Title of Presentation
Student’s name
Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation.
1
Introduction
Includes
The name of the student evaluated and the topic
Also should detail the purpose and flow of the presentation
Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation.
‹#›
Format of Paper
Evaluate the following three questions regarding the overall format of the paper.
Were all required sections included?
Were they clearly distinguished from one another?
If not, were reasons given for not including some?
Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation.
‹#›
Historical Timeline and Predecessor Assessment Evaluation
Assess the following three components as detailed on the Student Evaluation Form
Sources
Content
Writing Skills
Remember that graphics go a long way in a visual presentation. Add them to play up the visual appeal of this slide but be sure to cite them in proper APA format.
Add additional slides as needed for this section.
Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation.
‹#›
Analysis of Impact Evaluation
Assess the following three components as detailed on the Student Evaluation Form
Sources
Content
Writing Skills
Remember that graphics go a long way in a visual presentation. Add them to play up the visual appeal of this slide but be sure to cite them in proper APA format.
Add additional slides as needed for this section.
Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation.
‹#›
Ethical Considerations Evaluation
Assess the following three components as detailed on the Student Evaluation Form
Sources
Content
Writing Skills
Remember that graphics go a long way in a visual presentation. Add them to play up the visual appeal of this slide but be sure to cite them in proper APA format.
Add additional slides as needed for this section.
Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation.
‹#›
Concluding Remarks
Summarize the areas of the writer's strengths and weakness as presented in your presentation and remember to always end on a positive note!
Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation.
‹#›
References
Reference all sources used in completing this assignment.
Remember that in-text citations are just as important in a presentation as they are in papers.
The references listed here should be a list of what you have posted on your previous slides, including any images that you used, unless they are clipart.
Feel free to adjust the color and scheme of th ...
Title of PresentationStudent’s nameFeel free to adjust the c.docx
1. Title of Presentation
Student’s name
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
1
Introduction
Includes
The name of the student evaluated and the topic
Also should detail the purpose and flow of the presentation
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
Format of Paper
Evaluate the following three questions regarding the overall
format of the paper.
Were all required sections included?
Were they clearly distinguished from one another?
If not, were reasons given for not including some?
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
2. ‹#›
Historical Timeline and Predecessor Assessment Evaluation
Assess the following three components as detailed on the
Student Evaluation Form
Sources
Content
Writing Skills
Remember that graphics go a long way in a visual presentation.
Add them to play up the visual appeal of this slide but be sure
to cite them in proper APA format.
Add additional slides as needed for this section.
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
Analysis of Impact Evaluation
Assess the following three components as detailed on the
Student Evaluation Form
Sources
Content
Writing Skills
Remember that graphics go a long way in a visual presentation.
Add them to play up the visual appeal of this slide but be sure
to cite them in proper APA format.
Add additional slides as needed for this section.
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
3. presentation.
‹#›
Ethical Considerations Evaluation
Assess the following three components as detailed on the
Student Evaluation Form
Sources
Content
Writing Skills
Remember that graphics go a long way in a visual presentation.
Add them to play up the visual appeal of this slide but be sure
to cite them in proper APA format.
Add additional slides as needed for this section.
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
Concluding Remarks
Summarize the areas of the writer's strengths and weakness as
presented in your presentation and remember to always end on a
positive note!
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
4. References
Reference all sources used in completing this assignment.
Remember that in-text citations are just as important in a
presentation as they are in papers.
The references listed here should be a list of what you have
posted on your previous slides, including any images that you
used, unless they are clipart.
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
Should be at least 300 words. No paper format required
Innovation, intrapreneurship, and creativity are closely related
concepts and each is vital to building a knowledge-creating
organization. Discuss the relationship among the three concepts.
Describe the challenges for managing innovation,
intrapreneurship, and creativity processes within an
organization, and any ethical considerations that need to be
taken into account when fostering innovation, intrapreneurship,
and creativity. Which of the processes is (or are) most likely to
be successful in the early phase of an organization’s life cycle.
Why? Which of the processes is (or are) most likely to be
successful in the growth phase of an organization’s life cycle?
Why?
PEER EVALUATION PRESENTATION ASSESSMENT FORM:
TO BE USED TO EVALUATE YOUR TEAMMATE’S COURSE
PAPER
DIRECTIONS:
1. Please use this form to evaluate your assigned peer’s final
5. research paper according to
the criteria below.
2. Specific information should be supplied for each item; that
is, do not simply answer Yes or No.
3. This form can be downloaded and expanded to allow space
for your report.
4. This is a graded assignment.
1. Evaluate your assigned classmate’s paper according to the
following instructions:
FORMAT:
a. Were all required sections included?
b. Were they clearly distinguished from one another?
c. If not, were reasons given for not including some?
FOR EACH SECTION:
SOURCES:
d. Were in-text references used?
e. Were they properly formatted?
f. Were primary sources used?
g. Were they formatted properly?
h. Were sources from our textbook used?
i. Were they formatted properly?
j. Were the length requirements observed?
CONTENT:
k. Did the paper have a thesis and introduction?
l. Was it clear to you?
m. Did each section relate to the thesis? Evaluate by section.
n. If any of the sections did not apply to the paper, was a reason
given?
o. Was some form of quantitative reasoning used?
p. If so, did it apply to the thesis?
q. Conclusion: did it accurately summarize the author’s
argument?
r. Was a Works Cited page included?
6. s. Was it properly formatted?
WRITING SKILLS:
t. Evaluate the writing of the paper. The following includes all
elements of writing: spelling, grammar, punctuation, sentence
structure, and clarity of expression.
1. Excellent: Virtually error free
2. Very good: Very few insignificant errors
3. Good: Some errors; somewhat distracting
4. Fair: Significant number of writing errors; distracting
5. Poor: Unacceptable level of writing errors
Impact of Bring Your Device (BYOD) at workplace
2
Final Research Report
Aakash Patel
DeVry University
Technology Society and Culture
Paul winters
Impact of Bring Your Device (BYOD) at workplace
7. Introduction
BYOD is an information technology policy where
employees are allowed to bring their personal devices to the
workplace. Some of the devices include mobile phones, personal
computers, and other handheld devices that are portable. The
devices are then used to access company systems and data.
Today, it's the desire of everybody to own a device such as a
tablet which is considered convenient in the current setup. A
device such as a table is similar to a mobile computer such as a
laptop which is easier to carry and more discrete. It can also use
3G internet from most places, unlike a laptop. The only
disadvantage of this technology is that it can't be put on your
lap, and it has to be held in your hands. It's also difficult to
keep the gadget with your hands and at the same time use the
same hands to operate it. Touchscreen technology has emerged
and has become more common currently than ever before.
Almost every device today has this technology implemented in
it be it a computer, a mobile phone, televisions or even DVD
players. The technology has made it easier to work with these
devices in our daily activities. However, the transition from the
old version to this newly emergent technology has taken time
and has been improving consistently from older versions (Jin,
2014).
Several technologies have led to the emergence of the current
technological advancement. Grid computing is among the major
technologies that have led to this improvement. Grid computing,
which is a form of distributed computing solves a problem by
utilizing resources of several networked computers. It's
recognized as the predecessor of the current cloud computing.
Since time has been available and network workload has
considerably decreased, Grid computing utilizes this downtime
in combination with its computing power for purposes of
scientific research, collaborative projects, etc. that need
resources to attain their goals. This, at last, led to using specific
8. software's including Globus Toolkit and Boinc so as to enjoy
free resources on computers as well as share information to be
processed by computers within the grid. This has improved
computations and increased efficiency that has finally led to the
current technology hike (Kranzberg & Pursell, 2015).
Other than grid, computing, there are other related technologies
with great impacts on the current world we are today.
Distributed computing has provided possibilities of running
applications on many computers at the same time. Moreover,
utility computing as a business model allows resources
including storage, computing among others to be provided and
charged as well. These have led to the emergence of web
services offering computing services dynamically on demand
resulting in the evolution of web 2.0 to deliver services to all its
users (Jones, 2012). These technologies have provided
abstraction as well as isolation of lower functionality from the
underlying hardware hence allowing portability and sharing of
physical resources. These funds are made available to many
clients within the same infrastructure making it possible to
share data and remedies in multi-tenant architectures.
Artificial intelligence has major impacts on the current
technological advancement. For a long time, people have made
software's and machines with human attributes which exhibit
greater intelligence. These devices and software's have been
capable of learning, reasoning, perception, planning, knowledge
as well as understanding the natural language processing, as
well as abilities to manipulate and move objects. This is among
the major fields which have profoundly impact today's
technological advancement in conjunction with robotics which
is closely related to AI. This has led to technologies such as
robots, space crafts among others (Jones, 2012).
Ethical Consideration
A detailed evaluation of the ethical considerations associated
with the technology in relation to its impact on humanity
9. Most people agree that technology is one of the most important
aspects of human lives. With considerations of humanity and
ethics, technology has a great impact. Humanity is the ability of
human beings to reason and thinks before they involve in any
form of action on anything. It is what separates human beings
from machines like computers and robots, which are
programmed to involve in a certain course of action and respond
to certain situations. The impact that technology has is both
positive and negative.
To begin with, it is through education that people have managed
to highly acquire education concerning ethics. Organizations
that have demonstrated the need for ethics has been set up on
technological grounds. A company like Apple Inc., for example,
is among the many organizations that explain about the
necessity of ethics in the workplace, and personal ethics of
every individual and its total existence is mainly because of
technological existence. Technology has therefore made a
positive contribution towards ethics of human beings and
promoted humanity.
Technology, on the other hand, has also caused a great negative
impact on humanity and ethics. To begin with, certain
individuals like hackers, who have mastered numerous
technological skills have been tempted by technology to commit
crimes that are against humanity and ethical grounds and have
made the decisions to involve in them. These involve the many
inhuman terrorist actions that have taken place being aided by
technology for efficiency. At the same time, it has also cause
peoples’ everyday lives to change, simply because they expect
perfection from other people like the machines that they work
with all the time. It has depleted issues like patience, and thus
some people expect other to respond to their demands and
requirements immediately. Technology has therefore had both
positive and negative effects on people’s humanity and ethics.
An illustration of at least two specific ethical theories that
differentiates their varying approaches in consideration of the
questions raised by the selected technology
10. There are many theories that technology has fully affected
in a certain way. The figure below fully explains a number of
these theories.
As shown in the visual presentation, one of the ethical theories
that technology has a great impact upon is the theory of virtual
ethics. Virtual ethics is a form of guiding theories that explains
that the behavior of an individual relies on certain virtues that
they have and what they believe is right. Technology has
changed the belief of people from what they used to be before.
It has done this through its ability to enable people to socialize
with others. When people view other individuals through certain
platforms like social media, they acquire new virtual and
beliefs. People, for example, might believe that dressing in a
certain way is right, simply because they saw other individuals
who might be practicing different cultures dressing similarly.
The other theory that technology has affected is
consequentialism. This theory as described in the visual
presentation explains that the best action that an individual
should involve in is the one that provides the greater good. With
technology, however, people can involve in actions that affect
areas that may be geographically far away from them, and do it
in certain ways that the actions cannot be traced to them. When
these individuals do not care much about others, therefore, they
might involve in these forms of actions and believe that they are
ethical since, despite the harm they may do to others, they
would still benefit greatly from them (Broad, 2014).
Benefits associated with the program
Many businesses have had to keep up with the changing
times and the IT departments struggle to keep up with changing
technological advances. BYOD is part of an ongoing trend that
involves IT based practices aimed at consumerism of
technology. The proponents of BYOD term, it as productive as
employees, can access mail at their convenience, therefore,
reducing costs. However if it is not entirely understood it will
11. threaten the security of the company putting it at risk. The
following is an assessment of the significant benefits and
concerns that are associated with the system.
According to French, Guo and Shim, (2014) BYOD is
thought to improve employee productivity and satisfaction as
they are more likely to be comfortable when using their own
devices. It has been noted that employees are always seeking
flexible work options and the ability to work in remote areas. If
they are allowed to use the same device that they use at home in
the office then, it allows for an easy transition and therefore
enhanced output and efficiency. It is noted that surveys taken in
relevance to employees who use their own devices will feel
more ownership over their work. The policy can be an incentive
that brings about talent in the recruitment efforts. Companies
that embrace BOYD are embraced more positively as they are
thought to have a more innovative, agile and modern culture.
Concerning operating costs, companies are more likely to adopt
the policy as it drives the cost away from them. For example,
the programs shift the costs to the users as workers pay for most
of their voice and data services. A proper consideration is
companies that have a lot of employees who cater for their
individual data and voice call needs thus saving the company a
lot of money that can be allocated elsewhere. Technology is
also always changing and requires an upgrade from time to
time. In a workplace where the employer has to take care of the
upgrade, it would be costly for the enterprise. BOYD devices
usually consist of cutting age devices unlike IT issued ones,
therefore, allowing companies to reap benefits of modern
technology.
Companies that embraced the use of BOYD policy increase
the engagement of workers both in the workplace and after
hours. If the employees are likely to work outside the office,
their responsiveness will be improved when they have the
means to communicate outside the office. It means that they are
more available to respond to emails, answer calls and even carry
out daily tasks when outside the office. Despite these benefits,
12. there are various matters that must be taken into consideration
such as security of company information. In the mobile and
communication world, security threats are imminent which
means that BOYD can be disastrous (Lennon, 2012).
Risks associated with BOYD
According to Raths, (2012) there are significant risks
associated with the policy and it is up to the IT departments to
ensure that information does not end up with the wrong people.
Therefore, security measures are called for when dealing with
the remote devices. Surveys carried out extensive national show
that many senior IT security and technology decision makers
report serious security breaches and violations in relevance to
personal mobile device use. Security threats are related to the
end node problem where devices used by employees are also
used for internet access. There might also be data breaches if an
employee loses their phone and other un-trusted parties retrieve
information and any unsecured data on the phone. There are
also instances where an employee leaves a company and since
the device is personally owned they leave with the data and
company applications. There are also employees who sell their
devices without taking time to wipe company data.
Privacy fears
Employees have privacy concerns that are entirely
justified. Some of the BOYD policies provide employees with
software that track their every move. Workers who agree to the
BOYD program might find themselves accepting software
installations done by the IT department. The programs might be
used to monitor their device usage, collection of personal
information. The IT department might be able to remove
personal data from users’ devices. Most employees have raised
concerns about access to contacts, facebook account data,
installed applications and browser histories. Even when
companies take time to separate personal and business data,
there might be discovery requests especially when it comes to
litigations.
Cost to the employees and device disparities.
13. As noted earlier on the costs of the BOYD are transferred to the
employee. However, not everyone has a device that can be used
in the program. It is therefore quite demanding when one is told
that they should get a device such as an iPhone or a laptop.
There are also risks such as damage to the device that can’t be
attributed to the employer. In this case, the employees are not
quite happy to shoulder the costs. It is also evident that when
employees are allowed to select their own devices they might
bring different devices with distinct capabilities. It 's hard for
programmers to cover various platforms that are brought to
work but more often they still manage to do so.
It is, therefore, evident that various considerations have to
be taken to ensure that the process is successful. If employees
are more technologically driven and have high-quality devices
hen, it might be good to adopt BOYD. Employees should also
know the stand of the company especially when it comes to
access to personal information. Legal matters are inevitable,
and these matters are of concern to employees. Informing them
in advance might serve well to increase their productivity and
ensure protection of data (Ghosh et al., 2013).
Conclusion
BOYD policies have been very useful and practical when it
comes to the benefits that are accrued. However, the threats to
security and cost are a threat to the advancement of the program
in the United States. Most companies that appreciated the
method earlier on are now considering alternatives due to
security breaches that have been experienced in the past.
Employees are nowadays aware of security threats, and if more
companies choose to take up the policy, it will be easier to
protect data and information. Policy issues when implementing
the program are imperative, and companies have to ensure that
the right measures are taken to account.
The significant technology developments seen today have
undergone through several phases with slight changes in each
step leading to the hi-tech world that we live in today. The old
version technology has been critical to this development, and
14. there is still room for more in the late future.
Major Resources
Vickerman, J. A. (2013). Bring your own device to work. Risk
Management, 60(1), 38. This article clearly, elaborates the
various aspects of work life balance of various employees, and
how the various work dynamics are influencing the integration
of both in work place. He illustrates this by using an analogy of
an employee been restricted to use his or her phone at work and
the impact it has on overall performance. In the current
technological era, the phone has a dual purpose as it can be
conveniently used to increase efficiency in task performance.
Ballagas, R., Rohs, M., Sheridan, J. G., & Borchers, J.
(2004, September). Byod: Bring your own device.
In Proceedings of the Workshop on Ubiquitous Display
Environments, Ubicomp (Vol. 2004). In this article, the writer
looks at the changed sorts of client communications and
arrangement issues encompassing extensive open presentations.
He then chooses and build up a use worldview in which
individuals use individual gadgets to collaborate with extensive
open showcases. This clarifies the significance of telephones in
buyer responsiveness.
Gilbert, J., & Gilbert, J. B. (2012). Bring Your Own Device to
Work. Employees of organizations large and small continue to
“consumerism” the enterprise by
adopting mobile technology and bringing it to the workplace.
Many organizations have
allowed employees to use personal smart phones for quite some
time. But some are rethinking this idea by putting into
consideration, research work on the continued use.
Bradley, T. (2011). Pros and cons of bringing your own device
to work. PC World, December 20 2011. In this article the writer
gives an in-depth analysis of a worker taken with them a phone
15. to their respective work station. This he says is important as
they are able to concentrate more, as all situations that can
occur, they can easily get updates. Although this helps them
feel comfortable, it can interfere with their performance, if the
phones are used during working hours. Representatives are
increasingly liable to compose their own lives utilizing a
brilliant phone. They convey this desire to the work
environment and need to utilize their phones to arrange their
work life as well. This aim is much of the time called Bring
Your Own Device (BYOD) and is creating IT divisions some
worry.
Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith, M.,
& Steggles, P. (1999, September). Towards a better
understanding of context and context-awareness. In Handheld
and ubiquitous computing (pp. 304-307). Springer Berlin
Heidelberg. The reason for this article is to analyse the
variables that figure out if representatives take after Bring Your
Own Device (BYOD) arrangements through the perspective of
the Protection Motivation Theory. BYOD is quickly turning into
the standard instead of the special case. Subsequently, firms are
building up BYOD arrangements to address the danger intrinsic
in permitting people to utilize their own gadgets to get to or
store organization information. This paper reports the
aftereffects of a study of bookkeeping understudies, non-
bookkeeping understudies, and full-time workers.
References
Broad, C. (2014). Five types of ethical theory. London:
Routledge.
French, A. M., Guo, C., & Shim, J. P. (2014). Current status,
issues, and future of bring your own device (BYOD).
Communications of the Association for Information Systems,
35(10), 191-197.
Ghosh, A., Gajar, P. K., & Rai, S. (2013). Bring your own
device (BYOD): Security risks and mitigating strategies.
16. Journal of Global Research in Computer Science, 4(4), 62-70.
Jin, Z. (2014). Global technological change: from hard
technology to soft technology. Bristol, England; Portland:
Intellect Books.
Jones, S. (2012). Cybersociety 2.0: Revisiting computer-
mediated community and Technology. Thousand Oaks: SAGE
Publications.
Kranzberg, M., & Pursell, C. W. (2015). Technology in Western
Civilization. New York: Oxford Univ. Press.
Lennon, R. G. (2012). Bring your own device (BYOD) with
cloud 4 education. In Proceedings of the 3rd annual conference
on Systems, programming, and applications: software for
humanity (pp. 171-180). ACM.
Raths, D. (2012). Are You Ready for BYOD: Advice from the
Trenches on How to Prepare Your Wireless Network for the
Bring-Your-Own-Device Movement. THE Journal
(Technological Horizons In Education), 39(4), 28.