Cyber security introduction | Information Systems homework help

[ad_1]

1
EVALUATION OF CONTEMPORARY BYOD POLICIES IN KEY INDUSTRIES
1
EVALUATION OF CONTEMPORARY BYOD POLICIES IN KEY INDUSTRIES
1
EVALUATION OF CONTEMPORARY BYOD POLICIES IN KEY INDUSTRIES

Introduction

Many recent changes in Information Technology (IT) have transformed the contemporary workplace into an efficient node of business activity; dependent upon IT systems and skilled personnel to operate these systems. The recent explosion in personal communications and computing devices, for professional and private use alike, represents one aspect of technology that has grown in tandem with professional technologies. These trends have lead many businesses to adopt policies which allow their employees to utilize personal computing devices for professional applications. These Bring Your Own Device (BYOD) policies represent an evolving technologically savvy workforce whose optimum efficiency often depends upon their own comfort and understanding of the tools used to accomplish their tasks. However, introducing personal devices to an organization’s network present a specific set of security challenges to IT professionals.
Problem Statement
Contemporary organizations are faced with the reality that BYOD policies may represent the future of their IT enterprise (Early, Hamon, Lee, & Mithas, 2014). A young and talented workforce continues to push for such organizational innovations, often at the cost of IT security practices (Weeger, Wang, & Gewald, 2015). How these organizations can respond to the security risks inherent in BYOD represents the IT challenge of our generation. This study attempts to further explore the ramifications of BYOD policies in order to evaluate current security practices.
Purpose
The purpose of this research project is to examine the overall effects that BYOD policies have on contemporary organizations that adopt them. This research project will take a mixed approach, using both qualitative and quantitative measures to explore the effects of BYOD policies. By taking this approach, my project can examine the effects of BYOD both in terms of the human experience and figures which drive organizational success such as financial efficiency. By researching and determining these effects, organizations and IT professionals can better understand and predict how BYOD policies can help their bottom lines and spur efficiency; as well as understand the unique security challenges that BYOD policies introduce.
Research Questions
This paper focuses on three primary research questions in an attempt to aid organizations reliant on future management of BYOD. First, do the benefits in efficiency and productivity outweigh the security risks inherent with BYOD policies? Second, will the trend of BYOD policies wane in the face of increased security risks? And finally, which security practices represent the best options for organizations adopting BYOD?
Significance of the Study
In today’s modern workplace, a tech savvy workforce understands which applications and devices they are comfortable with, and in many cases, they understand which devices are better for their own professional tasks. Due to this reality, professional organizations will continue to rely on BYOD devices to remain competitive, draw talent, and maintain a technologically advanced work place. Research into BYOD policies thus becomes critical for employers looking to understand and adopt these policies.
Allowing the use of non-standardized devices on a secure network allows a variety of cyber-attack vectors which can challenge IT professionals, especially when these devices are exposed to outside networks. Researching the security issues involved with BYOD practices can give organizations insight into how to mitigate and counteract these threats. Many organizations still struggle when developing policies to effectively manage BYOD policies, making research on the subject more significant now than ever before.
Definition of Terms
Denial of Service – an attack on a computer or network intended to deprive the authorized user of its intended purpose or resource.
Multiplexing – transmitting multiple streams of information over one communications medium in the form of a one complex signal.
Limitations/Delimitations
The research performed in this paper is limited to critical evaluation of current literature, research, and academic or technical discussions on the topic of BYOD. Consideration of BYOD policies prior to the development of smart phones are excluded from this paper as it focuses on contemporary data representing the current state of BYOD policies in organizations. The primary focus of the research in this paper is limited to organizations representing business, healthcare, and education industries. Furthermore, data collected for this study is primarily from sources in the United States.
Assumptions
Although BYOD policies affect other personal networking devices as well, this research paper assumes devices to be tablets, smart phones, and laptop computers. These devices represent practical machines used for work activities. This paper also assumes, and will not attempt to prove, that increased worker productivity and efficiency equates to increased financial performance by commercial businesses.

[ad_2]

Homework helper

Leave a Comment

Your email address will not be published.