SlideShare a Scribd company logo
1 of 9
Download to read offline
GOING	
  MOBILE	
  WITH	
  ENTERPRISE	
  APPLICATIONS	
  |	
  White	
  Paper	
  |	
  Jan,	
  2012	
   	
   	
   P a g e 	
  |	
  1	
  
	
  
	
  
Going	
  Mobile	
  With	
  Enterprise	
  Applications	
  
A study on user behavior and perceptions
By	
  
	
  
Muzayun	
  Mukhtar	
  
Muzayun_Mukhtar@symantec.com	
  
	
  
Markus	
  Grotenhuis	
  
Markus_Grotenhuis@symantec.com	
  	
  
	
  
Anjeli	
  Singh	
  
Anjeli_Singh@symantec.com	
  
	
  
GOING	
  MOBILE	
  WITH	
  ENTERPRISE	
  APPLICATIONS	
  |	
  White	
  Paper	
  |	
  Jan,	
  2012	
   	
   	
   P a g e 	
  |	
  2	
  
EXECUTIVE	
  SUMMARY	
  
This	
  paper	
  presents	
  findings	
  from	
  three	
  research	
  
studies	
  carried	
  out	
  to	
  understand	
  the	
  user	
  behavior	
  
and	
  explore	
  the	
  value	
  in	
  using	
  mobile	
  devices	
  for	
  
accessing	
  enterprise	
  products.	
  The	
  focus	
  is	
  essentially	
  
on	
  the	
  expectations	
  of	
  the	
  end-­‐users,	
  namely,	
  
information	
  technology	
  (IT)	
  administrators.	
  In	
  this	
  
case,	
  we	
  were	
  exploring	
  how	
  the	
  users	
  of	
  enterprise	
  
products	
  might	
  want	
  to	
  leverage	
  mobile	
  technology	
  
to	
  access	
  their	
  everyday	
  tasks	
  and	
  information,	
  and	
  
therefore	
  identify	
  potential	
  opportunities	
  and	
  
challenges	
  for	
  extending	
  their	
  user	
  experience	
  to	
  such	
  
devices.	
  	
  
The	
  research	
  methods	
  followed	
  for	
  these	
  studies	
  
include	
  qualitative	
  tools	
  like	
  self	
  reporting	
  diaries	
  kept	
  
by	
  IT	
  administrators,	
  focus	
  group	
  discussion,	
  	
  and	
  a	
  
survey	
  conducted	
  among	
  the	
  customers,	
  who	
  were	
  
the	
  end	
  users	
  of	
  Symantec	
  products.	
  
In	
  these	
  studies,	
  it	
  was	
  found	
  that	
  use	
  of	
  mobile	
  
phones	
  is	
  ultimately	
  about	
  convenience,	
  simplicity,	
  
and	
  ease	
  of	
  use.	
  Today’s	
  IT	
  administrators	
  favor	
  and	
  
showed	
  a	
  desire	
  to	
  adapt	
  mobile	
  devices	
  as	
  their	
  
productivity	
  tool.	
  However,	
  these	
  are	
  not	
  seen	
  just	
  as	
  
supplementary	
  devices.	
  Mobile	
  devices	
  can	
  actually	
  
result	
  in	
  handling	
  their	
  daily	
  tasks	
  more	
  effectively,	
  
for	
  example	
  monitor	
  alerts	
  or	
  faults	
  in	
  the	
  data	
  center	
  
can	
  be	
  always	
  on	
  their	
  finger	
  tips.	
  Because	
  users	
  are	
  
already	
  getting	
  alert	
  notifications	
  through	
  emails,	
  a	
  
mobile	
  application	
  has	
  to	
  do	
  more	
  than	
  just	
  feed	
  
alerts.	
  It	
  is	
  revealed	
  that	
  users	
  would	
  want	
  to	
  have	
  
access	
  to	
  tasks	
  and	
  immediate	
  remediation	
  in	
  case	
  of	
  
faults.	
  For	
  critical	
  tasks,	
  an	
  alternate	
  choice	
  would	
  be	
  	
  
to	
  delegate	
  the	
  task	
  to	
  other	
  administrators	
  who	
  are	
  
available	
  to	
  perform	
  the	
  task,	
  especially	
  when	
  
necessary	
  remediation	
  is	
  too	
  complicated	
  to	
  do	
  from	
  
a	
  mobile	
  device.	
  	
  
User	
  concerns	
  in	
  using	
  the	
  mobile	
  devices	
  also	
  came	
  
up	
  during	
  these	
  studies	
  for	
  e.g.,	
  issues	
  related	
  to	
  
security	
  such	
  as	
  VPN	
  access	
  and	
  execution	
  of	
  critical	
  
and	
  bulk	
  operations.	
  	
  In	
  regards	
  to	
  the	
  use	
  of	
  mobile	
  
devices	
  by	
  the	
  IT	
  administrators,	
  enterprise	
  
environments	
  might	
  also	
  need	
  to	
  overcome	
  
challenges	
  withmanaging	
  security	
  and	
  protecting	
  
data,	
  device	
  authentication,	
  policies	
  regarding	
  
separation	
  of	
  personal	
  and	
  corporate	
  data.	
  	
  
KEYWORDS	
  
Enterprise,	
  User	
  experience,	
  Mobile	
  application,	
  IT	
  
administrative	
  tasks	
  
GOING	
  MOBILE	
  WITH	
  ENTERPRISE	
  APPLICATIONS	
  |	
  White	
  Paper	
  |	
  Jan,	
  2012	
   	
   	
   P a g e 	
  |	
  3	
  
CONTENTS	
  
EXECUTIVE	
  SUMMARY	
  ..................................................	
  2	
  
Keywords	
  ..................................................................	
  2	
  
1.	
   INTRODUCTION	
  ....................................................	
  4	
  
2.	
   ABOUT	
  THIS	
  PAPER	
  ..............................................	
  4	
  
3.	
   RESEARCH	
  METHODOLOGY	
  AND	
  STUDY	
  DETAILS	
  4	
  
3.1	
   Study	
  I	
  –	
  Diary	
  Study	
  ....................................	
  4	
  
3.2	
   Study	
  II	
  –	
  Focus	
  Group	
  .................................	
  5	
  
3.3	
   Study	
  III	
  -­‐	
  Survey	
  ..........................................	
  5	
  
4.	
   RESULTS	
  ................................................................	
  5	
  
4.1	
   Current	
  practices	
  and	
  company	
  policies	
  .....	
  5	
  
4.2	
   User	
  expectations	
  in	
  using	
  mobile	
  devices	
  ..	
  6	
  
4.3	
   User	
  perception	
  of	
  the	
  impact	
  ....................	
  7	
  
4.4	
   Concerns	
  and	
  challenges	
  to	
  overcome	
  ........	
  8	
  
5.	
   DISCUSSION	
  AND	
  CONCLUSION	
  ...........................	
  8	
  
6.	
   ACKNOWLEDGMENTS	
  ..........................................	
  9	
  
7.	
   REFERENCES	
  .........................................................	
  9	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
GOING	
  MOBILE	
  WITH	
  ENTERPRISE	
  APPLICATIONS	
  |	
  White	
  Paper	
  |	
  Jan,	
  2012	
   	
   	
   P a g e 	
  |	
  4	
  
1. INTRODUCTION	
  
	
  
*
Nearly	
  75%	
  of	
  the	
  American	
  workforce	
  and	
  35%	
  of	
  
the	
  global	
  workforce	
  will	
  be	
  mobile	
  by	
  2013	
  .	
  
Symantec’s	
  strategy	
  for	
  mobile	
  (one	
  of	
  the	
  pillars	
  of	
  
FQ11-­‐12)	
  aims	
  to	
  drive	
  customer	
  satisfaction	
  by	
  
extending	
  applications	
  to	
  mobile	
  devices.	
  As	
  part	
  of	
  	
  
preliminary	
  research	
  during	
  late	
  2010,	
  	
  User	
  
Experience	
  (UX)	
  team	
  which	
  is	
  a	
  part	
  of	
  Shared	
  
Engineering	
  Services	
  (SES)	
  in	
  Symantec	
  studied	
  and	
  
analyzed	
  the	
  current	
  industrial	
  scene	
  and	
  trends,	
  
completed	
  initial	
  investigation	
  on	
  users	
  and	
  also	
  
developed	
  some	
  proof	
  of	
  concepts	
  (POCs)	
  for	
  various	
  
Symantec	
  products.	
  Our	
  research	
  showed	
  that	
  the	
  
next	
  generation	
  IT	
  administrators	
  have	
  a	
  different	
  
relationship	
  with	
  technology	
  as	
  compared	
  to	
  their	
  
predecessors;	
  they	
  are	
  living	
  with	
  social	
  networking,	
  
using	
  iPhones	
  and	
  iPads	
  for	
  their	
  personal	
  use.	
  They	
  
are	
  bringing	
  these	
  new	
  devices	
  into	
  corporate	
  
settings,	
  demanding	
  newer	
  and	
  more	
  exciting	
  way	
  of	
  
doing	
  their	
  productive	
  tasks.	
  Many	
  industry	
  and	
  
academic	
  research	
  studies	
  were	
  referred	
  to	
  gather	
  
inputs	
  on	
  the	
  same.	
  We	
  also	
  felt	
  a	
  need	
  to	
  
understand	
  the	
  requirements	
  from	
  the	
  point	
  of	
  view	
  
of	
  enterprise	
  IT	
  experts.	
  	
  
Moving	
  forward,	
  we	
  wanted	
  to	
  learn	
  more	
  from	
  our	
  
end-­‐users,	
  get	
  feedback	
  on	
  the	
  use-­‐cases	
  that	
  made	
  
sense	
  for	
  porting	
  our	
  enterprise	
  applications	
  on	
  
mobile	
  devices	
  and	
  identify	
  non-­‐conforming	
  data	
  
points,	
  if	
  there	
  are	
  any.	
  	
  
Research	
  studies	
  were	
  conducted	
  to	
  gather	
  insights	
  
on	
  the	
  type	
  of	
  tasks	
  that	
  IT	
  professionals	
  perform	
  on	
  a	
  
mobile	
  phone	
  vs.	
  a	
  tablet	
  device	
  vs.	
  a	
  desktop	
  
computer	
  workstation.	
  We	
  also	
  aimed	
  at	
  developing	
  a	
  
better	
  understanding	
  of	
  the	
  current	
  practices	
  with	
  
regard	
  to	
  use	
  of	
  mobile	
  devices,	
  uncover	
  users’	
  needs	
  
and	
  expectations.	
  Enterprise	
  environment	
  policies,	
  
strategies,	
  and	
  concerns	
  in	
  regards	
  to	
  mobile	
  devices	
  
were	
  also	
  investigated.	
  	
  
2. ABOUT	
  THIS	
  PAPER	
  
In	
  this	
  paper,	
  we	
  present	
  the	
  main	
  findings	
  from	
  three	
  
rounds	
  of	
  user	
  research	
  studies	
  conducted	
  across	
  IT	
  
professionals	
  in	
  different	
  roles	
  during	
  FQ11-­‐12.	
  This	
  
paper	
  is	
  put	
  together	
  so	
  that	
  we	
  could	
  reach	
  to	
  the	
  
wider	
  audience	
  within	
  the	
  industry,	
  make	
  this	
  
research	
  available	
  to	
  the	
  internal	
  developers	
  and	
  
designers	
  who	
  would	
  be	
  designing	
  future	
  mobile	
  
enterprise	
  applications	
  for	
  our	
  end-­‐users.	
  	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
*
	
  Source:	
  IDC	
  Market	
  Intelligence	
  2011	
  
First,	
  we	
  summarize	
  the	
  research	
  methodology	
  and	
  
participant	
  profiles.	
  Then,	
  we	
  give	
  an	
  understanding	
  
of	
  user	
  response	
  with	
  respect	
  to	
  mobile	
  devices.	
  
Finally,	
  in	
  conclusion,	
  we	
  summarize	
  our	
  findings	
  and	
  
their	
  usefulness,	
  and	
  also	
  talk	
  about	
  plans	
  to	
  pursue	
  
further	
  research	
  in	
  the	
  domain.	
  	
  
3. RESEARCH	
  METHODOLOGY	
  AND	
  
STUDY	
  DETAILS	
  
In	
  this	
  section,	
  we	
  describe	
  the	
  various	
  study	
  
techniques	
  which	
  were	
  employed	
  to	
  gather	
  insights	
  
from	
  the	
  end-­‐users	
  relating	
  to	
  current	
  practices,	
  their	
  
expectations	
  and	
  perceptions	
  of	
  the	
  mobile	
  devices.	
  	
  
In	
  each	
  of	
  these	
  studies,	
  we	
  had	
  different	
  set	
  of	
  
participants.	
  We	
  mostly	
  relied	
  on	
  what	
  the	
  
participants	
  have	
  shared	
  with	
  the	
  researchers	
  and	
  
further	
  analysis	
  of	
  the	
  same.	
  The	
  contextual	
  
environment	
  understanding	
  is	
  not	
  part	
  of	
  these	
  
studies.	
  One	
  of	
  the	
  studies	
  was	
  a	
  focus	
  group[5]	
  
discussion,	
  which	
  was	
  carried	
  out	
  in	
  a	
  face	
  to	
  face	
  
interaction	
  with	
  the	
  end-­‐users,	
  in	
  a	
  usability	
  lab.	
  
[Study	
  II	
  –	
  Focus	
  Group]	
  
These	
  studies	
  were	
  conducted	
  to	
  gain	
  insights	
  for	
  
designing	
  a	
  new	
  experience	
  for	
  our	
  end-­‐users.	
  As	
  the	
  
field	
  data	
  collected	
  was	
  qualitative	
  and	
  descriptive	
  in	
  
nature,	
  and	
  the	
  data	
  collection	
  methods	
  were	
  very	
  
effort	
  intensive,	
  the	
  number	
  of	
  users	
  participating	
  in	
  
these	
  studies	
  is	
  not	
  sufficiently	
  large	
  to	
  make	
  
generalizations	
  on	
  the	
  preferences	
  of	
  IT	
  
administrators.	
  However,	
  the	
  goal	
  of	
  this	
  paper	
  is	
  not	
  
to	
  provide	
  a	
  generalized	
  account	
  of	
  the	
  working	
  
methods	
  of	
  IT	
  administrators,	
  rather	
  to	
  draw	
  
inspiration	
  for	
  designing	
  the	
  mobile	
  enterprise	
  
applications	
  from	
  what	
  our	
  users	
  have	
  cited.	
  	
  
Following	
  sections	
  give	
  detailed	
  information	
  on	
  the	
  
methodologies	
  followed	
  and	
  participant	
  profiles:	
  
3.1 Study	
  I	
  –	
  Diary	
  Study	
  
The	
  study	
  I	
  was	
  carried	
  out	
  to	
  understand	
  the	
  
everyday	
  tasks	
  of	
  IT	
  administrators,	
  duration	
  of	
  tasks,	
  
their	
  frequencies,	
  products	
  used,	
  environments	
  and	
  
any	
  dependencies	
  on	
  peers.	
  In	
  this	
  study,	
  activity	
  
logging	
  technique	
  was	
  followed	
  in	
  which	
  IT	
  
administrators	
  recorded	
  their	
  daily	
  activities	
  for	
  a	
  
duration	
  of	
  5	
  weekdays.	
  By	
  activities,	
  we	
  mean	
  tasks	
  
which	
  they	
  do	
  regularly	
  like	
  configuring	
  a	
  storage	
  for	
  
a	
  end-­‐user,	
  deploying	
  certain	
  number	
  of	
  virtual	
  
machines	
  (VMs)	
  for	
  a	
  business	
  unit	
  or	
  configuring	
  an	
  
application	
  etc.	
  These	
  IT	
  administrators	
  represented	
  
various	
  business	
  groups	
  within	
  Symantec:	
  Storage	
  
Availability	
  Management	
  Group	
  (SAMG),	
  Symantec	
  
Backup	
  Executive	
  (BE)	
  and	
  Compliance	
  Suite	
  (CCS).	
  In	
  
GOING	
  MOBILE	
  WITH	
  ENTERPRISE	
  APPLICATIONS	
  |	
  White	
  Paper	
  |	
  Jan,	
  2012	
   	
   	
   P a g e 	
  |	
  5	
  
total,	
  10	
  participants	
  contributed	
  in	
  this	
  research	
  
study.	
  These	
  belonged	
  to	
  different	
  job	
  profiles;	
  IT	
  
Administrators	
  (8),	
  Senior	
  IT	
  Architect	
  (1),	
  IT	
  
Management	
  (1).	
  Participants	
  were	
  also	
  asked	
  to	
  
provide	
  their	
  comments	
  and	
  ideas	
  on	
  the	
  possibility	
  
of	
  carrying	
  out	
  their	
  everyday	
  tasks	
  on	
  mobile	
  
devices.	
  	
  
In	
  total,	
  118	
  tasks	
  were	
  reported,	
  out	
  of	
  which	
  98	
  
tasks	
  were	
  seen	
  as	
  feasible	
  using	
  mobile	
  devices.	
  
Users	
  even	
  had	
  certain	
  expectations	
  as	
  how	
  they	
  
should	
  take	
  place	
  in	
  a	
  mobile	
  application.	
  The	
  
remaining	
  were	
  found	
  either	
  challenging	
  or	
  were	
  
more	
  to	
  do	
  with	
  employee	
  development/	
  internal	
  
errands.	
  
3.2 Study	
  II	
  –	
  Focus	
  Group	
  
In	
  the	
  second	
  study,	
  we	
  initially	
  interviewed	
  
participants	
  to	
  gather	
  open-­‐ended	
  responses	
  
regarding	
  current	
  practices	
  with	
  regard	
  to	
  use	
  of	
  
mobile	
  devices,	
  their	
  needs	
  and	
  expectations.	
  This	
  
was	
  followed	
  by	
  an	
  interactive	
  session,	
  Focus	
  Group	
  
(FG),	
  in	
  which	
  participants	
  were	
  asked	
  to	
  share	
  their	
  
thoughts,	
  perceptions,	
  and	
  ideas	
  about	
  using	
  
Symantec	
  enterprise	
  products	
  on	
  a	
  mobile	
  device.	
  
The	
  session	
  lasted	
  for	
  90	
  minutes.	
  Participants	
  were	
  
mostly	
  Symantec	
  customers	
  	
  attending	
  the	
  annual	
  
Symantec	
  Vision	
  conference	
  2011	
  in	
  Las	
  Vegas.	
  
Participants	
  were	
  15	
  in	
  number,	
  belonging	
  to	
  
different	
  profiles	
  like	
  IT	
  Operations	
  (7),	
  IT	
  
Management	
  (5),	
  Security/Compliance	
  (3).	
  These	
  
participant	
  were	
  recruited	
  in	
  advance	
  through	
  email	
  
and	
  on	
  spot,	
  their	
  time	
  was	
  reserved.	
  During	
  the	
  
session,	
  we	
  asked	
  questions	
  about	
  general	
  role	
  of	
  
mobile	
  devices	
  in	
  their	
  work,	
  the	
  kind	
  of	
  information	
  
and	
  tasks	
  they	
  would	
  want	
  to	
  see,	
  and	
  any	
  challenges	
  
they	
  foresee.	
  
Participants	
  primarily	
  showed	
  excitement	
  that	
  
Symantec	
  is	
  moving	
  towards	
  mobile	
  space,	
  but	
  at	
  the	
  
same	
  time	
  they	
  recognized	
  that	
  any	
  enterprise	
  
information	
  exposed	
  on	
  a	
  mobile	
  device	
  has	
  to	
  be	
  
incredibly	
  secure.	
  They	
  believed	
  Symantec	
  would	
  be	
  
able	
  to	
  handle	
  this	
  proficiently.	
  
3.3 Study	
  III	
  -­‐	
  Survey	
  
For	
  the	
  Study	
  III,	
  we	
  relied	
  on	
  an	
  online	
  survey	
  to	
  
collect	
  quantitative	
  data	
  to	
  further	
  support	
  our	
  
qualitative	
  studies.	
  This	
  survey	
  was	
  deployed	
  among	
  
the	
  attendees	
  at	
  2011	
  Vision,	
  Symantec's	
  annual	
  user	
  
and	
  technical	
  conference.	
  These	
  included	
  customers	
  
and	
  Symantec	
  internal	
  employees.	
  The	
  online	
  survey	
  
included	
  questions	
  focused	
  on	
  current	
  practices,	
  type	
  
of	
  Symantec	
  products	
  they	
  are	
  currently	
  using	
  and	
  
their	
  mobile	
  expectations.	
  104	
  participants	
  completed	
  
the	
  survey;	
  they	
  were	
  from	
  enterprise	
  &	
  large	
  
businesses	
  (86%)	
  and	
  represented	
  various	
  industries.	
  
The	
  majority	
  of	
  them	
  were	
  from	
  Finance/Insurance	
  
(18.45	
  %),	
  and	
  Computer	
  and	
  Electronics	
  (15.53%).	
  
Most	
  of	
  the	
  participants	
  were	
  using	
  more	
  than	
  three	
  
Symantec	
  products.	
  
4. RESULTS	
  
This	
  section	
  presents	
  the	
  significant	
  findings	
  from	
  the	
  
above	
  mentioned	
  studies.	
  The	
  various	
  insights	
  
collected	
  and	
  the	
  observation	
  recorded	
  were	
  
analyzed	
  in	
  order	
  to	
  reveal	
  patterns	
  and	
  common	
  
elements	
  across	
  them.	
  Comments	
  from	
  the	
  
participants	
  were	
  also	
  recorded	
  to	
  recognize	
  the	
  
user’s	
  aspirations.	
  
The	
  results	
  are	
  divided	
  into	
  four	
  main	
  sections:	
  (1)	
  
Present	
  User	
  Behaviors	
  and	
  Company	
  Policies,	
  (2)	
  
User	
  Expectations	
  in	
  using	
  Mobile	
  Devices,	
  (3)	
  User	
  
Perception	
  of	
  the	
  Impact,	
  and	
  (4)	
  Concerns	
  and	
  
Challenges	
  to	
  Overcome.	
  	
  
4.1 Current	
  practices	
  and	
  company	
  
policies	
  
Current	
  Mobile	
  Device	
  Practices	
  	
  
The	
  majority	
  of	
  work	
  related	
  activities	
  that	
  users	
  
currently	
  perform	
  on	
  mobile	
  phones	
  are	
  related	
  to	
  
monitoring	
  jobs	
  through	
  email	
  alerts,	
  besides	
  making	
  
office	
  related	
  calls	
  and	
  IM,	
  office	
  email	
  access	
  and	
  	
  
calendar/schedule.	
  (Re)viewing	
  and	
  consuming	
  work	
  
related	
  documents	
  are	
  also	
  generally	
  done.	
  However,	
  
it	
  is	
  found	
  very	
  difficult	
  to	
  edit	
  or	
  create	
  documents.	
  	
  
Context	
  matters	
  a	
  lot	
  to	
  users,	
  in	
  the	
  way	
  that	
  they	
  do	
  
care	
  to	
  think	
  where	
  they	
  are	
  using	
  their	
  devices	
  to	
  do	
  
professional	
  tasks	
  –	
  however,	
  mobile	
  usage	
  is	
  not	
  
found	
  exclusive	
  to	
  any	
  location.	
  Users	
  felt	
  that	
  they	
  
could	
  use	
  the	
  device	
  anywhere,	
  even	
  when	
  they	
  are	
  
at	
  their	
  desk.	
  	
  
In	
  the	
  course	
  of	
  these	
  studies,	
  Blackberry	
  seemed	
  to	
  
be	
  the	
  device	
  most	
  used	
  for	
  official	
  use,	
  among	
  the	
  
customers.	
  A	
  mixed	
  type	
  of	
  user	
  behavior	
  was	
  noticed	
  
in	
  terms	
  of	
  the	
  number	
  of	
  devices	
  owned	
  and	
  
maintained	
  by	
  the	
  users	
  –	
  some	
  users	
  keep	
  one	
  
device	
  for	
  everything	
  while	
  others	
  prefer	
  two	
  
separate	
  devices	
  for	
  personal	
  and	
  corporate	
  use.	
  This	
  
might	
  be	
  driven	
  by	
  the	
  company	
  policies	
  and	
  to	
  some	
  
extent,	
  personal	
  preferences.	
  	
  At	
  present,	
  tablets	
  
mostly	
  are	
  used	
  as	
  consumption	
  devices,	
  not	
  as	
  
production	
  devices	
  like	
  the	
  mobile	
  phones.	
  	
  
	
  
GOING	
  MOBILE	
  WITH	
  ENTERPRISE	
  APPLICATIONS	
  |	
  White	
  Paper	
  |	
  Jan,	
  2012	
   	
   	
   P a g e 	
  |	
  6	
  
Enterprise	
  Mobile	
  Device	
  Policies	
  
There	
  are	
  certain	
  policies	
  in	
  the	
  organizations	
  which	
  
define	
  what	
  type	
  of	
  devices	
  IT	
  professionals	
  can	
  use	
  
within	
  the	
  enterprise.	
  Blackberry	
  is	
  still	
  the	
  one	
  
mobile	
  device	
  that	
  many	
  organizations	
  support	
  
exclusively.	
  iPhone	
  and	
  Android	
  device	
  support	
  is	
  
increasing,	
  and	
  this	
  is	
  mainly	
  driven	
  by	
  executives,	
  
creative	
  staff	
  and	
  sales	
  group.	
  While	
  as,	
  support	
  of	
  
tablet	
  devices	
  is	
  increasing	
  slower	
  than	
  mobile	
  phone	
  
support,	
  but	
  it	
  is	
  picking	
  up.	
  Again,	
  this	
  is	
  mainly	
  
driven	
  by	
  the	
  executives	
  who	
  stretch	
  the	
  
possibilities[1].	
  	
  
Some	
  customers	
  said	
  that	
  they	
  don’t	
  trust	
  mobile	
  
devices	
  to	
  be	
  very	
  secure,	
  and	
  hence	
  there	
  are	
  strict	
  
policies	
  to	
  limit	
  data	
  exposure	
  on	
  mobile	
  devices.	
  The	
  
wide	
  range	
  of	
  mobile	
  device	
  policies	
  were	
  identified	
  
in	
  these	
  studies	
  which	
  would	
  broadly	
  fit	
  in	
  one	
  of	
  
below	
  mentioned	
  policy	
  types,	
  or	
  sometimes	
  even	
  a	
  
mix:	
  
! Only	
  company-­‐owned	
  mobile	
  devices	
  (Blackberry	
  
so	
  far)	
  are	
  allowed	
  and	
  supported.	
  
! Multiple	
  devices	
  (Blackberry,	
  iOS,	
  Android,	
  
WebOS,	
  Windows	
  Phone)	
  are	
  supported,	
  but	
  it	
  
has	
  to	
  be	
  a	
  company-­‐owned	
  and	
  managed	
  
device.	
  
! Money	
  is	
  provided	
  for	
  personal	
  device	
  used	
  for	
  
official	
  work.	
  
! Professionals	
  can	
  bring	
  and	
  use	
  your	
  own	
  
devices.	
  
! IT	
  can	
  wipe	
  company	
  owned	
  devices,	
  even	
  if	
  
there	
  is	
  personal	
  data	
  on	
  it.	
  
4.2 User	
  expectations	
  in	
  using	
  mobile	
  
devices	
  
Participants	
  showed	
  excitement	
  in	
  using	
  mobile	
  
devices	
  to	
  perform	
  many	
  of	
  their	
  monitoring	
  and	
  
infrastructure	
  management	
  related	
  tasks.	
  Data	
  from	
  
the	
  studies	
  suggests	
  that	
  users	
  find	
  mobile	
  devices	
  
good	
  for	
  simple	
  and	
  uncomplicated	
  tasks	
  consuming	
  
less	
  time	
  and	
  with	
  low	
  impact	
  and	
  low	
  risk	
  (e.g.,	
  
restart	
  a	
  job).	
  Users	
  find	
  mobile	
  devices	
  inadequate	
  
for	
  complex	
  tasks	
  that	
  require	
  concentrated/	
  
dedicated	
  focus,	
  tasks	
  with	
  critical	
  impacts	
  (e.g.,	
  a	
  
production	
  change),	
  or	
  tasks	
  which	
  are	
  carried	
  out	
  on	
  
bulk	
  items.	
  
Mobile	
  devices	
  are	
  seen	
  as	
  most	
  beneficial	
  for	
  vital	
  
monitoring	
  jobs.	
  Participants	
  reported	
  that	
  they	
  
would	
  want	
  to	
  see	
  alerts,	
  system/component	
  faults,	
  
authentication	
  checks,	
  in-­‐progress	
  activity	
  
termination	
  information	
  on	
  their	
  handheld	
  devices.	
  
However,	
  they	
  expect	
  a	
  visual	
  differentiation	
  
between	
  critical	
  problems	
  and	
  minor	
  issues.	
  The	
  
mobile	
  phone	
  is	
  also	
  expected	
  to	
  help	
  remediation	
  
especially	
  in	
  emergency	
  situations.	
  Reporting	
  and	
  
displaying	
  all	
  data	
  to	
  act	
  is	
  found	
  good	
  enough	
  in	
  
these	
  situations,	
  which	
  can	
  allow	
  them	
  to	
  take	
  further	
  
action.	
  	
  
Among	
  the	
  hardware	
  related	
  tasks,	
  keeping	
  an	
  
inventory,	
  management	
  and	
  allocation	
  of	
  assets	
  were	
  
seen	
  as	
  possible	
  while	
  mobile.	
  Very	
  often,	
  these	
  tasks	
  
are	
  not	
  seen	
  as	
  high	
  focus	
  tasks.	
  Hardware	
  
management	
  activities	
  which	
  required	
  physical	
  
involvement	
  for	
  e.g.,	
  access	
  to	
  labs,	
  users	
  were	
  
skeptical	
  as	
  how	
  mobile	
  devices	
  can	
  be	
  helpful.	
  
Software	
  related	
  tasks	
  like	
  configuration	
  of	
  apps,	
  
virtualization,	
  operating	
  system	
  installation	
  were	
  
reported	
  as	
  tasks	
  which	
  take	
  5-­‐10	
  minutes,	
  but	
  could	
  
be	
  easily	
  executed	
  on	
  mobile	
  devices.	
  
Storage	
  related	
  tasks	
  like	
  provisioning	
  and	
  zoning	
  
were	
  seen	
  as	
  quick	
  and	
  simple	
  on	
  mobile	
  devices	
  as	
  
these	
  are	
  short	
  duration	
  tasks.	
  	
  
Backup	
  related	
  tasks	
  which	
  were	
  found	
  ideal	
  on	
  
mobile	
  devices	
  included	
  status	
  check	
  of	
  the	
  critical	
  
backups	
  running,	
  reporting	
  vulnerabilities	
  and	
  quick	
  
remediation,	
  and	
  some	
  amount	
  of	
  restoration	
  of	
  data	
  
remotely.	
  
Virus	
  protection	
  was	
  also	
  reported,	
  though	
  to	
  a	
  
smaller	
  extend,	
  this	
  could	
  be	
  because	
  not	
  many	
  of	
  our	
  
participants	
  were	
  in	
  that	
  role.	
  	
  
For	
  maintenance	
  of	
  the	
  terminal	
  server	
  which	
  
happens	
  only	
  e.g.,	
  quarterly,	
  it	
  was	
  expected	
  that	
  it	
  
could	
  be	
  triggered	
  remotely	
  using	
  a	
  mobile	
  device.	
  
This	
  could	
  also	
  have	
  a	
  reminder	
  on	
  the	
  handheld	
  
device.	
  
Knowledge/	
  Information	
  gathering	
  was	
  another	
  place	
  
where	
  users	
  wanted	
  mobile	
  devices	
  to	
  help	
  them.	
  
Access	
  to	
  tech-­‐notes	
  and	
  wikis	
  could	
  also	
  allow	
  them	
  
to	
  interact	
  with	
  fellow	
  team	
  members	
  and	
  sometimes	
  
cross	
  check	
  on	
  the	
  solutions	
  provided	
  by	
  them.	
  	
  
GOING	
  MOBILE	
  WITH	
  ENTERPRISE	
  APPLICATIONS	
  |	
  White	
  Paper	
  |	
  Jan,	
  2012	
   	
   	
   P a g e 	
  |	
  7	
  
Close	
  to	
  what	
  we	
  expected,	
  most	
  of	
  the	
  participants	
  
preferred	
  optimized	
  interactions	
  and	
  most	
  critical	
  
items	
  on	
  their	
  mobile	
  devices,	
  as	
  the	
  following	
  
comments	
  reveal:	
  
“I	
  can	
  quickly	
  know	
  the	
  storage	
  capacity	
  or	
  allocation	
  
of	
  the	
  data	
  center	
  regardless	
  of	
  location	
  where	
  I	
  am	
  
	
  “Combine	
  activity	
  with	
  communication	
  -­‐	
  I	
  would	
  want	
  
to	
  connect	
  to	
  any	
  server	
  remotely,	
  perform	
  the	
  critical	
  
task	
  I	
  have	
  to	
  do	
  and	
  also	
  send	
  update	
  to	
  the	
  end	
  user	
  
or	
  other	
  admin	
  via	
  mobile	
  device.	
  
With	
  regard	
  to	
  accessing	
  Symantec	
  enterprise	
  
software	
  on	
  mobile	
  devices,	
  most	
  of	
  the	
  users	
  
suggested	
  that	
  we	
  should	
  focus	
  on	
  the	
  product’s	
  core	
  
functionality.	
  Most	
  of	
  our	
  customers	
  expected	
  a	
  
mobile	
  app	
  to	
  be	
  free.	
  In	
  fact,	
  some	
  even	
  were	
  of	
  an	
  
opinion	
  that	
  we	
  should	
  first	
  focus	
  on	
  smartphones	
  
and	
  then	
  on	
  tablets.	
  	
  
Overall,	
  studies	
  revealed	
  that	
  the	
  mobile	
  usage	
  
should	
  be	
  limited	
  to	
  pertinent	
  information	
  and	
  tasks	
  
(i.e.,	
  role	
  based	
  information	
  &	
  contextual	
  
information),	
  continuous	
  updates	
  on	
  general	
  sense	
  of	
  
status	
  and	
  health	
  of	
  the	
  enterprise,	
  for	
  instance,	
  is	
  
everything	
  up	
  to	
  date.	
  Execution	
  of	
  a	
  pre-­‐configured	
  
job	
  could	
  be	
  triggered	
  using	
  the	
  mobile	
  device.	
  Policy	
  
management	
  and	
  updates	
  could	
  be	
  available	
  to	
  the	
  
users,	
  like	
  what	
  is	
  the	
  current	
  policy,	
  when	
  was	
  it	
  
applied	
  etc.	
  Sending	
  and	
  viewing	
  reports	
  could	
  have	
  
more	
  engaging	
  user	
  experience	
  on	
  the	
  mobile	
  
devices.	
  In	
  fact,	
  users	
  also	
  felt	
  that	
  a	
  24x7	
  access	
  for	
  
people	
  performing	
  critical	
  tasks	
  (e.g.,	
  backup	
  
administrators,	
  HA	
  administrators)	
  should	
  be	
  enabled	
  
on	
  mobile	
  devices,	
  considering	
  the	
  nature	
  of	
  their	
  
jobs.	
  
4.3 User	
  perception	
  of	
  the	
  impact	
  	
  
Most	
  participants	
  believe	
  that	
  mobility	
  would	
  surely	
  
change	
  the	
  way	
  they	
  work	
  currently,	
  as	
  it	
  will	
  give	
  
them	
  more	
  control	
  over	
  their	
  work.	
  	
  
Based	
  on	
  participants’	
  perception,	
  we	
  believe	
  that	
  
most	
  of	
  them	
  saw	
  a	
  reduction	
  in	
  time	
  to	
  execute	
  an	
  
activity	
  or	
  resolve	
  an	
  issue.	
  For	
  example,	
  they	
  can	
  
perform	
  a	
  ‘Ping	
  test’	
  on	
  a	
  server	
  to	
  get	
  the	
  status	
  or	
  
trigger	
  reboot	
  of	
  a	
  machine	
  remotely	
  using	
  a	
  mobile	
  
device.	
  	
  Escalations	
  on	
  failure	
  of	
  important	
  hardware	
  
could	
  also	
  be	
  handled	
  earlier	
  than	
  otherwise.	
  
They	
  could	
  also	
  perceive	
  that	
  wait	
  time	
  between	
  
activities	
  could	
  be	
  avoided	
  while	
  completing	
  their	
  task	
  
at	
  hand.	
  Independent	
  of	
  the	
  location	
  she	
  is	
  at,	
  user	
  
can	
  get	
  an	
  approval	
  on	
  storage	
  allocation,	
  or	
  manage	
  
storage	
  devices	
  and	
  send	
  immediate	
  alert	
  messages	
  
to	
  the	
  other	
  administrators	
  to	
  sync	
  up	
  instead	
  of	
  
waiting	
  to	
  connect	
  to	
  e-­‐mail.	
  Users	
  also	
  indicated	
  they	
  
would	
  like	
  to	
  have	
  an	
  ability	
  to	
  instantly	
  update	
  the	
  
end-­‐user	
  or	
  other	
  IT	
  administrators	
  when	
  the	
  task	
  at	
  
hand	
  is	
  done.	
  An	
  example	
  of	
  wait	
  time	
  seen	
  as	
  a	
  
bottleneck	
  in	
  the	
  pipeline	
  of	
  action	
  is	
  shown	
  in	
  fig	
  2.	
  
Participants	
  pointed	
  out	
  that	
  they	
  would	
  like	
  to	
  have	
  
End	
  user	
  raises	
  
request	
  	
  for	
  
storage	
  (trigger)	
  
Junior	
  admin	
  
manages/checks	
  
requirement	
  
Junior	
  admin	
  
sends	
  for	
  
approval	
  
Senior	
  admin	
  
receives	
  approval	
  
request	
  
Senior	
  admin	
  
assess/approves	
  
the	
  request	
  
Junior	
  admin	
  
receives	
  approval	
  
Junior	
  admin	
  
completes	
  task	
  
Junior	
  admin	
  
communicates	
  to	
  
user	
  
User	
  gets	
  an	
  
update	
  of	
  job	
  
done	
  
Figure	
  1:	
  Survey	
  data	
  showing	
  the	
  type	
  of	
  activities	
  users	
  wanted	
  to	
  view	
  and	
  access	
  from	
  the	
  mobile	
  devices.	
  
Figure	
  2:	
  Diagram	
  showing	
  the	
  wait	
  time	
  between	
  various	
  steps	
  while	
  performing	
  a	
  task.	
  
GOING	
  MOBILE	
  WITH	
  ENTERPRISE	
  APPLICATIONS	
  |	
  White	
  Paper	
  |	
  Jan,	
  2012	
   	
   	
   P a g e 	
  |	
  8	
  
an	
  option	
  to	
  delegate	
  the	
  task	
  to	
  other	
  admins	
  who	
  
are	
  available	
  to	
  perform	
  the	
  task,	
  especially	
  when	
  
necessary	
  remediation	
  is	
  too	
  complicated	
  to	
  do	
  from	
  
a	
  mobile	
  device.	
  That	
  way,	
  resolution	
  of	
  critical	
  and	
  
high	
  priority	
  tasks	
  would	
  happen	
  in	
  time,	
  since	
  the	
  
user	
  would	
  be	
  able	
  to	
  have	
  a	
  look	
  at	
  it	
  even	
  before	
  
she	
  has	
  no	
  access	
  to	
  the	
  machine.	
  
What	
  makes	
  a	
  mobile	
  enterprise	
  app	
  different	
  from	
  a	
  
mobile	
  consumer	
  app?	
  
According	
  to	
  the	
  participants,	
  an	
  enterprise	
  
application	
  requires	
  more	
  security	
  management	
  and	
  
superior	
  policies	
  with	
  regard	
  to	
  data	
  protection.	
  It	
  is	
  
also	
  evident	
  that	
  corporate	
  standards	
  are	
  changing	
  
very	
  quickly	
  with	
  the	
  change	
  in	
  the	
  usage	
  patterns	
  of	
  
mobile	
  technology,	
  data	
  security	
  still	
  remains	
  a	
  
concern	
  which	
  is	
  relatively	
  less	
  crucial	
  in	
  the	
  
consumer	
  apps.	
  
We	
  also	
  uncovered	
  that	
  from	
  the	
  end-­‐user	
  point	
  of	
  
view,	
  there	
  should	
  be	
  no	
  difference	
  when	
  it	
  comes	
  to	
  
the	
  user	
  experience	
  of	
  using	
  the	
  enterprise	
  app	
  on	
  
mobile	
  devices.	
  	
  
The	
  following	
  comments	
  about	
  the	
  user	
  experience	
  
on	
  mobile	
  devices	
  were	
  stated	
  by	
  the	
  participants:	
  
“Basically,	
  anything	
  I	
  can	
  almost	
  do	
  on	
  a	
  PC	
  or	
  Citrix,	
  I	
  
would	
  like	
  to	
  do	
  on	
  the	
  device	
  as	
  well.	
  
“A	
  Symantec	
  Backup	
  Exec	
  mobile	
  app	
  should	
  be	
  like	
  
the	
  baby	
  monitor	
  I	
  have	
  at	
  home.	
  
4.4 Concerns	
  and	
  challenges	
  to	
  overcome	
  
User	
  Concerns	
  of	
  Mobile	
  Usage	
  
Users	
  seemed	
  to	
  be	
  uncomfortable	
  when	
  it	
  comes	
  to	
  
making	
  a	
  change	
  in	
  the	
  production	
  environment	
  
through	
  a	
  mobile	
  device.	
  Creating	
  a	
  new	
  job	
  or	
  
performing	
  a	
  complex	
  task	
  was	
  seen	
  as	
  challenging	
  on	
  
mobile	
  devices,	
  as	
  can	
  be	
  seen	
  in	
  the	
  following	
  
excerpt:	
  
“You	
  cannot	
  expect	
  someone	
  to	
  do	
  heavy	
  lifting	
  tasks	
  
on	
  a	
  small	
  mobile	
  phone.	
  	
  
Reasons	
  for	
  such	
  concerns	
  range	
  from	
  security	
  of	
  
such	
  devices	
  for	
  e.g.,	
  what	
  happens	
  when	
  the	
  device	
  
is	
  stolen	
  or	
  lost,	
  to	
  human	
  error,	
  as	
  it	
  is	
  seen	
  that	
  
people	
  don’t	
  pay	
  as	
  much	
  attention	
  when	
  digesting	
  
information	
  on	
  a	
  mobile	
  device.	
  According	
  to	
  the	
  
users,	
  complex	
  tasks	
  requires	
  focus;	
  mobile	
  devices	
  
don’t	
  always	
  allow	
  that.[2]	
  
	
  
Configuring	
  a	
  complex	
  security	
  product	
  which	
  takes	
  
more	
  time	
  or	
  making	
  a	
  policy	
  change	
  that	
  could	
  have	
  
far	
  reaching	
  impacts	
  needs	
  to	
  be	
  well	
  evaluated	
  
before	
  applying.	
  It’s	
  impact	
  could	
  be	
  shown	
  upfront	
  
while	
  the	
  user	
  executes	
  such	
  task	
  via	
  a	
  mobile	
  device.	
  	
  
Enterprise	
  Challenges	
  
Getting	
  access	
  to	
  the	
  corporate	
  network	
  always	
  could	
  
be	
  a	
  challenge,	
  especially	
  if	
  VPN	
  gateway	
  does	
  not	
  
work,	
  which	
  means	
  access	
  to	
  nothing	
  except	
  email.	
  
Participants	
  who	
  were	
  managing	
  security	
  also	
  showed	
  
concern	
  on	
  how	
  to	
  protect	
  confidential	
  information	
  
on	
  a	
  mobile	
  device.	
  Encryption,	
  Device	
  wipe	
  
technologies	
  are	
  some	
  of	
  the	
  contemporary	
  
techniques.	
  
At	
  present,	
  managing	
  and	
  securing	
  iOS	
  and	
  Android	
  
devices	
  is	
  seen	
  as	
  a	
  challenge	
  by	
  corporate.	
  
Blackberry	
  devices	
  are	
  considered	
  a	
  lot	
  easier	
  to	
  
manage.	
  The	
  current	
  way	
  of	
  authenticating	
  on	
  mobile	
  
devices	
  	
  is	
  also	
  painful	
  to	
  most	
  enterprises	
  [3].	
  
Problems	
  around	
  separating	
  corporate	
  and	
  personal	
  
identity	
  and	
  data	
  on	
  a	
  shared	
  personal/business	
  
device	
  were	
  significantly	
  reported	
  by	
  the	
  members	
  
from	
  InfoSec	
  department.	
  If	
  the	
  employee	
  uses	
  a	
  
company	
  owned	
  device,	
  all	
  data	
  on	
  the	
  device,	
  
whether	
  it	
  is	
  personal	
  data	
  or	
  not	
  is	
  owned	
  by	
  the	
  
company.	
  However,	
  if	
  the	
  company	
  allows	
  their	
  
employees	
  to	
  bring	
  and	
  use	
  their	
  personal	
  devices,	
  
this	
  gets	
  complicated.	
  Most	
  companies	
  solve	
  this	
  by	
  
asking	
  their	
  employees	
  to	
  waive	
  their	
  rights	
  to	
  all	
  
personal	
  data	
  on	
  that	
  device.	
  Policy	
  makers	
  
recognized	
  that	
  there	
  is	
  a	
  need	
  to	
  find	
  an	
  ideal	
  	
  
solution	
  to	
  this	
  issue,	
  as	
  it	
  is	
  impossible	
  at	
  present	
  to	
  
separate	
  and	
  distinguish	
  between	
  personal	
  and	
  
corporate	
  data.	
  Customers	
  expect	
  Symantec	
  to	
  solve	
  
this	
  problem..	
  
5. DISCUSSION	
  AND	
  CONCLUSION	
  
	
  
To	
  start	
  with,	
  we	
  intended	
  to	
  find	
  out	
  how	
  end-­‐users	
  
of	
  enterprise	
  products	
  would	
  react	
  to	
  the	
  use	
  of	
  a	
  
mobile	
  device	
  to	
  access	
  their	
  tasks.	
  We	
  also	
  tested	
  
our	
  assumption	
  that	
  activities	
  like	
  monitoring,	
  
reporting,	
  viewing	
  and	
  responding	
  to	
  alerts	
  are	
  the	
  
primary	
  tasks	
  that	
  IT	
  administrators	
  want	
  on	
  a	
  mobile	
  
device.	
  	
  However,	
  it	
  was	
  further	
  revealed	
  from	
  the	
  
studies	
  that	
  mobile	
  device	
  should	
  act	
  like	
  a	
  
complementing	
  device	
  that	
  will	
  help	
  the	
  user	
  to	
  stay	
  
in	
  touch	
  with	
  the	
  product	
  and	
  perform	
  vital	
  actions,	
  
when	
  user	
  is	
  away	
  from	
  the	
  primary	
  work	
  location,	
  
and	
  not	
  the	
  primary	
  device	
  itself.	
  
To	
  conclude,	
  our	
  research	
  revealed	
  interesting	
  
knowledge	
  in	
  the	
  domain	
  of	
  mobile	
  devices	
  and	
  IT	
  
administration.	
  The	
  knowledge	
  gained	
  could	
  play	
  an	
  
important	
  role	
  while	
  designing	
  enterprise	
  	
  
GOING	
  MOBILE	
  WITH	
  ENTERPRISE	
  APPLICATIONS	
  |	
  White	
  Paper	
  |	
  Jan,	
  2012	
   	
   	
   P a g e 	
  |	
  9	
  
applications	
  on	
  mobile	
  devices.	
  All	
  presented	
  ideas	
  
are	
  results	
  of	
  three	
  research	
  studies.	
  The	
  information	
  
obtained	
  could	
  be	
  referred	
  during	
  ideation	
  and	
  
conceptualization	
  stages	
  of	
  application	
  development.	
  	
  	
  	
  
Our	
  future	
  work	
  will	
  include	
  evaluation	
  of	
  some	
  use	
  
cases,	
  and	
  building	
  and	
  testing	
  prototypes,	
  identify	
  
related	
  functionalities	
  to	
  deliver	
  more	
  relevant,	
  
usable	
  mobile	
  experiences	
  to	
  our	
  customers.	
  It	
  will	
  be	
  
important	
  to	
  know	
  how	
  these	
  design	
  will	
  be	
  accepted	
  
by	
  users	
  doing	
  such	
  activities	
  day	
  in	
  and	
  out	
  as	
  well	
  as	
  
identify	
  new	
  unidentified	
  concepts	
  which	
  will	
  further	
  
enhance	
  their	
  productivity	
  in	
  enterprise	
  
environments.	
  
6. ACKNOWLEDGMENTS	
  
We	
  would	
  like	
  to	
  express	
  our	
  warm	
  thanks	
  to	
  all	
  the	
  
participants	
  among	
  our	
  customers,	
  internal	
  IT	
  admins,	
  
and	
  all	
  the	
  co-­‐researchers	
  who	
  were	
  involved	
  in	
  the	
  
different	
  phases	
  of	
  the	
  research	
  studies.	
  
7. REFERENCES	
  
Papers-­‐	
  	
  
1.Forbes;	
  Google	
  -­‐	
  The	
  Untethered	
  Executive,	
  2010	
  
2.HIIT;	
  Antti	
  -­‐	
  The	
  Fragmentation	
  of	
  Attention,	
  2005	
  
3.Forrester;	
  Symantec	
  -­‐	
  Enhancing	
  Authentication	
  to	
  
Secure	
  the	
  Enterprise,	
  2011	
  
Books	
  –	
  	
  
4.	
  David	
  Sward,	
  Measuring	
  the	
  Business	
  Value	
  of	
  
Information	
  Technology,	
  2006	
  
	
  
5.Lindlof,	
  T.	
  R.,	
  &	
  Taylor,	
  B.	
  C,	
  Qualitative	
  
Communication	
  Research	
  Methods,	
  2nd	
  Edition,	
  
2002
	
  

More Related Content

What's hot

AN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMS
AN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMSAN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMS
AN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMScsandit
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremhaifa rzem
 
Mobility & Social Media
Mobility & Social MediaMobility & Social Media
Mobility & Social MediaMart Leepin
 
Feature Based Semantic Polarity Analysis Through Ontology
Feature Based Semantic Polarity Analysis Through OntologyFeature Based Semantic Polarity Analysis Through Ontology
Feature Based Semantic Polarity Analysis Through OntologyIOSR Journals
 
IRJET - Interaction based Expert System
IRJET -  	  Interaction based Expert SystemIRJET -  	  Interaction based Expert System
IRJET - Interaction based Expert SystemIRJET Journal
 
Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)Conference Papers
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...IOSR Journals
 
IRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep LearningIRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep LearningIRJET Journal
 
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSSEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSAIRCC Publishing Corporation
 
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSSEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSijcsit
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95IJSRED
 
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPS
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPSAPPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPS
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPScsandit
 
INF 220 Enhance teaching - snaptutorial.com
INF 220  Enhance teaching - snaptutorial.comINF 220  Enhance teaching - snaptutorial.com
INF 220 Enhance teaching - snaptutorial.comDavisMurphyA54
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...IJERA Editor
 
IRJET- Smart Ration System using RFID
IRJET-  	  Smart Ration System using RFIDIRJET-  	  Smart Ration System using RFID
IRJET- Smart Ration System using RFIDIRJET Journal
 
IRJET- Student Statistics System using Confined Android App
IRJET- Student Statistics System using Confined Android AppIRJET- Student Statistics System using Confined Android App
IRJET- Student Statistics System using Confined Android AppIRJET Journal
 
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET Journal
 

What's hot (20)

AN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMS
AN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMSAN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMS
AN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMS
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measurem
 
Mobility & Social Media
Mobility & Social MediaMobility & Social Media
Mobility & Social Media
 
Feature Based Semantic Polarity Analysis Through Ontology
Feature Based Semantic Polarity Analysis Through OntologyFeature Based Semantic Polarity Analysis Through Ontology
Feature Based Semantic Polarity Analysis Through Ontology
 
IRJET - Interaction based Expert System
IRJET -  	  Interaction based Expert SystemIRJET -  	  Interaction based Expert System
IRJET - Interaction based Expert System
 
Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
 
IRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep LearningIRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep Learning
 
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSSEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
 
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSSEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95
 
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPS
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPSAPPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPS
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPS
 
ROLE OF ELECTRONIC HUMAN RESOURCES (E-HR) IN ORGANIZATION
ROLE OF ELECTRONIC HUMAN RESOURCES (E-HR) IN ORGANIZATIONROLE OF ELECTRONIC HUMAN RESOURCES (E-HR) IN ORGANIZATION
ROLE OF ELECTRONIC HUMAN RESOURCES (E-HR) IN ORGANIZATION
 
INF 220 Enhance teaching - snaptutorial.com
INF 220  Enhance teaching - snaptutorial.comINF 220  Enhance teaching - snaptutorial.com
INF 220 Enhance teaching - snaptutorial.com
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
 
IRJET- Smart Ration System using RFID
IRJET-  	  Smart Ration System using RFIDIRJET-  	  Smart Ration System using RFID
IRJET- Smart Ration System using RFID
 
IRJET- Student Statistics System using Confined Android App
IRJET- Student Statistics System using Confined Android AppIRJET- Student Statistics System using Confined Android App
IRJET- Student Statistics System using Confined Android App
 
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
 
BLIND ASSISTANT SERVICE
BLIND ASSISTANT SERVICEBLIND ASSISTANT SERVICE
BLIND ASSISTANT SERVICE
 
DRIVER ASSISTANCE FOR HEARING IMPAIRED PEOPLE USING AUGMENTED REALITY
DRIVER ASSISTANCE FOR HEARING IMPAIRED  PEOPLE USING AUGMENTED REALITYDRIVER ASSISTANCE FOR HEARING IMPAIRED  PEOPLE USING AUGMENTED REALITY
DRIVER ASSISTANCE FOR HEARING IMPAIRED PEOPLE USING AUGMENTED REALITY
 

Similar to Going mobile with enterprise application

Mobile App Analytics
Mobile App AnalyticsMobile App Analytics
Mobile App AnalyticsNynne Silding
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwCarolineFlamand
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung at Work
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...Altimeter, a Prophet Company
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learningeLearning Papers
 
Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Piyush Malik
 
[url=https://keysfact.com/]KeysFact Better Then Best World[/url]
[url=https://keysfact.com/]KeysFact Better Then Best World[/url][url=https://keysfact.com/]KeysFact Better Then Best World[/url]
[url=https://keysfact.com/]KeysFact Better Then Best World[/url]Liam
 
Data in your hand:Using mobile internally
Data in your hand:Using mobile internallyData in your hand:Using mobile internally
Data in your hand:Using mobile internallyCrowdLab
 
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docx
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docxRESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docx
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docxaudeleypearl
 
Framework to Analyze Customer’s Feedback in Smartphone Industry Using Opinion...
Framework to Analyze Customer’s Feedback in Smartphone Industry Using Opinion...Framework to Analyze Customer’s Feedback in Smartphone Industry Using Opinion...
Framework to Analyze Customer’s Feedback in Smartphone Industry Using Opinion...IJECEIAES
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityDImension Data
 
Product Analyst Advisor
Product Analyst AdvisorProduct Analyst Advisor
Product Analyst AdvisorIRJET Journal
 
An Integrated Management Platform for Subscription of Magazines
An Integrated Management Platform for Subscription of MagazinesAn Integrated Management Platform for Subscription of Magazines
An Integrated Management Platform for Subscription of MagazinesIRJET Journal
 
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docx
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docxRunning head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docx
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docxjeanettehully
 
A study of how application usage can help increase consumer satisfaction for ...
A study of how application usage can help increase consumer satisfaction for ...A study of how application usage can help increase consumer satisfaction for ...
A study of how application usage can help increase consumer satisfaction for ...Abeer Raza
 
IRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- PharmaguideIRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- PharmaguideIRJET Journal
 

Similar to Going mobile with enterprise application (20)

Mobile App Analytics
Mobile App AnalyticsMobile App Analytics
Mobile App Analytics
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lw
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learning
 
Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...
 
[url=https://keysfact.com/]KeysFact Better Then Best World[/url]
[url=https://keysfact.com/]KeysFact Better Then Best World[/url][url=https://keysfact.com/]KeysFact Better Then Best World[/url]
[url=https://keysfact.com/]KeysFact Better Then Best World[/url]
 
Data in your hand:Using mobile internally
Data in your hand:Using mobile internallyData in your hand:Using mobile internally
Data in your hand:Using mobile internally
 
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docx
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docxRESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docx
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docx
 
Framework to Analyze Customer’s Feedback in Smartphone Industry Using Opinion...
Framework to Analyze Customer’s Feedback in Smartphone Industry Using Opinion...Framework to Analyze Customer’s Feedback in Smartphone Industry Using Opinion...
Framework to Analyze Customer’s Feedback in Smartphone Industry Using Opinion...
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Product Analyst Advisor
Product Analyst AdvisorProduct Analyst Advisor
Product Analyst Advisor
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
An Integrated Management Platform for Subscription of Magazines
An Integrated Management Platform for Subscription of MagazinesAn Integrated Management Platform for Subscription of Magazines
An Integrated Management Platform for Subscription of Magazines
 
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docx
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docxRunning head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docx
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docx
 
A study of how application usage can help increase consumer satisfaction for ...
A study of how application usage can help increase consumer satisfaction for ...A study of how application usage can help increase consumer satisfaction for ...
A study of how application usage can help increase consumer satisfaction for ...
 
IRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- PharmaguideIRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- Pharmaguide
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Going mobile with enterprise application

  • 1. GOING  MOBILE  WITH  ENTERPRISE  APPLICATIONS  |  White  Paper  |  Jan,  2012       P a g e  |  1       Going  Mobile  With  Enterprise  Applications   A study on user behavior and perceptions By     Muzayun  Mukhtar   Muzayun_Mukhtar@symantec.com     Markus  Grotenhuis   Markus_Grotenhuis@symantec.com       Anjeli  Singh   Anjeli_Singh@symantec.com    
  • 2. GOING  MOBILE  WITH  ENTERPRISE  APPLICATIONS  |  White  Paper  |  Jan,  2012       P a g e  |  2   EXECUTIVE  SUMMARY   This  paper  presents  findings  from  three  research   studies  carried  out  to  understand  the  user  behavior   and  explore  the  value  in  using  mobile  devices  for   accessing  enterprise  products.  The  focus  is  essentially   on  the  expectations  of  the  end-­‐users,  namely,   information  technology  (IT)  administrators.  In  this   case,  we  were  exploring  how  the  users  of  enterprise   products  might  want  to  leverage  mobile  technology   to  access  their  everyday  tasks  and  information,  and   therefore  identify  potential  opportunities  and   challenges  for  extending  their  user  experience  to  such   devices.     The  research  methods  followed  for  these  studies   include  qualitative  tools  like  self  reporting  diaries  kept   by  IT  administrators,  focus  group  discussion,    and  a   survey  conducted  among  the  customers,  who  were   the  end  users  of  Symantec  products.   In  these  studies,  it  was  found  that  use  of  mobile   phones  is  ultimately  about  convenience,  simplicity,   and  ease  of  use.  Today’s  IT  administrators  favor  and   showed  a  desire  to  adapt  mobile  devices  as  their   productivity  tool.  However,  these  are  not  seen  just  as   supplementary  devices.  Mobile  devices  can  actually   result  in  handling  their  daily  tasks  more  effectively,   for  example  monitor  alerts  or  faults  in  the  data  center   can  be  always  on  their  finger  tips.  Because  users  are   already  getting  alert  notifications  through  emails,  a   mobile  application  has  to  do  more  than  just  feed   alerts.  It  is  revealed  that  users  would  want  to  have   access  to  tasks  and  immediate  remediation  in  case  of   faults.  For  critical  tasks,  an  alternate  choice  would  be     to  delegate  the  task  to  other  administrators  who  are   available  to  perform  the  task,  especially  when   necessary  remediation  is  too  complicated  to  do  from   a  mobile  device.     User  concerns  in  using  the  mobile  devices  also  came   up  during  these  studies  for  e.g.,  issues  related  to   security  such  as  VPN  access  and  execution  of  critical   and  bulk  operations.    In  regards  to  the  use  of  mobile   devices  by  the  IT  administrators,  enterprise   environments  might  also  need  to  overcome   challenges  withmanaging  security  and  protecting   data,  device  authentication,  policies  regarding   separation  of  personal  and  corporate  data.     KEYWORDS   Enterprise,  User  experience,  Mobile  application,  IT   administrative  tasks  
  • 3. GOING  MOBILE  WITH  ENTERPRISE  APPLICATIONS  |  White  Paper  |  Jan,  2012       P a g e  |  3   CONTENTS   EXECUTIVE  SUMMARY  ..................................................  2   Keywords  ..................................................................  2   1.   INTRODUCTION  ....................................................  4   2.   ABOUT  THIS  PAPER  ..............................................  4   3.   RESEARCH  METHODOLOGY  AND  STUDY  DETAILS  4   3.1   Study  I  –  Diary  Study  ....................................  4   3.2   Study  II  –  Focus  Group  .................................  5   3.3   Study  III  -­‐  Survey  ..........................................  5   4.   RESULTS  ................................................................  5   4.1   Current  practices  and  company  policies  .....  5   4.2   User  expectations  in  using  mobile  devices  ..  6   4.3   User  perception  of  the  impact  ....................  7   4.4   Concerns  and  challenges  to  overcome  ........  8   5.   DISCUSSION  AND  CONCLUSION  ...........................  8   6.   ACKNOWLEDGMENTS  ..........................................  9   7.   REFERENCES  .........................................................  9                                                                                    
  • 4. GOING  MOBILE  WITH  ENTERPRISE  APPLICATIONS  |  White  Paper  |  Jan,  2012       P a g e  |  4   1. INTRODUCTION     * Nearly  75%  of  the  American  workforce  and  35%  of   the  global  workforce  will  be  mobile  by  2013  .   Symantec’s  strategy  for  mobile  (one  of  the  pillars  of   FQ11-­‐12)  aims  to  drive  customer  satisfaction  by   extending  applications  to  mobile  devices.  As  part  of     preliminary  research  during  late  2010,    User   Experience  (UX)  team  which  is  a  part  of  Shared   Engineering  Services  (SES)  in  Symantec  studied  and   analyzed  the  current  industrial  scene  and  trends,   completed  initial  investigation  on  users  and  also   developed  some  proof  of  concepts  (POCs)  for  various   Symantec  products.  Our  research  showed  that  the   next  generation  IT  administrators  have  a  different   relationship  with  technology  as  compared  to  their   predecessors;  they  are  living  with  social  networking,   using  iPhones  and  iPads  for  their  personal  use.  They   are  bringing  these  new  devices  into  corporate   settings,  demanding  newer  and  more  exciting  way  of   doing  their  productive  tasks.  Many  industry  and   academic  research  studies  were  referred  to  gather   inputs  on  the  same.  We  also  felt  a  need  to   understand  the  requirements  from  the  point  of  view   of  enterprise  IT  experts.     Moving  forward,  we  wanted  to  learn  more  from  our   end-­‐users,  get  feedback  on  the  use-­‐cases  that  made   sense  for  porting  our  enterprise  applications  on   mobile  devices  and  identify  non-­‐conforming  data   points,  if  there  are  any.     Research  studies  were  conducted  to  gather  insights   on  the  type  of  tasks  that  IT  professionals  perform  on  a   mobile  phone  vs.  a  tablet  device  vs.  a  desktop   computer  workstation.  We  also  aimed  at  developing  a   better  understanding  of  the  current  practices  with   regard  to  use  of  mobile  devices,  uncover  users’  needs   and  expectations.  Enterprise  environment  policies,   strategies,  and  concerns  in  regards  to  mobile  devices   were  also  investigated.     2. ABOUT  THIS  PAPER   In  this  paper,  we  present  the  main  findings  from  three   rounds  of  user  research  studies  conducted  across  IT   professionals  in  different  roles  during  FQ11-­‐12.  This   paper  is  put  together  so  that  we  could  reach  to  the   wider  audience  within  the  industry,  make  this   research  available  to  the  internal  developers  and   designers  who  would  be  designing  future  mobile   enterprise  applications  for  our  end-­‐users.                                                                                                                                             *  Source:  IDC  Market  Intelligence  2011   First,  we  summarize  the  research  methodology  and   participant  profiles.  Then,  we  give  an  understanding   of  user  response  with  respect  to  mobile  devices.   Finally,  in  conclusion,  we  summarize  our  findings  and   their  usefulness,  and  also  talk  about  plans  to  pursue   further  research  in  the  domain.     3. RESEARCH  METHODOLOGY  AND   STUDY  DETAILS   In  this  section,  we  describe  the  various  study   techniques  which  were  employed  to  gather  insights   from  the  end-­‐users  relating  to  current  practices,  their   expectations  and  perceptions  of  the  mobile  devices.     In  each  of  these  studies,  we  had  different  set  of   participants.  We  mostly  relied  on  what  the   participants  have  shared  with  the  researchers  and   further  analysis  of  the  same.  The  contextual   environment  understanding  is  not  part  of  these   studies.  One  of  the  studies  was  a  focus  group[5]   discussion,  which  was  carried  out  in  a  face  to  face   interaction  with  the  end-­‐users,  in  a  usability  lab.   [Study  II  –  Focus  Group]   These  studies  were  conducted  to  gain  insights  for   designing  a  new  experience  for  our  end-­‐users.  As  the   field  data  collected  was  qualitative  and  descriptive  in   nature,  and  the  data  collection  methods  were  very   effort  intensive,  the  number  of  users  participating  in   these  studies  is  not  sufficiently  large  to  make   generalizations  on  the  preferences  of  IT   administrators.  However,  the  goal  of  this  paper  is  not   to  provide  a  generalized  account  of  the  working   methods  of  IT  administrators,  rather  to  draw   inspiration  for  designing  the  mobile  enterprise   applications  from  what  our  users  have  cited.     Following  sections  give  detailed  information  on  the   methodologies  followed  and  participant  profiles:   3.1 Study  I  –  Diary  Study   The  study  I  was  carried  out  to  understand  the   everyday  tasks  of  IT  administrators,  duration  of  tasks,   their  frequencies,  products  used,  environments  and   any  dependencies  on  peers.  In  this  study,  activity   logging  technique  was  followed  in  which  IT   administrators  recorded  their  daily  activities  for  a   duration  of  5  weekdays.  By  activities,  we  mean  tasks   which  they  do  regularly  like  configuring  a  storage  for   a  end-­‐user,  deploying  certain  number  of  virtual   machines  (VMs)  for  a  business  unit  or  configuring  an   application  etc.  These  IT  administrators  represented   various  business  groups  within  Symantec:  Storage   Availability  Management  Group  (SAMG),  Symantec   Backup  Executive  (BE)  and  Compliance  Suite  (CCS).  In  
  • 5. GOING  MOBILE  WITH  ENTERPRISE  APPLICATIONS  |  White  Paper  |  Jan,  2012       P a g e  |  5   total,  10  participants  contributed  in  this  research   study.  These  belonged  to  different  job  profiles;  IT   Administrators  (8),  Senior  IT  Architect  (1),  IT   Management  (1).  Participants  were  also  asked  to   provide  their  comments  and  ideas  on  the  possibility   of  carrying  out  their  everyday  tasks  on  mobile   devices.     In  total,  118  tasks  were  reported,  out  of  which  98   tasks  were  seen  as  feasible  using  mobile  devices.   Users  even  had  certain  expectations  as  how  they   should  take  place  in  a  mobile  application.  The   remaining  were  found  either  challenging  or  were   more  to  do  with  employee  development/  internal   errands.   3.2 Study  II  –  Focus  Group   In  the  second  study,  we  initially  interviewed   participants  to  gather  open-­‐ended  responses   regarding  current  practices  with  regard  to  use  of   mobile  devices,  their  needs  and  expectations.  This   was  followed  by  an  interactive  session,  Focus  Group   (FG),  in  which  participants  were  asked  to  share  their   thoughts,  perceptions,  and  ideas  about  using   Symantec  enterprise  products  on  a  mobile  device.   The  session  lasted  for  90  minutes.  Participants  were   mostly  Symantec  customers    attending  the  annual   Symantec  Vision  conference  2011  in  Las  Vegas.   Participants  were  15  in  number,  belonging  to   different  profiles  like  IT  Operations  (7),  IT   Management  (5),  Security/Compliance  (3).  These   participant  were  recruited  in  advance  through  email   and  on  spot,  their  time  was  reserved.  During  the   session,  we  asked  questions  about  general  role  of   mobile  devices  in  their  work,  the  kind  of  information   and  tasks  they  would  want  to  see,  and  any  challenges   they  foresee.   Participants  primarily  showed  excitement  that   Symantec  is  moving  towards  mobile  space,  but  at  the   same  time  they  recognized  that  any  enterprise   information  exposed  on  a  mobile  device  has  to  be   incredibly  secure.  They  believed  Symantec  would  be   able  to  handle  this  proficiently.   3.3 Study  III  -­‐  Survey   For  the  Study  III,  we  relied  on  an  online  survey  to   collect  quantitative  data  to  further  support  our   qualitative  studies.  This  survey  was  deployed  among   the  attendees  at  2011  Vision,  Symantec's  annual  user   and  technical  conference.  These  included  customers   and  Symantec  internal  employees.  The  online  survey   included  questions  focused  on  current  practices,  type   of  Symantec  products  they  are  currently  using  and   their  mobile  expectations.  104  participants  completed   the  survey;  they  were  from  enterprise  &  large   businesses  (86%)  and  represented  various  industries.   The  majority  of  them  were  from  Finance/Insurance   (18.45  %),  and  Computer  and  Electronics  (15.53%).   Most  of  the  participants  were  using  more  than  three   Symantec  products.   4. RESULTS   This  section  presents  the  significant  findings  from  the   above  mentioned  studies.  The  various  insights   collected  and  the  observation  recorded  were   analyzed  in  order  to  reveal  patterns  and  common   elements  across  them.  Comments  from  the   participants  were  also  recorded  to  recognize  the   user’s  aspirations.   The  results  are  divided  into  four  main  sections:  (1)   Present  User  Behaviors  and  Company  Policies,  (2)   User  Expectations  in  using  Mobile  Devices,  (3)  User   Perception  of  the  Impact,  and  (4)  Concerns  and   Challenges  to  Overcome.     4.1 Current  practices  and  company   policies   Current  Mobile  Device  Practices     The  majority  of  work  related  activities  that  users   currently  perform  on  mobile  phones  are  related  to   monitoring  jobs  through  email  alerts,  besides  making   office  related  calls  and  IM,  office  email  access  and     calendar/schedule.  (Re)viewing  and  consuming  work   related  documents  are  also  generally  done.  However,   it  is  found  very  difficult  to  edit  or  create  documents.     Context  matters  a  lot  to  users,  in  the  way  that  they  do   care  to  think  where  they  are  using  their  devices  to  do   professional  tasks  –  however,  mobile  usage  is  not   found  exclusive  to  any  location.  Users  felt  that  they   could  use  the  device  anywhere,  even  when  they  are   at  their  desk.     In  the  course  of  these  studies,  Blackberry  seemed  to   be  the  device  most  used  for  official  use,  among  the   customers.  A  mixed  type  of  user  behavior  was  noticed   in  terms  of  the  number  of  devices  owned  and   maintained  by  the  users  –  some  users  keep  one   device  for  everything  while  others  prefer  two   separate  devices  for  personal  and  corporate  use.  This   might  be  driven  by  the  company  policies  and  to  some   extent,  personal  preferences.    At  present,  tablets   mostly  are  used  as  consumption  devices,  not  as   production  devices  like  the  mobile  phones.      
  • 6. GOING  MOBILE  WITH  ENTERPRISE  APPLICATIONS  |  White  Paper  |  Jan,  2012       P a g e  |  6   Enterprise  Mobile  Device  Policies   There  are  certain  policies  in  the  organizations  which   define  what  type  of  devices  IT  professionals  can  use   within  the  enterprise.  Blackberry  is  still  the  one   mobile  device  that  many  organizations  support   exclusively.  iPhone  and  Android  device  support  is   increasing,  and  this  is  mainly  driven  by  executives,   creative  staff  and  sales  group.  While  as,  support  of   tablet  devices  is  increasing  slower  than  mobile  phone   support,  but  it  is  picking  up.  Again,  this  is  mainly   driven  by  the  executives  who  stretch  the   possibilities[1].     Some  customers  said  that  they  don’t  trust  mobile   devices  to  be  very  secure,  and  hence  there  are  strict   policies  to  limit  data  exposure  on  mobile  devices.  The   wide  range  of  mobile  device  policies  were  identified   in  these  studies  which  would  broadly  fit  in  one  of   below  mentioned  policy  types,  or  sometimes  even  a   mix:   ! Only  company-­‐owned  mobile  devices  (Blackberry   so  far)  are  allowed  and  supported.   ! Multiple  devices  (Blackberry,  iOS,  Android,   WebOS,  Windows  Phone)  are  supported,  but  it   has  to  be  a  company-­‐owned  and  managed   device.   ! Money  is  provided  for  personal  device  used  for   official  work.   ! Professionals  can  bring  and  use  your  own   devices.   ! IT  can  wipe  company  owned  devices,  even  if   there  is  personal  data  on  it.   4.2 User  expectations  in  using  mobile   devices   Participants  showed  excitement  in  using  mobile   devices  to  perform  many  of  their  monitoring  and   infrastructure  management  related  tasks.  Data  from   the  studies  suggests  that  users  find  mobile  devices   good  for  simple  and  uncomplicated  tasks  consuming   less  time  and  with  low  impact  and  low  risk  (e.g.,   restart  a  job).  Users  find  mobile  devices  inadequate   for  complex  tasks  that  require  concentrated/   dedicated  focus,  tasks  with  critical  impacts  (e.g.,  a   production  change),  or  tasks  which  are  carried  out  on   bulk  items.   Mobile  devices  are  seen  as  most  beneficial  for  vital   monitoring  jobs.  Participants  reported  that  they   would  want  to  see  alerts,  system/component  faults,   authentication  checks,  in-­‐progress  activity   termination  information  on  their  handheld  devices.   However,  they  expect  a  visual  differentiation   between  critical  problems  and  minor  issues.  The   mobile  phone  is  also  expected  to  help  remediation   especially  in  emergency  situations.  Reporting  and   displaying  all  data  to  act  is  found  good  enough  in   these  situations,  which  can  allow  them  to  take  further   action.     Among  the  hardware  related  tasks,  keeping  an   inventory,  management  and  allocation  of  assets  were   seen  as  possible  while  mobile.  Very  often,  these  tasks   are  not  seen  as  high  focus  tasks.  Hardware   management  activities  which  required  physical   involvement  for  e.g.,  access  to  labs,  users  were   skeptical  as  how  mobile  devices  can  be  helpful.   Software  related  tasks  like  configuration  of  apps,   virtualization,  operating  system  installation  were   reported  as  tasks  which  take  5-­‐10  minutes,  but  could   be  easily  executed  on  mobile  devices.   Storage  related  tasks  like  provisioning  and  zoning   were  seen  as  quick  and  simple  on  mobile  devices  as   these  are  short  duration  tasks.     Backup  related  tasks  which  were  found  ideal  on   mobile  devices  included  status  check  of  the  critical   backups  running,  reporting  vulnerabilities  and  quick   remediation,  and  some  amount  of  restoration  of  data   remotely.   Virus  protection  was  also  reported,  though  to  a   smaller  extend,  this  could  be  because  not  many  of  our   participants  were  in  that  role.     For  maintenance  of  the  terminal  server  which   happens  only  e.g.,  quarterly,  it  was  expected  that  it   could  be  triggered  remotely  using  a  mobile  device.   This  could  also  have  a  reminder  on  the  handheld   device.   Knowledge/  Information  gathering  was  another  place   where  users  wanted  mobile  devices  to  help  them.   Access  to  tech-­‐notes  and  wikis  could  also  allow  them   to  interact  with  fellow  team  members  and  sometimes   cross  check  on  the  solutions  provided  by  them.    
  • 7. GOING  MOBILE  WITH  ENTERPRISE  APPLICATIONS  |  White  Paper  |  Jan,  2012       P a g e  |  7   Close  to  what  we  expected,  most  of  the  participants   preferred  optimized  interactions  and  most  critical   items  on  their  mobile  devices,  as  the  following   comments  reveal:   “I  can  quickly  know  the  storage  capacity  or  allocation   of  the  data  center  regardless  of  location  where  I  am    “Combine  activity  with  communication  -­‐  I  would  want   to  connect  to  any  server  remotely,  perform  the  critical   task  I  have  to  do  and  also  send  update  to  the  end  user   or  other  admin  via  mobile  device.   With  regard  to  accessing  Symantec  enterprise   software  on  mobile  devices,  most  of  the  users   suggested  that  we  should  focus  on  the  product’s  core   functionality.  Most  of  our  customers  expected  a   mobile  app  to  be  free.  In  fact,  some  even  were  of  an   opinion  that  we  should  first  focus  on  smartphones   and  then  on  tablets.     Overall,  studies  revealed  that  the  mobile  usage   should  be  limited  to  pertinent  information  and  tasks   (i.e.,  role  based  information  &  contextual   information),  continuous  updates  on  general  sense  of   status  and  health  of  the  enterprise,  for  instance,  is   everything  up  to  date.  Execution  of  a  pre-­‐configured   job  could  be  triggered  using  the  mobile  device.  Policy   management  and  updates  could  be  available  to  the   users,  like  what  is  the  current  policy,  when  was  it   applied  etc.  Sending  and  viewing  reports  could  have   more  engaging  user  experience  on  the  mobile   devices.  In  fact,  users  also  felt  that  a  24x7  access  for   people  performing  critical  tasks  (e.g.,  backup   administrators,  HA  administrators)  should  be  enabled   on  mobile  devices,  considering  the  nature  of  their   jobs.   4.3 User  perception  of  the  impact     Most  participants  believe  that  mobility  would  surely   change  the  way  they  work  currently,  as  it  will  give   them  more  control  over  their  work.     Based  on  participants’  perception,  we  believe  that   most  of  them  saw  a  reduction  in  time  to  execute  an   activity  or  resolve  an  issue.  For  example,  they  can   perform  a  ‘Ping  test’  on  a  server  to  get  the  status  or   trigger  reboot  of  a  machine  remotely  using  a  mobile   device.    Escalations  on  failure  of  important  hardware   could  also  be  handled  earlier  than  otherwise.   They  could  also  perceive  that  wait  time  between   activities  could  be  avoided  while  completing  their  task   at  hand.  Independent  of  the  location  she  is  at,  user   can  get  an  approval  on  storage  allocation,  or  manage   storage  devices  and  send  immediate  alert  messages   to  the  other  administrators  to  sync  up  instead  of   waiting  to  connect  to  e-­‐mail.  Users  also  indicated  they   would  like  to  have  an  ability  to  instantly  update  the   end-­‐user  or  other  IT  administrators  when  the  task  at   hand  is  done.  An  example  of  wait  time  seen  as  a   bottleneck  in  the  pipeline  of  action  is  shown  in  fig  2.   Participants  pointed  out  that  they  would  like  to  have   End  user  raises   request    for   storage  (trigger)   Junior  admin   manages/checks   requirement   Junior  admin   sends  for   approval   Senior  admin   receives  approval   request   Senior  admin   assess/approves   the  request   Junior  admin   receives  approval   Junior  admin   completes  task   Junior  admin   communicates  to   user   User  gets  an   update  of  job   done   Figure  1:  Survey  data  showing  the  type  of  activities  users  wanted  to  view  and  access  from  the  mobile  devices.   Figure  2:  Diagram  showing  the  wait  time  between  various  steps  while  performing  a  task.  
  • 8. GOING  MOBILE  WITH  ENTERPRISE  APPLICATIONS  |  White  Paper  |  Jan,  2012       P a g e  |  8   an  option  to  delegate  the  task  to  other  admins  who   are  available  to  perform  the  task,  especially  when   necessary  remediation  is  too  complicated  to  do  from   a  mobile  device.  That  way,  resolution  of  critical  and   high  priority  tasks  would  happen  in  time,  since  the   user  would  be  able  to  have  a  look  at  it  even  before   she  has  no  access  to  the  machine.   What  makes  a  mobile  enterprise  app  different  from  a   mobile  consumer  app?   According  to  the  participants,  an  enterprise   application  requires  more  security  management  and   superior  policies  with  regard  to  data  protection.  It  is   also  evident  that  corporate  standards  are  changing   very  quickly  with  the  change  in  the  usage  patterns  of   mobile  technology,  data  security  still  remains  a   concern  which  is  relatively  less  crucial  in  the   consumer  apps.   We  also  uncovered  that  from  the  end-­‐user  point  of   view,  there  should  be  no  difference  when  it  comes  to   the  user  experience  of  using  the  enterprise  app  on   mobile  devices.     The  following  comments  about  the  user  experience   on  mobile  devices  were  stated  by  the  participants:   “Basically,  anything  I  can  almost  do  on  a  PC  or  Citrix,  I   would  like  to  do  on  the  device  as  well.   “A  Symantec  Backup  Exec  mobile  app  should  be  like   the  baby  monitor  I  have  at  home.   4.4 Concerns  and  challenges  to  overcome   User  Concerns  of  Mobile  Usage   Users  seemed  to  be  uncomfortable  when  it  comes  to   making  a  change  in  the  production  environment   through  a  mobile  device.  Creating  a  new  job  or   performing  a  complex  task  was  seen  as  challenging  on   mobile  devices,  as  can  be  seen  in  the  following   excerpt:   “You  cannot  expect  someone  to  do  heavy  lifting  tasks   on  a  small  mobile  phone.     Reasons  for  such  concerns  range  from  security  of   such  devices  for  e.g.,  what  happens  when  the  device   is  stolen  or  lost,  to  human  error,  as  it  is  seen  that   people  don’t  pay  as  much  attention  when  digesting   information  on  a  mobile  device.  According  to  the   users,  complex  tasks  requires  focus;  mobile  devices   don’t  always  allow  that.[2]     Configuring  a  complex  security  product  which  takes   more  time  or  making  a  policy  change  that  could  have   far  reaching  impacts  needs  to  be  well  evaluated   before  applying.  It’s  impact  could  be  shown  upfront   while  the  user  executes  such  task  via  a  mobile  device.     Enterprise  Challenges   Getting  access  to  the  corporate  network  always  could   be  a  challenge,  especially  if  VPN  gateway  does  not   work,  which  means  access  to  nothing  except  email.   Participants  who  were  managing  security  also  showed   concern  on  how  to  protect  confidential  information   on  a  mobile  device.  Encryption,  Device  wipe   technologies  are  some  of  the  contemporary   techniques.   At  present,  managing  and  securing  iOS  and  Android   devices  is  seen  as  a  challenge  by  corporate.   Blackberry  devices  are  considered  a  lot  easier  to   manage.  The  current  way  of  authenticating  on  mobile   devices    is  also  painful  to  most  enterprises  [3].   Problems  around  separating  corporate  and  personal   identity  and  data  on  a  shared  personal/business   device  were  significantly  reported  by  the  members   from  InfoSec  department.  If  the  employee  uses  a   company  owned  device,  all  data  on  the  device,   whether  it  is  personal  data  or  not  is  owned  by  the   company.  However,  if  the  company  allows  their   employees  to  bring  and  use  their  personal  devices,   this  gets  complicated.  Most  companies  solve  this  by   asking  their  employees  to  waive  their  rights  to  all   personal  data  on  that  device.  Policy  makers   recognized  that  there  is  a  need  to  find  an  ideal     solution  to  this  issue,  as  it  is  impossible  at  present  to   separate  and  distinguish  between  personal  and   corporate  data.  Customers  expect  Symantec  to  solve   this  problem..   5. DISCUSSION  AND  CONCLUSION     To  start  with,  we  intended  to  find  out  how  end-­‐users   of  enterprise  products  would  react  to  the  use  of  a   mobile  device  to  access  their  tasks.  We  also  tested   our  assumption  that  activities  like  monitoring,   reporting,  viewing  and  responding  to  alerts  are  the   primary  tasks  that  IT  administrators  want  on  a  mobile   device.    However,  it  was  further  revealed  from  the   studies  that  mobile  device  should  act  like  a   complementing  device  that  will  help  the  user  to  stay   in  touch  with  the  product  and  perform  vital  actions,   when  user  is  away  from  the  primary  work  location,   and  not  the  primary  device  itself.   To  conclude,  our  research  revealed  interesting   knowledge  in  the  domain  of  mobile  devices  and  IT   administration.  The  knowledge  gained  could  play  an   important  role  while  designing  enterprise    
  • 9. GOING  MOBILE  WITH  ENTERPRISE  APPLICATIONS  |  White  Paper  |  Jan,  2012       P a g e  |  9   applications  on  mobile  devices.  All  presented  ideas   are  results  of  three  research  studies.  The  information   obtained  could  be  referred  during  ideation  and   conceptualization  stages  of  application  development.         Our  future  work  will  include  evaluation  of  some  use   cases,  and  building  and  testing  prototypes,  identify   related  functionalities  to  deliver  more  relevant,   usable  mobile  experiences  to  our  customers.  It  will  be   important  to  know  how  these  design  will  be  accepted   by  users  doing  such  activities  day  in  and  out  as  well  as   identify  new  unidentified  concepts  which  will  further   enhance  their  productivity  in  enterprise   environments.   6. ACKNOWLEDGMENTS   We  would  like  to  express  our  warm  thanks  to  all  the   participants  among  our  customers,  internal  IT  admins,   and  all  the  co-­‐researchers  who  were  involved  in  the   different  phases  of  the  research  studies.   7. REFERENCES   Papers-­‐     1.Forbes;  Google  -­‐  The  Untethered  Executive,  2010   2.HIIT;  Antti  -­‐  The  Fragmentation  of  Attention,  2005   3.Forrester;  Symantec  -­‐  Enhancing  Authentication  to   Secure  the  Enterprise,  2011   Books  –     4.  David  Sward,  Measuring  the  Business  Value  of   Information  Technology,  2006     5.Lindlof,  T.  R.,  &  Taylor,  B.  C,  Qualitative   Communication  Research  Methods,  2nd  Edition,   2002