BYOD
Impact of Bring Your Device (BYOD) at workplace
Historic Timeline and Predecessor Assessment Draft
Aakash Patel
DeVry University
Technology Society and Culture
Paul winters
Impact of Bring Your Device (BYOD) at workplace
Introduction
Today, it's the desire of everybody to own a device such as a tablet which is considered convenient in the current setup. A device such as a table is similar to a mobile computer such as a laptop which is easier to carry and more discrete. It can also use 3G internet from most places, unlike a laptop. The only disadvantage of this technology is that it can't be put on your lap, and it has to be held in your hands. It's also difficult to keep the gadget with your hands and at the same time use the same hands to operate it. Touchscreen technology has emerged and has become more common currently than ever before. Almost every device today has this technology implemented in it be it a computer, a mobile phone, televisions or even DVD players. The technology has made it easier to work with these devices in our daily activities. However, the transition from the old version to this newly emergent technology has taken time and has been improving consistently from older versions (Jin, 2014).
Several technologies have led to the emergence of the current technological advancement. Grid computing is among the major technologies that have led to this improvement. Grid computing, which is a form of distributed computing solves a problem by utilizing resources of several networked computers. It's recognized as the predecessor of the current cloud computing. Since time has been available and network workload has considerably decreased, Grid computing utilizes this downtime in combination with its computing power for purposes of scientific research, collaborative projects, etc. that need resources to attain their goals. This, at last, led to using specific software's including Globus Toolkit and Boinc so as to enjoy free resources on computers as well as share information to be processed by computers within the grid. This has improved computations and increased efficiency that has finally led to the current technology hike (Kranzberg & Pursell, 2015).
Other than grid, computing, there are other related technologies with great impacts on the current world we are today. Distributed computing has provided possibilities of running applications on many computers at the same time. Moreover, utility computing as a business model allows resources including storage, computing among others to be provided and charged as well. These have led to the emergence of web services offering computing services dynamically on demand resulting in the evolution of web 2.0 to deliver services to all its users (Jones, 2012). These technologies have provided abstraction as well as isolation of lower functionality from the underlying hardware hence allowing portability and sharing of physical resources. These funds are made available t ...
Separation of Lanthanides/ Lanthanides and Actinides
BYODImpact of Bring Your Device (BYOD) at workplace.docx
1. BYOD
Impact of Bring Your Device (BYOD) at workplace
Historic Timeline and Predecessor Assessment Draft
Aakash Patel
DeVry University
Technology Society and Culture
Paul winters
Impact of Bring Your Device (BYOD) at workplace
Introduction
Today, it's the desire of everybody to own a device such as a
tablet which is considered convenient in the current setup. A
device such as a table is similar to a mobile computer such as a
laptop which is easier to carry and more discrete. It can also use
3G internet from most places, unlike a laptop. The only
disadvantage of this technology is that it can't be put on your
lap, and it has to be held in your hands. It's also difficult to
keep the gadget with your hands and at the same time use the
same hands to operate it. Touchscreen technology has emerged
2. and has become more common currently than ever before.
Almost every device today has this technology implemented in
it be it a computer, a mobile phone, televisions or even DVD
players. The technology has made it easier to work with these
devices in our daily activities. However, the transition from the
old version to this newly emergent technology has taken time
and has been improving consistently from older versions (Jin,
2014).
Several technologies have led to the emergence of the current
technological advancement. Grid computing is among the major
technologies that have led to this improvement. Grid computing,
which is a form of distributed computing solves a problem by
utilizing resources of several networked computers. It's
recognized as the predecessor of the current cloud computing.
Since time has been available and network workload has
considerably decreased, Grid computing utilizes this downtime
in combination with its computing power for purposes of
scientific research, collaborative projects, etc. that need
resources to attain their goals. This, at last, led to using specific
software's including Globus Toolkit and Boinc so as to enjoy
free resources on computers as well as share information to be
processed by computers within the grid. This has improved
computations and increased efficiency that has finally led to the
current technology hike (Kranzberg & Pursell, 2015).
Other than grid, computing, there are other related technologies
with great impacts on the current world we are today.
Distributed computing has provided possibilities of running
applications on many computers at the same time. Moreover,
utility computing as a business model allows resources
including storage, computing among others to be provided and
charged as well. These have led to the emergence of web
services offering computing services dynamically on demand
resulting in the evolution of web 2.0 to deliver services to all its
users (Jones, 2012). These technologies have provided
abstraction as well as isolation of lower functionality from the
underlying hardware hence allowing portability and sharing of
3. physical resources. These funds are made available to many
clients within the same infrastructure making it possible to
share data and remedies in multi-tenant architectures.
Artificial intelligence has major impacts on the current
technological advancement. For a long time, people have made
software's and machines with human attributes which exhibit
greater intelligence. These devices and software's have been
capable of learning, reasoning, perception, planning, knowledge
as well as understanding the natural language processing, as
well as abilities to manipulate and move objects. This is among
the major fields which have profoundly impact today's
technological advancement in conjunction with robotics which
is closely related to AI. This has led to technologies such as
robots, space crafts among others (Jones, 2012).
Conclusion
The significant technology developments seen today have
undergone through several phases with slight changes in each
step leading to the hi-tech world that we live in today. The old
version technology has been critical to this development, and
there is still room for more in the late future.
References
Jin, Z. (2014). Global technological change: from hard
technology to soft technology. Bristol, England; Portland:
Intellect Books.
Jones, S. (2012). Cybersociety 2.0: Revisiting computer-
mediated community and Technology. Thousand Oaks: SAGE
Publications.
Kranzberg, M., & Pursell, C. W. (2015). Technology in Western
Civilization. New York: Oxford Univ. Press.
Jay McCarroll, baby-faced and hoodie-clad, works in the sort of
space you’d expect from a fellow who dreams in fabric. It’s
outfitted with four sewing machines and oceans of material
arranged in brilliant spectral sequence; his spring 2007
collection hangs on a rack in the corner, anchored by a quilt
skirt so audaciously outsize it could easily double as a
4. bedspread. But bedding itself is missing from this studio, as is a
kitchen and a shower, which matters more in this case than it
ordinarily would: Though he’s the first- season winner
of Project Runway, Jay, 32, is still homeless in New York.
“I haven’t been living anywhere for two years,” he says. “I
sleep at other people’s houses. I sleep here if I’m drunk.”
Jay was one of the Bravo network’s first guinea pigs in the
competition reality genre, a brightly imaginative new form that
mixes the more mundane conceits of The Real
World and Survivor with contests involving genuine skill. In
exchange for a few weeks of reality-style exploitation,
contestants have a chance to show the world what they can do—
with a sewing machine, with a pair of scissors, in a kitchen, in
an undecorated room—and in the aftermath find their careers in
full bloom. But the shows, it turns out, are the easy part. “I
have a fucking gazillion e-mails from all over the world from
people asking, Why isn’t your stuff out there?” says Jay. “Yet
financially, I have no way to get them a product because I got
pushed out of a boat and into the ocean, as if, Oh, you can
survive now.”
This isn’t what one would assume, of course. One would assume
he’d be a money magnet after his star turn. Certainly Jay
assumed as much. “You don’t think I took the fucking bus to
New York the day after I won the show, thinking someone was
going to come up to me on the street and say, You’re awesome,
here’s money?” he asks. “I thought that for two years. But I’ve
given up on that.”
Had Bravo not invented Project Runway, Jay would probably
still be back in Lehman, Pennsylvania, where he ran a vintage-
clothing store (before that, he was producing online porn). But
because of the show, Bravo and Bravo watchers expected quite
a bit more from him. Project Runway wasn’t some competition
gimmick like Fear Factor or The Amazing Race, where the
contestants’ skills only served the needs of the show. Jay’s
talents were practical and real, and Bravo gave him a platform
to showcase them. If he couldn’t succeed in the aftermath, why
5. were we watching? Of what use was the show?
That’s pretty much how Jay saw it, too. He’d worked for five
straight months, with zero pay and little sleep, to appear
on Project Runway and create a collection for Bryant Park.
Audiences adored him. The show owed much of its success,
let’s face it, to him. So what did Jay get out of it?
The trouble is, celebrity came easily to Jay. Business did not.On
the show, Jay was wicked and entertaining and cheerfully
provocative, but he hardly had the means, savvy, or professional
temperament to navigate the New York fashion world. (His first
voice-mail message to me, ever:Hey Jen, this is Jay McCarroll
… Um, I am free tonight and all day tomorrow to do this
bullshit. Fucking call me, would you?) “A week after I won the
show, I met with two ladies from Banana Republic at the top of
the Soho House, which is like, big time,” he says. “And they
were like, ‘Oh, we can give you numbers for factories to get
your clothes produced.’ But that was totally not anything like
what I needed. What I needed was someone to sit down with me
and say, Here’s how you start a fashion label.”
Before long, the blogs started to howl that Jay’s work was
nowhere to be seen, and Tim Gunn, the kindly host and soul
of Project Runway, was wondering aloud to the presswhy Jay
hadn’t gained more momentum; he also castigated him for being
a diva.
“My hands have been creatively crippled for two years—all
those fucking eyes on me, reading that I’m a waste on blogs,”
he says. He looks genuinely unhappy now, and younger than his
32 years—a reminder that there’s an enfant in enfant terrible, a
person one feels just as apt to protect as to throttle. “I was just
an artist before this happened,” he adds. “Now I’m an artist
with a fucking clock ticking.”
THE IMPACT OF BRING YOUR DEVICE AT WORKPLACE
BYOD 1
6. THE IMPACT OF BRING YOUR DEVICE AT WORKPLACE
BYOD 3
Technology Society and Culture
Paul Winters
The Impact Of Bring Your Device at Workplace BYOD
Aakash Patel
The Impact Of Bring Your Device at Workplace BYOD
Introduction
BYOD is an information technology policy where
employees are allowed to bring their personal devices to the
workplace. Some of the devices include mobile phones, personal
computers, and other handheld devices that are portable. The
devices are then used to access company systems and data.
Benefits associated with the program
Many businesses have had to keep up with the changing
times and the IT departments struggle to keep up with changing
technological advances. BYOD is part of an ongoing trend that
involves IT based practices aimed at consumerism of
7. technology. The proponents of BYOD term, it as productive as
employees, can access mail at their convenience, therefore,
reducing costs. However if it is not entirely understood it will
threaten the security of the company putting it at risk. The
following is an assessment of the significant benefits and
concerns that are associated with the system.
According to French, Guo and Shim, (2014) BYOD is
thought to improve employee productivity and satisfaction as
they are more likely to be comfortable when using their own
devices. It has been noted that employees are always seeking
flexible work options and the ability to work in remote areas. If
they are allowed to use the same device that they use at home in
the office then, it allows for an easy transition and therefore
enhanced output and efficiency. It is noted that surveys taken in
relevance to employees who use their own devices will feel
more ownership over their work. The policy can be an incentive
that brings about talent in the recruitment efforts. Companies
that embrace BOYD are embraced more positively as they are
thought to have a more innovative, agile and modern culture.
Concerning operating costs, companies are more likely to adopt
the policy as it drives the cost away from them. For example,
the programs shift the costs to the users as workers pay for most
of their voice and data services. A proper consideration is
companies that have a lot of employees who cater for their
individual data and voice call needs thus saving the company a
lot of money that can be allocated elsewhere. Technology is
also always changing and requires an upgrade from time to
time. In a workplace where the employer has to take care of the
upgrade, it would be costly for the enterprise. BOYD devices
usually consist of cutting age devices unlike IT issued ones,
therefore, allowing companies to reap benefits of modern
technology.
Companies that embraced the use of BOYD policy increase
the engagement of workers both in the workplace and after
hours. If the employees are likely to work outside the office,
their responsiveness will be improved when they have the
8. means to communicate outside the office. It means that they are
more available to respond to emails, answer calls and even carry
out daily tasks when outside the office. Despite these benefits,
there are various matters that must be taken into consideration
such as security of company information. In the mobile and
communication world, security threats are imminent which
means that BOYD can be disastrous (Lennon, 2012).
Risks associated with BOYD
According to Raths, (2012) there are significant risks
associated with the policy and it is up to the IT departments to
ensure that information does not end up with the wrong people.
Therefore, security measures are called for when dealing with
the remote devices. Surveys carried out extensive national show
that many senior IT security and technology decision makers
report serious security breaches and violations in relevance to
personal mobile device use. Security threats are related to the
end node problem where devices used by employees are also
used for internet access. There might also be data breaches if an
employee loses their phone and other un-trusted parties retrieve
information and any unsecured data on the phone. There are
also instances where an employee leaves a company and since
the device is personally owned they leave with the data and
company applications. There are also employees who sell their
devices without taking time to wipe company data.
Privacy fears
Employees have privacy concerns that are entirely
justified. Some of the BOYD policies provide employees with
software that track their every move. Workers who agree to the
BOYD program might find themselves accepting software
installations done by the IT department. The programs might be
used to monitor their device usage, collection of personal
information. The IT department might be able to remove
personal data from users’ devices. Most employees have raised
concerns about access to contacts, facebook account data,
installed applications and browser histories. Even when
companies take time to separate personal and business data,
9. there might be discovery requests especially when it comes to
litigations.
Cost to the employees and device disparities.
As noted earlier on the costs of the BOYD are transferred to the
employee. However, not everyone has a device that can be used
in the program. It is therefore quite demanding when one is told
that they should get a device such as an iPhone or a laptop.
There are also risks such as damage to the device that can’t be
attributed to the employer. In this case, the employees are not
quite happy to shoulder the costs. It is also evident that when
employees are allowed to select their own devices they might
bring different devices with distinct capabilities. It 's hard for
programmers to cover various platforms that are brought to
work but more often they still manage to do so.
It is, therefore, evident that various considerations have to
be taken to ensure that the process is successful. If employees
are more technologically driven and have high-quality devices
hen, it might be good to adopt BOYD. Employees should also
know the stand of the company especially when it comes to
access to personal information. Legal matters are inevitable,
and these matters are of concern to employees. Informing them
in advance might serve well to increase their productivity and
ensure protection of data (Ghosh et al., 2013).
Conclusion
BOYD policies have been very useful and practical when it
comes to the benefits that are accrued. However, the threats to
security and cost are a threat to the advancement of the program
in the United States. Most companies that appreciated the
method earlier on are now considering alternatives due to
security breaches that have been experienced in the past.
Employees are nowadays aware of security threats, and if more
companies choose to take up the policy, it will be easier to
protect data and information. Policy issues when implementing
the program are imperative, and companies have to ensure that
the right measures are taken to account.
10. References
Ghosh, A., Gajar, P. K., & Rai, S. (2013). Bring your own
device (BYOD): Security risks and mitigating strategies.
Journal of Global Research in Computer Science, 4(4), 62-70.
Raths, D. (2012). Are You Ready for BYOD: Advice from the
Trenches on How to Prepare Your Wireless Network for the
Bring-Your-Own-Device Movement. THE Journal
(Technological Horizons In Education), 39(4), 28.
Lennon, R. G. (2012). Bring your own device (BYOD) with
cloud 4 education. In Proceedings of the 3rd annual conference
on Systems, programming, and applications: software for
humanity (pp. 171-180). ACM.
French, A. M., Guo, C., & Shim, J. P. (2014). Current status,
issues, and future of bring your own device (BYOD).
Communications of the Association for Information Systems,
35(10), 191-197.
Running head: ETHICAL CONSIDERATION 1
ETHICAL CONSIDERATION 2
11. Ethical Consideration
DeVry University
Paul Winters
Technology Society and Culture
Aakash Patel
Ethical Consideration
A detailed evaluation of the ethical considerations associated
with the technology in relation to its impact on humanity
Most people agree that technology is one of the most important
aspects of human lives. With considerations of humanity and
ethics, technology has a great impact. Humanity is the ability of
human beings to reason and thinks before they involve in any
form of action on anything. It is what separates human beings
from machines like computers and robots, which are
programmed to involve in a certain course of action and respond
to certain situations. The impact that technology has is both
positive and negative.
To begin with, it is through education that people have managed
to highly acquire education concerning ethics. Organizations
that have demonstrated the need for ethics has been set up on
technological grounds. A company like Apple Inc., for example,
is among the many organizations that explain about the
necessity of ethics in the workplace, and personal ethics of
every individual and its total existence is mainly because of
technological existence. Technology has therefore made a
positive contribution towards ethics of human beings and
promoted humanity.
Technology, on the other hand, has also caused a great negative
impact on humanity and ethics. To begin with, certain
12. individuals like hackers, who have mastered numerous
technological skills have been tempted by technology to commit
crimes that are against humanity and ethical grounds and have
made the decisions to involve in them. These involve the many
inhuman terrorist actions that have taken place being aided by
technology for efficiency. At the same time, it has also cause
peoples’ everyday lives to change, simply because they expect
perfection from other people like the machines that they work
with all the time. It has depleted issues like patience, and thus
some people expect other to respond to their demands and
requirements immediately. Technology has therefore had both
positive and negative effects on people’s humanity and ethics.
An illustration of at least two specific ethical theories that
differentiates their varying approaches in consideration of the
questions raised by the selected technology
There are many theories that technology has fully affected
in a certain way. The figure below fully explains a number of
these theories.
As shown in the visual presentation, one of the ethical theories
that technology has a great impact upon is the theory of virtual
ethics. Virtual ethics is a form of guiding theories that explains
that the behavior of an individual relies on certain virtues that
they have and what they believe is right. Technology has
changed the belief of people from what they used to be before.
It has done this through its ability to enable people to socialize
with others. When people view other individuals through certain
platforms like social media, they acquire new virtual and
beliefs. People, for example, might believe that dressing in a
certain way is right, simply because they saw other individuals
who might be practicing different cultures dressing similarly.
The other theory that technology has affected is
consequentialism. This theory as described in the visual
presentation explains that the best action that an individual
should involve in is the one that provides the greater good. With
technology, however, people can involve in actions that affect
13. areas that may be geographically far away from them, and do it
in certain ways that the actions cannot be traced to them. When
these individuals do not care much about others, therefore, they
might involve in these forms of actions and believe that they are
ethical since, despite the harm they may do to others, they
would still benefit greatly from them (Broad, 2014).
References
Broad, C. (2014). Five types of ethical theory. London:
Routledge.