.Khouja, M. and Kumar, R. (2002), “Information technology investments andvolume-flexibility in production systems”, International Journal of ProductionResearch, Vol. 40 No. 1, pp. 205-21.Mason-Jones, R., Naylor, B. and Towill, D. (2000), “Lean, agile or leagile?Matching your supply chain to the marketplace”, International Journal ofProduction Research, Vol. 38 No. 17, pp. 4061-70.Mehta, J. (2004), “Supply chain management in a global economy”, Total QualityManagement & Business Excellence, Vol. 15 Nos 5/6, pp. 841-8.Munson, C., Hu, J. and Rosenblatt, M. (2003), “Teaching the costs ofuncoordinated supply chains”, Interfaces, Vol. 33 No. 3, pp. 24-39.Rahman Seresht and Afsar (2008). The effect of information Sharing oncompetitive strategy and supply chain performance, Iranian journal ofinformation technology.1, pp37-48.Tracey, M. (1997), Logistics/purchasing effectiveness, manufacturingperformance: instrument development and causal model analysis , EmergingIssues in Purchasing and Management, Vol 1, pp. 133-49.Supply Chain.Trent, R.J. and Monczka, R.M. (2003), “Understanding integrated globalsourcing”, International Journal of Physical Distribution & Logistics Management,Vol. 33 No. 7, pp. 607-29.Turkay, M., Oruc, C., Fujita, K. and Asakura, T. (2004), “Multi-companycollaborative supply chain management with Economical and environmentalconsiderations”, Computers & Chemical Engineering, Vol. 28 Nos 6-7, pp. 985-92.Wikipedia, Available Online -http://en.wikipedia.org/wiki/Supply_chain_management Great Lakes Institute of Management, Chennai
  18. 18. Zielinski, Dave (HRMagazine, 2012) available onlinehttp://search.proquest.com/docview/920318322/1394829F8C66F761A73/2?accountid=32499. Great Lakes Institute of Management, Chennai
  19. 19. Annexure 1Questionnaire Do you use company devices for personal use1 1 YES 2 NO Are you satisfied with the device provided by the company 1 HIGHLY DISSATISFIED 2 DISSATISFIED2 3 NEUTRAL 4 SATISFIED 5 HIGHLY SATISFIED Using my Personal Device at work, I will be 1 HIGHLY DISSATISFIED 2 DISSATISFIED3 3 NEUTRAL 4 SATISFIED 5 HIGHLY SATISFIED I were given a choice by the company to use my own device at work , I think that my Productivity will 1 HIGHLY DISSATISFIED4 2 DISSATISFIED 3 NEUTRAL 4 SATISFIED 5 HIGHLY SATISFIED I were given a choice by the company to use my own device at work , I think that my effectiveness in decision making would 1 HIGHLY DISSATISFIED5 2 DISSATISFIED 3 NEUTRAL 4 SATISFIED 5 HIGHLY SATISFIED Would you support the BYOD Program at your place of work 1 HIGHLY DISAGREE 2 SOMEWHAT DISAGREE6 3 NEUTRAL 4 SOMEWHAT AGREE 5 HIGHLY AGREE I am okay with the company downloading software in my personal device7 1 HIGHLY DISAGREE Great Lakes Institute of Management, Chennai
  20. 20. 2 SOMEWHAT DISAGREE 3 NEUTRAL 4 SOMEWHAT AGREE 5 HIGHLY AGREE What percentage of hours/ week you use your own device during work hours 1 0% - 10% 2 10% - 30%8 3 30% - 50% 4 50% - 70% 5 70% - 100% What percentage of hours/ week you use your own device after work hours 1 0% - 10% 2 10% - 30%9 3 30% - 50% 4 50% - 70% 5 70% - 100% If I bring my own device, I believe the cost to the company 1 HIGHLY DECREASE 2 SOMEWHAT DECREASE10 3 NEUTRAL 4 SOMEWHAT INCREASE 5 HIGHLY INCREASE I am not looking for refund If I am allowed to use my own device at work 1 HIGHLY DISAGREE 2 SOMEWHAT DISAGREE11 3 NEUTRAL 4 SOMEWHAT AGREE 5 HIGHLY AGREE How much am I willing to spend on my personal Mobile 1 Rs 0.00 - Rs 5000.00 2 Rs 5000.00 - Rs. 7500.0012 3 Rs.7500.00 - 10000.00 4 Rs. 10000.00 - Rs. 12500.00 5 More than Rs. 12500.00 How much am I willing to spend on my personal Laptop 1 Rs. 0.00 - Rs. 20000.0013 2 Rs. 20000.00 - Rs. 25000.00 3 Rs. 25000.00 - Rs. 30000.00 4 Rs. 30000.00 - Rs. 35000.00 Great Lakes Institute of Management, Chennai
  21. 21. 5 More than Rs. 35000.00 I believe employees will use the company data against the company 1 HIGHLY DISAGREE 2 SOMEWHAT DISAGREE14 3 NEUTRAL 4 SOMEWHAT AGREE 5 HIGHLY AGREE I trust the IT department of my company to secure all the devices 1 HIGHLY DISAGREE 2 SOMEWHAT DISAGREE15 3 NEUTRAL 4 SOMEWHAT AGREE 5 HIGHLY AGREE I am worried that using my device at work could release my personal data in the company network 1 HIGHLY DISAGREE16 2 SOMEWHAT DISAGREE 3 NEUTRAL 4 SOMEWHAT AGREE 5 HIGHLY AGREE Great Lakes Institute of Management, Chennai

×