SlideShare a Scribd company logo
1 of 13
BYOD
Impact of Bring Your Device (BYOD) at workplace
Historic Timeline and Predecessor Assessment Draft
Aakash Patel
DeVry University
Technology Society and Culture
Paul winters
Impact of Bring Your Device (BYOD) at workplace
Introduction
Today, it's the desire of everybody to own a device such as a
tablet which is considered convenient in the current setup. A
device such as a table is similar to a mobile computer such as a
laptop which is easier to carry and more discrete. It can also use
3G internet from most places, unlike a laptop. The only
disadvantage of this technology is that it can't be put on your
lap, and it has to be held in your hands. It's also difficult to
keep the gadget with your hands and at the same time use the
same hands to operate it. Touchscreen technology has emerged
and has become more common currently than ever before.
Almost every device today has this technology implemented in
it be it a computer, a mobile phone, televisions or even DVD
players. The technology has made it easier to work with these
devices in our daily activities. However, the transition from the
old version to this newly emergent technology has taken time
and has been improving consistently from older versions (Jin,
2014).
Several technologies have led to the emergence of the current
technological advancement. Grid computing is among the major
technologies that have led to this improvement. Grid computing,
which is a form of distributed computing solves a problem by
utilizing resources of several networked computers. It's
recognized as the predecessor of the current cloud computing.
Since time has been available and network workload has
considerably decreased, Grid computing utilizes this downtime
in combination with its computing power for purposes of
scientific research, collaborative projects, etc. that need
resources to attain their goals. This, at last, led to using specific
software's including Globus Toolkit and Boinc so as to enjoy
free resources on computers as well as share information to be
processed by computers within the grid. This has improved
computations and increased efficiency that has finally led to the
current technology hike (Kranzberg & Pursell, 2015).
Other than grid, computing, there are other related technologies
with great impacts on the current world we are today.
Distributed computing has provided possibilities of running
applications on many computers at the same time. Moreover,
utility computing as a business model allows resources
including storage, computing among others to be provided and
charged as well. These have led to the emergence of web
services offering computing services dynamically on demand
resulting in the evolution of web 2.0 to deliver services to all its
users (Jones, 2012). These technologies have provided
abstraction as well as isolation of lower functionality from the
underlying hardware hence allowing portability and sharing of
physical resources. These funds are made available to many
clients within the same infrastructure making it possible to
share data and remedies in multi-tenant architectures.
Artificial intelligence has major impacts on the current
technological advancement. For a long time, people have made
software's and machines with human attributes which exhibit
greater intelligence. These devices and software's have been
capable of learning, reasoning, perception, planning, knowledge
as well as understanding the natural language processing, as
well as abilities to manipulate and move objects. This is among
the major fields which have profoundly impact today's
technological advancement in conjunction with robotics which
is closely related to AI. This has led to technologies such as
robots, space crafts among others (Jones, 2012).
Conclusion
The significant technology developments seen today have
undergone through several phases with slight changes in each
step leading to the hi-tech world that we live in today. The old
version technology has been critical to this development, and
there is still room for more in the late future.
References
Jin, Z. (2014). Global technological change: from hard
technology to soft technology. Bristol, England; Portland:
Intellect Books.
Jones, S. (2012). Cybersociety 2.0: Revisiting computer-
mediated community and Technology. Thousand Oaks: SAGE
Publications.
Kranzberg, M., & Pursell, C. W. (2015). Technology in Western
Civilization. New York: Oxford Univ. Press.
Jay McCarroll, baby-faced and hoodie-clad, works in the sort of
space you’d expect from a fellow who dreams in fabric. It’s
outfitted with four sewing machines and oceans of material
arranged in brilliant spectral sequence; his spring 2007
collection hangs on a rack in the corner, anchored by a quilt
skirt so audaciously outsize it could easily double as a
bedspread. But bedding itself is missing from this studio, as is a
kitchen and a shower, which matters more in this case than it
ordinarily would: Though he’s the first- season winner
of Project Runway, Jay, 32, is still homeless in New York.
“I haven’t been living anywhere for two years,” he says. “I
sleep at other people’s houses. I sleep here if I’m drunk.”
Jay was one of the Bravo network’s first guinea pigs in the
competition reality genre, a brightly imaginative new form that
mixes the more mundane conceits of The Real
World and Survivor with contests involving genuine skill. In
exchange for a few weeks of reality-style exploitation,
contestants have a chance to show the world what they can do—
with a sewing machine, with a pair of scissors, in a kitchen, in
an undecorated room—and in the aftermath find their careers in
full bloom. But the shows, it turns out, are the easy part. “I
have a fucking gazillion e-mails from all over the world from
people asking, Why isn’t your stuff out there?” says Jay. “Yet
financially, I have no way to get them a product because I got
pushed out of a boat and into the ocean, as if, Oh, you can
survive now.”
This isn’t what one would assume, of course. One would assume
he’d be a money magnet after his star turn. Certainly Jay
assumed as much. “You don’t think I took the fucking bus to
New York the day after I won the show, thinking someone was
going to come up to me on the street and say, You’re awesome,
here’s money?” he asks. “I thought that for two years. But I’ve
given up on that.”
Had Bravo not invented Project Runway, Jay would probably
still be back in Lehman, Pennsylvania, where he ran a vintage-
clothing store (before that, he was producing online porn). But
because of the show, Bravo and Bravo watchers expected quite
a bit more from him. Project Runway wasn’t some competition
gimmick like Fear Factor or The Amazing Race, where the
contestants’ skills only served the needs of the show. Jay’s
talents were practical and real, and Bravo gave him a platform
to showcase them. If he couldn’t succeed in the aftermath, why
were we watching? Of what use was the show?
That’s pretty much how Jay saw it, too. He’d worked for five
straight months, with zero pay and little sleep, to appear
on Project Runway and create a collection for Bryant Park.
Audiences adored him. The show owed much of its success,
let’s face it, to him. So what did Jay get out of it?
The trouble is, celebrity came easily to Jay. Business did not.On
the show, Jay was wicked and entertaining and cheerfully
provocative, but he hardly had the means, savvy, or professional
temperament to navigate the New York fashion world. (His first
voice-mail message to me, ever:Hey Jen, this is Jay McCarroll
… Um, I am free tonight and all day tomorrow to do this
bullshit. Fucking call me, would you?) “A week after I won the
show, I met with two ladies from Banana Republic at the top of
the Soho House, which is like, big time,” he says. “And they
were like, ‘Oh, we can give you numbers for factories to get
your clothes produced.’ But that was totally not anything like
what I needed. What I needed was someone to sit down with me
and say, Here’s how you start a fashion label.”
Before long, the blogs started to howl that Jay’s work was
nowhere to be seen, and Tim Gunn, the kindly host and soul
of Project Runway, was wondering aloud to the presswhy Jay
hadn’t gained more momentum; he also castigated him for being
a diva.
“My hands have been creatively crippled for two years—all
those fucking eyes on me, reading that I’m a waste on blogs,”
he says. He looks genuinely unhappy now, and younger than his
32 years—a reminder that there’s an enfant in enfant terrible, a
person one feels just as apt to protect as to throttle. “I was just
an artist before this happened,” he adds. “Now I’m an artist
with a fucking clock ticking.”
THE IMPACT OF BRING YOUR DEVICE AT WORKPLACE
BYOD 1
THE IMPACT OF BRING YOUR DEVICE AT WORKPLACE
BYOD 3
Technology Society and Culture
Paul Winters
The Impact Of Bring Your Device at Workplace BYOD
Aakash Patel
The Impact Of Bring Your Device at Workplace BYOD
Introduction
BYOD is an information technology policy where
employees are allowed to bring their personal devices to the
workplace. Some of the devices include mobile phones, personal
computers, and other handheld devices that are portable. The
devices are then used to access company systems and data.
Benefits associated with the program
Many businesses have had to keep up with the changing
times and the IT departments struggle to keep up with changing
technological advances. BYOD is part of an ongoing trend that
involves IT based practices aimed at consumerism of
technology. The proponents of BYOD term, it as productive as
employees, can access mail at their convenience, therefore,
reducing costs. However if it is not entirely understood it will
threaten the security of the company putting it at risk. The
following is an assessment of the significant benefits and
concerns that are associated with the system.
According to French, Guo and Shim, (2014) BYOD is
thought to improve employee productivity and satisfaction as
they are more likely to be comfortable when using their own
devices. It has been noted that employees are always seeking
flexible work options and the ability to work in remote areas. If
they are allowed to use the same device that they use at home in
the office then, it allows for an easy transition and therefore
enhanced output and efficiency. It is noted that surveys taken in
relevance to employees who use their own devices will feel
more ownership over their work. The policy can be an incentive
that brings about talent in the recruitment efforts. Companies
that embrace BOYD are embraced more positively as they are
thought to have a more innovative, agile and modern culture.
Concerning operating costs, companies are more likely to adopt
the policy as it drives the cost away from them. For example,
the programs shift the costs to the users as workers pay for most
of their voice and data services. A proper consideration is
companies that have a lot of employees who cater for their
individual data and voice call needs thus saving the company a
lot of money that can be allocated elsewhere. Technology is
also always changing and requires an upgrade from time to
time. In a workplace where the employer has to take care of the
upgrade, it would be costly for the enterprise. BOYD devices
usually consist of cutting age devices unlike IT issued ones,
therefore, allowing companies to reap benefits of modern
technology.
Companies that embraced the use of BOYD policy increase
the engagement of workers both in the workplace and after
hours. If the employees are likely to work outside the office,
their responsiveness will be improved when they have the
means to communicate outside the office. It means that they are
more available to respond to emails, answer calls and even carry
out daily tasks when outside the office. Despite these benefits,
there are various matters that must be taken into consideration
such as security of company information. In the mobile and
communication world, security threats are imminent which
means that BOYD can be disastrous (Lennon, 2012).
Risks associated with BOYD
According to Raths, (2012) there are significant risks
associated with the policy and it is up to the IT departments to
ensure that information does not end up with the wrong people.
Therefore, security measures are called for when dealing with
the remote devices. Surveys carried out extensive national show
that many senior IT security and technology decision makers
report serious security breaches and violations in relevance to
personal mobile device use. Security threats are related to the
end node problem where devices used by employees are also
used for internet access. There might also be data breaches if an
employee loses their phone and other un-trusted parties retrieve
information and any unsecured data on the phone. There are
also instances where an employee leaves a company and since
the device is personally owned they leave with the data and
company applications. There are also employees who sell their
devices without taking time to wipe company data.
Privacy fears
Employees have privacy concerns that are entirely
justified. Some of the BOYD policies provide employees with
software that track their every move. Workers who agree to the
BOYD program might find themselves accepting software
installations done by the IT department. The programs might be
used to monitor their device usage, collection of personal
information. The IT department might be able to remove
personal data from users’ devices. Most employees have raised
concerns about access to contacts, facebook account data,
installed applications and browser histories. Even when
companies take time to separate personal and business data,
there might be discovery requests especially when it comes to
litigations.
Cost to the employees and device disparities.
As noted earlier on the costs of the BOYD are transferred to the
employee. However, not everyone has a device that can be used
in the program. It is therefore quite demanding when one is told
that they should get a device such as an iPhone or a laptop.
There are also risks such as damage to the device that can’t be
attributed to the employer. In this case, the employees are not
quite happy to shoulder the costs. It is also evident that when
employees are allowed to select their own devices they might
bring different devices with distinct capabilities. It 's hard for
programmers to cover various platforms that are brought to
work but more often they still manage to do so.
It is, therefore, evident that various considerations have to
be taken to ensure that the process is successful. If employees
are more technologically driven and have high-quality devices
hen, it might be good to adopt BOYD. Employees should also
know the stand of the company especially when it comes to
access to personal information. Legal matters are inevitable,
and these matters are of concern to employees. Informing them
in advance might serve well to increase their productivity and
ensure protection of data (Ghosh et al., 2013).
Conclusion
BOYD policies have been very useful and practical when it
comes to the benefits that are accrued. However, the threats to
security and cost are a threat to the advancement of the program
in the United States. Most companies that appreciated the
method earlier on are now considering alternatives due to
security breaches that have been experienced in the past.
Employees are nowadays aware of security threats, and if more
companies choose to take up the policy, it will be easier to
protect data and information. Policy issues when implementing
the program are imperative, and companies have to ensure that
the right measures are taken to account.
References
Ghosh, A., Gajar, P. K., & Rai, S. (2013). Bring your own
device (BYOD): Security risks and mitigating strategies.
Journal of Global Research in Computer Science, 4(4), 62-70.
Raths, D. (2012). Are You Ready for BYOD: Advice from the
Trenches on How to Prepare Your Wireless Network for the
Bring-Your-Own-Device Movement. THE Journal
(Technological Horizons In Education), 39(4), 28.
Lennon, R. G. (2012). Bring your own device (BYOD) with
cloud 4 education. In Proceedings of the 3rd annual conference
on Systems, programming, and applications: software for
humanity (pp. 171-180). ACM.
French, A. M., Guo, C., & Shim, J. P. (2014). Current status,
issues, and future of bring your own device (BYOD).
Communications of the Association for Information Systems,
35(10), 191-197.
Running head: ETHICAL CONSIDERATION 1
ETHICAL CONSIDERATION 2
Ethical Consideration
DeVry University
Paul Winters
Technology Society and Culture
Aakash Patel
Ethical Consideration
A detailed evaluation of the ethical considerations associated
with the technology in relation to its impact on humanity
Most people agree that technology is one of the most important
aspects of human lives. With considerations of humanity and
ethics, technology has a great impact. Humanity is the ability of
human beings to reason and thinks before they involve in any
form of action on anything. It is what separates human beings
from machines like computers and robots, which are
programmed to involve in a certain course of action and respond
to certain situations. The impact that technology has is both
positive and negative.
To begin with, it is through education that people have managed
to highly acquire education concerning ethics. Organizations
that have demonstrated the need for ethics has been set up on
technological grounds. A company like Apple Inc., for example,
is among the many organizations that explain about the
necessity of ethics in the workplace, and personal ethics of
every individual and its total existence is mainly because of
technological existence. Technology has therefore made a
positive contribution towards ethics of human beings and
promoted humanity.
Technology, on the other hand, has also caused a great negative
impact on humanity and ethics. To begin with, certain
individuals like hackers, who have mastered numerous
technological skills have been tempted by technology to commit
crimes that are against humanity and ethical grounds and have
made the decisions to involve in them. These involve the many
inhuman terrorist actions that have taken place being aided by
technology for efficiency. At the same time, it has also cause
peoples’ everyday lives to change, simply because they expect
perfection from other people like the machines that they work
with all the time. It has depleted issues like patience, and thus
some people expect other to respond to their demands and
requirements immediately. Technology has therefore had both
positive and negative effects on people’s humanity and ethics.
An illustration of at least two specific ethical theories that
differentiates their varying approaches in consideration of the
questions raised by the selected technology
There are many theories that technology has fully affected
in a certain way. The figure below fully explains a number of
these theories.
As shown in the visual presentation, one of the ethical theories
that technology has a great impact upon is the theory of virtual
ethics. Virtual ethics is a form of guiding theories that explains
that the behavior of an individual relies on certain virtues that
they have and what they believe is right. Technology has
changed the belief of people from what they used to be before.
It has done this through its ability to enable people to socialize
with others. When people view other individuals through certain
platforms like social media, they acquire new virtual and
beliefs. People, for example, might believe that dressing in a
certain way is right, simply because they saw other individuals
who might be practicing different cultures dressing similarly.
The other theory that technology has affected is
consequentialism. This theory as described in the visual
presentation explains that the best action that an individual
should involve in is the one that provides the greater good. With
technology, however, people can involve in actions that affect
areas that may be geographically far away from them, and do it
in certain ways that the actions cannot be traced to them. When
these individuals do not care much about others, therefore, they
might involve in these forms of actions and believe that they are
ethical since, despite the harm they may do to others, they
would still benefit greatly from them (Broad, 2014).
References
Broad, C. (2014). Five types of ethical theory. London:
Routledge.

More Related Content

Similar to BYODImpact of Bring Your Device (BYOD) at workplace.docx

Similar to BYODImpact of Bring Your Device (BYOD) at workplace.docx (7)

Popularity As Natural Selection
Popularity As Natural SelectionPopularity As Natural Selection
Popularity As Natural Selection
 
Communication Technology Final Project
Communication Technology Final ProjectCommunication Technology Final Project
Communication Technology Final Project
 
Sxsw2016takeaways 160318195519
Sxsw2016takeaways 160318195519Sxsw2016takeaways 160318195519
Sxsw2016takeaways 160318195519
 
0507 057 01 98 * Adana Yuregir Klima Servisleri
0507 057 01 98 * Adana Yuregir Klima Servisleri0507 057 01 98 * Adana Yuregir Klima Servisleri
0507 057 01 98 * Adana Yuregir Klima Servisleri
 
SXSW 2016 takeaways
SXSW 2016 takeawaysSXSW 2016 takeaways
SXSW 2016 takeaways
 
The future of communication technologies
The future of communication technologiesThe future of communication technologies
The future of communication technologies
 
The Future of Manufacturing 2016
The Future of Manufacturing 2016The Future of Manufacturing 2016
The Future of Manufacturing 2016
 

More from RAHUL126667

Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docx
Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docxApplying the Four Principles Case StudyPart 1 Chart (60 points)B.docx
Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docxRAHUL126667
 
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docx
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docxAPPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docx
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docxRAHUL126667
 
Apply the general overview of court structure in the United States (.docx
Apply the general overview of court structure in the United States (.docxApply the general overview of court structure in the United States (.docx
Apply the general overview of court structure in the United States (.docxRAHUL126667
 
Apply the Paramedic Method to the following five selections.docx
Apply the Paramedic Method to the following five selections.docxApply the Paramedic Method to the following five selections.docx
Apply the Paramedic Method to the following five selections.docxRAHUL126667
 
Application of Standards of CareDiscuss the standard(s) of c.docx
Application of Standards of CareDiscuss the standard(s) of c.docxApplication of Standards of CareDiscuss the standard(s) of c.docx
Application of Standards of CareDiscuss the standard(s) of c.docxRAHUL126667
 
Application of the Nursing Process to Deliver Culturally Compe.docx
Application of the Nursing Process to Deliver Culturally Compe.docxApplication of the Nursing Process to Deliver Culturally Compe.docx
Application of the Nursing Process to Deliver Culturally Compe.docxRAHUL126667
 
Application Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docxApplication Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docxRAHUL126667
 
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docx
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docxApplied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docx
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docxRAHUL126667
 
Application of the Belmont PrinciplesFirst, identify your .docx
Application of the Belmont PrinciplesFirst, identify your .docxApplication of the Belmont PrinciplesFirst, identify your .docx
Application of the Belmont PrinciplesFirst, identify your .docxRAHUL126667
 
APPLE is only one of the multiple companies that have approved and d.docx
APPLE is only one of the multiple companies that have approved and d.docxAPPLE is only one of the multiple companies that have approved and d.docx
APPLE is only one of the multiple companies that have approved and d.docxRAHUL126667
 
Appliance Warehouse Service Plan.The discussion focuses on the.docx
Appliance Warehouse Service Plan.The discussion focuses on the.docxAppliance Warehouse Service Plan.The discussion focuses on the.docx
Appliance Warehouse Service Plan.The discussion focuses on the.docxRAHUL126667
 
Applicants must submit a 500 essay describing how current or future .docx
Applicants must submit a 500 essay describing how current or future .docxApplicants must submit a 500 essay describing how current or future .docx
Applicants must submit a 500 essay describing how current or future .docxRAHUL126667
 
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docx
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docxApple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docx
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docxRAHUL126667
 
Appcelerator Titanium was released in December 2008, and has been st.docx
Appcelerator Titanium was released in December 2008, and has been st.docxAppcelerator Titanium was released in December 2008, and has been st.docx
Appcelerator Titanium was released in December 2008, and has been st.docxRAHUL126667
 
APA Style300 words per topic2 peer reviewed resources per to.docx
APA Style300 words per topic2 peer reviewed resources per to.docxAPA Style300 words per topic2 peer reviewed resources per to.docx
APA Style300 words per topic2 peer reviewed resources per to.docxRAHUL126667
 
Ape and Human Cognition What’s theDifferenceMichael To.docx
Ape and Human Cognition What’s theDifferenceMichael To.docxApe and Human Cognition What’s theDifferenceMichael To.docx
Ape and Human Cognition What’s theDifferenceMichael To.docxRAHUL126667
 
Apply what you have learned about Health Promotion and Disease P.docx
Apply what you have learned about Health Promotion and Disease P.docxApply what you have learned about Health Promotion and Disease P.docx
Apply what you have learned about Health Promotion and Disease P.docxRAHUL126667
 
APA formatCite there peer-reviewed, scholarly references300 .docx
APA formatCite there peer-reviewed, scholarly references300 .docxAPA formatCite there peer-reviewed, scholarly references300 .docx
APA formatCite there peer-reviewed, scholarly references300 .docxRAHUL126667
 
APA formatCite 2 peer-reviewed reference175-265 word count.docx
APA formatCite 2 peer-reviewed reference175-265 word count.docxAPA formatCite 2 peer-reviewed reference175-265 word count.docx
APA formatCite 2 peer-reviewed reference175-265 word count.docxRAHUL126667
 
APA formatCite at least 1 referenceWrite a 175- to 265-w.docx
APA formatCite at least 1 referenceWrite a 175- to 265-w.docxAPA formatCite at least 1 referenceWrite a 175- to 265-w.docx
APA formatCite at least 1 referenceWrite a 175- to 265-w.docxRAHUL126667
 

More from RAHUL126667 (20)

Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docx
Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docxApplying the Four Principles Case StudyPart 1 Chart (60 points)B.docx
Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docx
 
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docx
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docxAPPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docx
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docx
 
Apply the general overview of court structure in the United States (.docx
Apply the general overview of court structure in the United States (.docxApply the general overview of court structure in the United States (.docx
Apply the general overview of court structure in the United States (.docx
 
Apply the Paramedic Method to the following five selections.docx
Apply the Paramedic Method to the following five selections.docxApply the Paramedic Method to the following five selections.docx
Apply the Paramedic Method to the following five selections.docx
 
Application of Standards of CareDiscuss the standard(s) of c.docx
Application of Standards of CareDiscuss the standard(s) of c.docxApplication of Standards of CareDiscuss the standard(s) of c.docx
Application of Standards of CareDiscuss the standard(s) of c.docx
 
Application of the Nursing Process to Deliver Culturally Compe.docx
Application of the Nursing Process to Deliver Culturally Compe.docxApplication of the Nursing Process to Deliver Culturally Compe.docx
Application of the Nursing Process to Deliver Culturally Compe.docx
 
Application Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docxApplication Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docx
 
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docx
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docxApplied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docx
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docx
 
Application of the Belmont PrinciplesFirst, identify your .docx
Application of the Belmont PrinciplesFirst, identify your .docxApplication of the Belmont PrinciplesFirst, identify your .docx
Application of the Belmont PrinciplesFirst, identify your .docx
 
APPLE is only one of the multiple companies that have approved and d.docx
APPLE is only one of the multiple companies that have approved and d.docxAPPLE is only one of the multiple companies that have approved and d.docx
APPLE is only one of the multiple companies that have approved and d.docx
 
Appliance Warehouse Service Plan.The discussion focuses on the.docx
Appliance Warehouse Service Plan.The discussion focuses on the.docxAppliance Warehouse Service Plan.The discussion focuses on the.docx
Appliance Warehouse Service Plan.The discussion focuses on the.docx
 
Applicants must submit a 500 essay describing how current or future .docx
Applicants must submit a 500 essay describing how current or future .docxApplicants must submit a 500 essay describing how current or future .docx
Applicants must submit a 500 essay describing how current or future .docx
 
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docx
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docxApple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docx
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docx
 
Appcelerator Titanium was released in December 2008, and has been st.docx
Appcelerator Titanium was released in December 2008, and has been st.docxAppcelerator Titanium was released in December 2008, and has been st.docx
Appcelerator Titanium was released in December 2008, and has been st.docx
 
APA Style300 words per topic2 peer reviewed resources per to.docx
APA Style300 words per topic2 peer reviewed resources per to.docxAPA Style300 words per topic2 peer reviewed resources per to.docx
APA Style300 words per topic2 peer reviewed resources per to.docx
 
Ape and Human Cognition What’s theDifferenceMichael To.docx
Ape and Human Cognition What’s theDifferenceMichael To.docxApe and Human Cognition What’s theDifferenceMichael To.docx
Ape and Human Cognition What’s theDifferenceMichael To.docx
 
Apply what you have learned about Health Promotion and Disease P.docx
Apply what you have learned about Health Promotion and Disease P.docxApply what you have learned about Health Promotion and Disease P.docx
Apply what you have learned about Health Promotion and Disease P.docx
 
APA formatCite there peer-reviewed, scholarly references300 .docx
APA formatCite there peer-reviewed, scholarly references300 .docxAPA formatCite there peer-reviewed, scholarly references300 .docx
APA formatCite there peer-reviewed, scholarly references300 .docx
 
APA formatCite 2 peer-reviewed reference175-265 word count.docx
APA formatCite 2 peer-reviewed reference175-265 word count.docxAPA formatCite 2 peer-reviewed reference175-265 word count.docx
APA formatCite 2 peer-reviewed reference175-265 word count.docx
 
APA formatCite at least 1 referenceWrite a 175- to 265-w.docx
APA formatCite at least 1 referenceWrite a 175- to 265-w.docxAPA formatCite at least 1 referenceWrite a 175- to 265-w.docx
APA formatCite at least 1 referenceWrite a 175- to 265-w.docx
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

BYODImpact of Bring Your Device (BYOD) at workplace.docx

  • 1. BYOD Impact of Bring Your Device (BYOD) at workplace Historic Timeline and Predecessor Assessment Draft Aakash Patel DeVry University Technology Society and Culture Paul winters Impact of Bring Your Device (BYOD) at workplace Introduction Today, it's the desire of everybody to own a device such as a tablet which is considered convenient in the current setup. A device such as a table is similar to a mobile computer such as a laptop which is easier to carry and more discrete. It can also use 3G internet from most places, unlike a laptop. The only disadvantage of this technology is that it can't be put on your lap, and it has to be held in your hands. It's also difficult to keep the gadget with your hands and at the same time use the same hands to operate it. Touchscreen technology has emerged
  • 2. and has become more common currently than ever before. Almost every device today has this technology implemented in it be it a computer, a mobile phone, televisions or even DVD players. The technology has made it easier to work with these devices in our daily activities. However, the transition from the old version to this newly emergent technology has taken time and has been improving consistently from older versions (Jin, 2014). Several technologies have led to the emergence of the current technological advancement. Grid computing is among the major technologies that have led to this improvement. Grid computing, which is a form of distributed computing solves a problem by utilizing resources of several networked computers. It's recognized as the predecessor of the current cloud computing. Since time has been available and network workload has considerably decreased, Grid computing utilizes this downtime in combination with its computing power for purposes of scientific research, collaborative projects, etc. that need resources to attain their goals. This, at last, led to using specific software's including Globus Toolkit and Boinc so as to enjoy free resources on computers as well as share information to be processed by computers within the grid. This has improved computations and increased efficiency that has finally led to the current technology hike (Kranzberg & Pursell, 2015). Other than grid, computing, there are other related technologies with great impacts on the current world we are today. Distributed computing has provided possibilities of running applications on many computers at the same time. Moreover, utility computing as a business model allows resources including storage, computing among others to be provided and charged as well. These have led to the emergence of web services offering computing services dynamically on demand resulting in the evolution of web 2.0 to deliver services to all its users (Jones, 2012). These technologies have provided abstraction as well as isolation of lower functionality from the underlying hardware hence allowing portability and sharing of
  • 3. physical resources. These funds are made available to many clients within the same infrastructure making it possible to share data and remedies in multi-tenant architectures. Artificial intelligence has major impacts on the current technological advancement. For a long time, people have made software's and machines with human attributes which exhibit greater intelligence. These devices and software's have been capable of learning, reasoning, perception, planning, knowledge as well as understanding the natural language processing, as well as abilities to manipulate and move objects. This is among the major fields which have profoundly impact today's technological advancement in conjunction with robotics which is closely related to AI. This has led to technologies such as robots, space crafts among others (Jones, 2012). Conclusion The significant technology developments seen today have undergone through several phases with slight changes in each step leading to the hi-tech world that we live in today. The old version technology has been critical to this development, and there is still room for more in the late future. References Jin, Z. (2014). Global technological change: from hard technology to soft technology. Bristol, England; Portland: Intellect Books. Jones, S. (2012). Cybersociety 2.0: Revisiting computer- mediated community and Technology. Thousand Oaks: SAGE Publications. Kranzberg, M., & Pursell, C. W. (2015). Technology in Western Civilization. New York: Oxford Univ. Press. Jay McCarroll, baby-faced and hoodie-clad, works in the sort of space you’d expect from a fellow who dreams in fabric. It’s outfitted with four sewing machines and oceans of material arranged in brilliant spectral sequence; his spring 2007 collection hangs on a rack in the corner, anchored by a quilt skirt so audaciously outsize it could easily double as a
  • 4. bedspread. But bedding itself is missing from this studio, as is a kitchen and a shower, which matters more in this case than it ordinarily would: Though he’s the first- season winner of Project Runway, Jay, 32, is still homeless in New York. “I haven’t been living anywhere for two years,” he says. “I sleep at other people’s houses. I sleep here if I’m drunk.” Jay was one of the Bravo network’s first guinea pigs in the competition reality genre, a brightly imaginative new form that mixes the more mundane conceits of The Real World and Survivor with contests involving genuine skill. In exchange for a few weeks of reality-style exploitation, contestants have a chance to show the world what they can do— with a sewing machine, with a pair of scissors, in a kitchen, in an undecorated room—and in the aftermath find their careers in full bloom. But the shows, it turns out, are the easy part. “I have a fucking gazillion e-mails from all over the world from people asking, Why isn’t your stuff out there?” says Jay. “Yet financially, I have no way to get them a product because I got pushed out of a boat and into the ocean, as if, Oh, you can survive now.” This isn’t what one would assume, of course. One would assume he’d be a money magnet after his star turn. Certainly Jay assumed as much. “You don’t think I took the fucking bus to New York the day after I won the show, thinking someone was going to come up to me on the street and say, You’re awesome, here’s money?” he asks. “I thought that for two years. But I’ve given up on that.” Had Bravo not invented Project Runway, Jay would probably still be back in Lehman, Pennsylvania, where he ran a vintage- clothing store (before that, he was producing online porn). But because of the show, Bravo and Bravo watchers expected quite a bit more from him. Project Runway wasn’t some competition gimmick like Fear Factor or The Amazing Race, where the contestants’ skills only served the needs of the show. Jay’s talents were practical and real, and Bravo gave him a platform to showcase them. If he couldn’t succeed in the aftermath, why
  • 5. were we watching? Of what use was the show? That’s pretty much how Jay saw it, too. He’d worked for five straight months, with zero pay and little sleep, to appear on Project Runway and create a collection for Bryant Park. Audiences adored him. The show owed much of its success, let’s face it, to him. So what did Jay get out of it? The trouble is, celebrity came easily to Jay. Business did not.On the show, Jay was wicked and entertaining and cheerfully provocative, but he hardly had the means, savvy, or professional temperament to navigate the New York fashion world. (His first voice-mail message to me, ever:Hey Jen, this is Jay McCarroll … Um, I am free tonight and all day tomorrow to do this bullshit. Fucking call me, would you?) “A week after I won the show, I met with two ladies from Banana Republic at the top of the Soho House, which is like, big time,” he says. “And they were like, ‘Oh, we can give you numbers for factories to get your clothes produced.’ But that was totally not anything like what I needed. What I needed was someone to sit down with me and say, Here’s how you start a fashion label.” Before long, the blogs started to howl that Jay’s work was nowhere to be seen, and Tim Gunn, the kindly host and soul of Project Runway, was wondering aloud to the presswhy Jay hadn’t gained more momentum; he also castigated him for being a diva. “My hands have been creatively crippled for two years—all those fucking eyes on me, reading that I’m a waste on blogs,” he says. He looks genuinely unhappy now, and younger than his 32 years—a reminder that there’s an enfant in enfant terrible, a person one feels just as apt to protect as to throttle. “I was just an artist before this happened,” he adds. “Now I’m an artist with a fucking clock ticking.” THE IMPACT OF BRING YOUR DEVICE AT WORKPLACE BYOD 1
  • 6. THE IMPACT OF BRING YOUR DEVICE AT WORKPLACE BYOD 3 Technology Society and Culture Paul Winters The Impact Of Bring Your Device at Workplace BYOD Aakash Patel The Impact Of Bring Your Device at Workplace BYOD Introduction BYOD is an information technology policy where employees are allowed to bring their personal devices to the workplace. Some of the devices include mobile phones, personal computers, and other handheld devices that are portable. The devices are then used to access company systems and data. Benefits associated with the program Many businesses have had to keep up with the changing times and the IT departments struggle to keep up with changing technological advances. BYOD is part of an ongoing trend that involves IT based practices aimed at consumerism of
  • 7. technology. The proponents of BYOD term, it as productive as employees, can access mail at their convenience, therefore, reducing costs. However if it is not entirely understood it will threaten the security of the company putting it at risk. The following is an assessment of the significant benefits and concerns that are associated with the system. According to French, Guo and Shim, (2014) BYOD is thought to improve employee productivity and satisfaction as they are more likely to be comfortable when using their own devices. It has been noted that employees are always seeking flexible work options and the ability to work in remote areas. If they are allowed to use the same device that they use at home in the office then, it allows for an easy transition and therefore enhanced output and efficiency. It is noted that surveys taken in relevance to employees who use their own devices will feel more ownership over their work. The policy can be an incentive that brings about talent in the recruitment efforts. Companies that embrace BOYD are embraced more positively as they are thought to have a more innovative, agile and modern culture. Concerning operating costs, companies are more likely to adopt the policy as it drives the cost away from them. For example, the programs shift the costs to the users as workers pay for most of their voice and data services. A proper consideration is companies that have a lot of employees who cater for their individual data and voice call needs thus saving the company a lot of money that can be allocated elsewhere. Technology is also always changing and requires an upgrade from time to time. In a workplace where the employer has to take care of the upgrade, it would be costly for the enterprise. BOYD devices usually consist of cutting age devices unlike IT issued ones, therefore, allowing companies to reap benefits of modern technology. Companies that embraced the use of BOYD policy increase the engagement of workers both in the workplace and after hours. If the employees are likely to work outside the office, their responsiveness will be improved when they have the
  • 8. means to communicate outside the office. It means that they are more available to respond to emails, answer calls and even carry out daily tasks when outside the office. Despite these benefits, there are various matters that must be taken into consideration such as security of company information. In the mobile and communication world, security threats are imminent which means that BOYD can be disastrous (Lennon, 2012). Risks associated with BOYD According to Raths, (2012) there are significant risks associated with the policy and it is up to the IT departments to ensure that information does not end up with the wrong people. Therefore, security measures are called for when dealing with the remote devices. Surveys carried out extensive national show that many senior IT security and technology decision makers report serious security breaches and violations in relevance to personal mobile device use. Security threats are related to the end node problem where devices used by employees are also used for internet access. There might also be data breaches if an employee loses their phone and other un-trusted parties retrieve information and any unsecured data on the phone. There are also instances where an employee leaves a company and since the device is personally owned they leave with the data and company applications. There are also employees who sell their devices without taking time to wipe company data. Privacy fears Employees have privacy concerns that are entirely justified. Some of the BOYD policies provide employees with software that track their every move. Workers who agree to the BOYD program might find themselves accepting software installations done by the IT department. The programs might be used to monitor their device usage, collection of personal information. The IT department might be able to remove personal data from users’ devices. Most employees have raised concerns about access to contacts, facebook account data, installed applications and browser histories. Even when companies take time to separate personal and business data,
  • 9. there might be discovery requests especially when it comes to litigations. Cost to the employees and device disparities. As noted earlier on the costs of the BOYD are transferred to the employee. However, not everyone has a device that can be used in the program. It is therefore quite demanding when one is told that they should get a device such as an iPhone or a laptop. There are also risks such as damage to the device that can’t be attributed to the employer. In this case, the employees are not quite happy to shoulder the costs. It is also evident that when employees are allowed to select their own devices they might bring different devices with distinct capabilities. It 's hard for programmers to cover various platforms that are brought to work but more often they still manage to do so. It is, therefore, evident that various considerations have to be taken to ensure that the process is successful. If employees are more technologically driven and have high-quality devices hen, it might be good to adopt BOYD. Employees should also know the stand of the company especially when it comes to access to personal information. Legal matters are inevitable, and these matters are of concern to employees. Informing them in advance might serve well to increase their productivity and ensure protection of data (Ghosh et al., 2013). Conclusion BOYD policies have been very useful and practical when it comes to the benefits that are accrued. However, the threats to security and cost are a threat to the advancement of the program in the United States. Most companies that appreciated the method earlier on are now considering alternatives due to security breaches that have been experienced in the past. Employees are nowadays aware of security threats, and if more companies choose to take up the policy, it will be easier to protect data and information. Policy issues when implementing the program are imperative, and companies have to ensure that the right measures are taken to account.
  • 10. References Ghosh, A., Gajar, P. K., & Rai, S. (2013). Bring your own device (BYOD): Security risks and mitigating strategies. Journal of Global Research in Computer Science, 4(4), 62-70. Raths, D. (2012). Are You Ready for BYOD: Advice from the Trenches on How to Prepare Your Wireless Network for the Bring-Your-Own-Device Movement. THE Journal (Technological Horizons In Education), 39(4), 28. Lennon, R. G. (2012). Bring your own device (BYOD) with cloud 4 education. In Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity (pp. 171-180). ACM. French, A. M., Guo, C., & Shim, J. P. (2014). Current status, issues, and future of bring your own device (BYOD). Communications of the Association for Information Systems, 35(10), 191-197. Running head: ETHICAL CONSIDERATION 1 ETHICAL CONSIDERATION 2
  • 11. Ethical Consideration DeVry University Paul Winters Technology Society and Culture Aakash Patel Ethical Consideration A detailed evaluation of the ethical considerations associated with the technology in relation to its impact on humanity Most people agree that technology is one of the most important aspects of human lives. With considerations of humanity and ethics, technology has a great impact. Humanity is the ability of human beings to reason and thinks before they involve in any form of action on anything. It is what separates human beings from machines like computers and robots, which are programmed to involve in a certain course of action and respond to certain situations. The impact that technology has is both positive and negative. To begin with, it is through education that people have managed to highly acquire education concerning ethics. Organizations that have demonstrated the need for ethics has been set up on technological grounds. A company like Apple Inc., for example, is among the many organizations that explain about the necessity of ethics in the workplace, and personal ethics of every individual and its total existence is mainly because of technological existence. Technology has therefore made a positive contribution towards ethics of human beings and promoted humanity. Technology, on the other hand, has also caused a great negative impact on humanity and ethics. To begin with, certain
  • 12. individuals like hackers, who have mastered numerous technological skills have been tempted by technology to commit crimes that are against humanity and ethical grounds and have made the decisions to involve in them. These involve the many inhuman terrorist actions that have taken place being aided by technology for efficiency. At the same time, it has also cause peoples’ everyday lives to change, simply because they expect perfection from other people like the machines that they work with all the time. It has depleted issues like patience, and thus some people expect other to respond to their demands and requirements immediately. Technology has therefore had both positive and negative effects on people’s humanity and ethics. An illustration of at least two specific ethical theories that differentiates their varying approaches in consideration of the questions raised by the selected technology There are many theories that technology has fully affected in a certain way. The figure below fully explains a number of these theories. As shown in the visual presentation, one of the ethical theories that technology has a great impact upon is the theory of virtual ethics. Virtual ethics is a form of guiding theories that explains that the behavior of an individual relies on certain virtues that they have and what they believe is right. Technology has changed the belief of people from what they used to be before. It has done this through its ability to enable people to socialize with others. When people view other individuals through certain platforms like social media, they acquire new virtual and beliefs. People, for example, might believe that dressing in a certain way is right, simply because they saw other individuals who might be practicing different cultures dressing similarly. The other theory that technology has affected is consequentialism. This theory as described in the visual presentation explains that the best action that an individual should involve in is the one that provides the greater good. With technology, however, people can involve in actions that affect
  • 13. areas that may be geographically far away from them, and do it in certain ways that the actions cannot be traced to them. When these individuals do not care much about others, therefore, they might involve in these forms of actions and believe that they are ethical since, despite the harm they may do to others, they would still benefit greatly from them (Broad, 2014). References Broad, C. (2014). Five types of ethical theory. London: Routledge.