Organizing employees’ workspaces in the context of remote work: advantages and disadvantages of BYOD
DOI:
https://doi.org/10.17162/au.v11i4.830Keywords:
Bring your own device, BYOD, mobility, mobile devices, data leaks, mobile malware, technology.Abstract
The purpose of this study is to identify and assess the advantages and disadvantages of implementing BYOD (“Bring your own device”) when organizing a workplace for company employees in the remote work mode. To achieve the goal set in the study, a set of theoretical and empirical research methods was used: theoretical methods (analysis, synthesis, comparison, generalization) – to study literary sources related to the research problem; empirical methods (survey method); numerical methods (method of mathematical processing of respondents' answers, ranking method). The article reviews the scientific literature on the problem under study. Based on an expert survey, the most important characteristics of BYOD are identified, and the most noticeable advantages and threats of BYOD are formulated. The results of this study show that BYOD has the potential to deliver significant cost savings to an organization by directly eliminating software and hardware purchases. However, the implementation of BYOD requires painstaking work to prevent threats that emerge with the use of mobile technologies when working with important corporate information. Thus, organizations implementing BYOD can gain a strategic advantage and remain competitive in the market. However, allowing employees to use their own devices in the workplace without any proper threat prevention mechanisms can lead to several potential threats, such as data breaches, malware, and the like.Downloads
References
Absalom, R. (2012). International Data Privacy Legislation Review: A guide for BYOD policies. Ovum, 1, 1-23. http://www.webtorials.com/main/resource/papers/mobileiron/paper5/Guide_for_BYOD_Policies.pdf
Astani, M., Ready, K., & Tessema, M. (2013). BYOD Issues and Strategies in Organisations. Issues in Information Systems, 14 (2), 195–201. http://iacis.org/iis/2013/276_iis_2013_195-201.pdf
Baker, T. (2013). What you think about BYOD. SC Magazine: For IT Security Professionals.
Ballagas, R., Rohs, M., Sheridan, J. G., & Borchers, J. (2004). BYOD: Bring Your Own Device. Proceedings of the Workshop on Ubiquitous Display Environments, Ubicomp. (9). https://www.vs.inf.ethz.ch/publ/papers/rohs-byod-2004.pdf
Blair, J., Czaja, R.F. & Blair, E.A. (2013). Designing Surveys. A Guide to Decisions and Procedures. Los Angeles: Sage.
Burt, J. (2011). BYOD trend pressures corporate networks. eWeek, 28 (14), 30–32. https://www.eweek.com/mobile/byod-trend-pressures-corporate-networks/
Churin, V., Vysotskaya, N., Sizova, Y., Danilina, E., & Gorelov, D. (2019). Distribution of mineral extraction revenue: overview of international practice. Mining of Mineral Deposits, 13 (2), 66-74. http://mining.in.ua/2019vol13_2_8.html
Disterer, G., & Kleiner, C. (2013). BYOD Bring Your Own Device. Procedia Technology, 9, 43-53. https://doi.org/10.1016/j.protcy.2013.12.005
Dudin, M. N., Bezbakh, V. V., Galkina, M. V., Rusakova, E. P., & Zinkovsky, S. B. (2019a). Stimulating Innovation Activity in Enterprises within the Metallurgical Sector: the Russian and International Experience. TEM Journal, 8 (4), 1366-1370. https://www.temjournal.com/content/84/TEMJournalNovember2019_1366_1370.pdf
Dudin, M. N., Frolova, E. E., Protopopova, O. V., Mamedov, O., & Odintsov, S. V. (2019b). Study of innovative technologies in the energy industry: nontraditional and renewable energy sources. Entrepreneurship and Sustainability Issues, 6 (4), 1704-1713. https://doi.org/10.9770/jesi.2019.6.4(11)
Dudin, M. N., Ivashchenko, N. P., Gurinovich, A. G., Tolmachev, O. M., & Sonina, L. A. (2019c). Environmental entrepreneurship: characteristics of organization and development. Entrepreneurship and Sustainability Issues, 6 (4), 1861-1871. https://doi.org/10.9770/jesi.2019.6.4(22)
Esser, F. & Vliegenthart, R. (2017). Comparative research methods. In The International Encyclopedia of Communication Research Methods. Hoboken: Wiley
French, A. M., Guo, C., & Shim, J. P. (2014). Current Status, Issues, and Future of Bring Your Own Device (BYOD). Communications of the Association for Information Systems, 35 (10), 191-197. https://aisel.aisnet.org/cais/vol35/iss1/10/
Friedman, J., & Hoffman, D. (2008). Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defences. Information Knowledge Systems Management, 1 (2), 159-180. https://dl.acm.org/doi/10.5555/1402701.1402714
Garba, A. B., Armarego, J., & Murray, D. (2015). Bring your own device organizational information security and privacy. ARPN Journal of Engineering and Applied Sciences, 10 (3), 1279–1287. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1038.411&rep=rep1&type=pdf
Gatewood, B. (2012). The Nuts and Bolts of Making BYOD Work. Information Management Journal, 46 (6), 26-30. https://go.gale.com/ps/anonymous?id=GALE%7CA321579853&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=15352897&p=AONE&sw=w
Ghosh, A. K., & Swaminatha, T. M. (2001). Software security and privacy risks in mobile e-commerce. Communications of the ACM, 44 (2), 51-57. https://doi.org/10.1145/359205.359227
Ghosh, A. K., Gajar, P. K., & Rai, S. (2013). Bring your own device (BYOD): security risks and mitigating strategies. Journal of Global Research in Computer Science, 4 (4), 62-70. https://www.rroij.com/open-access/bring-your-own-device-byod-security-risks-and-mitigating-strategies-62-70.php?aid=38224
Harris, M., Patten, K., Regan, E., & Fjermesat, J. (2012). Mobile and Connected Device Security Considerations: A Dilemma for Small and Medium Enterprise Business Mobility? Proceedings of the 18th Americas Conference on Information Systems (AMCIS), 1677-1683. Seattle, USA. https://aisel.aisnet.org/amcis2012/proceedings/PerspectivesIS/15
J. Cold Associates (2016). Workspaces of the Future. Enabling work for any user from any device. Northborough, MA: A J. Gold Associates Research Report. https://www.citrix.com/content/dam/citrix/en_us/documents/white-paper/workspaces-of-the-future.pdf
Lavrakas, P.J. (ed.). (2008). Questionnaire. In Encyclopedia of Survey Research Methods. Thousand Oaks: Sage. https://dx.doi.org/10.4135/9781412963947.n424
Lebek, B., Degirmenci, K., & Breitner, M. H. (2013). Investigating the Influence of Security, Privacy, and Legal Concerns on Employees' Intention to Use Byod Mobile Devices. Proceeding of AMCIS 2013 Conference: Hyperconnected World: Anything, Anywhere, Anytime, 1-8. Chicago, Illinois, USA. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.666.3249&rep=rep1&type=pdf
Mansfield-Devine, S. (2012). Interview: BYOD and the enterprise network. Computer Fraud & Security, 4, 14-17. https://doi.org/10.1016/S1361-3723(12)70031-3
Messmer, E. (2012). Now that BYOD is the new normal, IT races to adjust. Network World, 29 (15), 18-22. https://www.proquest.com/docview/1040858026
Miller, K. W., Voas, J., & Hurlburt, G. F. (2012). BYOD: Security and privacy considerations. IT Professional, 14 (5), 53-55. https://doi.org/10.1109/MITP.2012.93
Moore, C., & Warner, J. (2012). Industry Contexts and Constraints Diversify Approaches to Bring-Your-Own Technology. For CIOs. https://www.forrester.com/report/Industry+Contexts+And+Constraints+Diversify+Approaches+To+BringYourOwnTechnology/-/E-RES82601#
Pogrebova, E. S., & Ulyanchenko, L. A. (2020). Promotion of Tourist Destinations of the Russian Federation on the International Market. Utopía y Praxis Latinoamericana, 25 (5), 302-316. https://produccioncientificaluz.org/index.php/utopia/article/view/33489
Reddy, A. S. (2012). Making BYOD Work for Your Organization. Cognizant. https://www.slideshare.net/cognizant/making-byod-work-for-your-organization
Semer, L. (2013). Auditing the BYOD Program. Internal Audit, 70 (1), 23-27. https://iaonline.theiia.org/auditing-the-byod-program
Thomson, G. (2012). Feature: BYOD: enabling the chaos. Network Security, (2), 5-8. https://doi.org/10.1016/S1353-4858(12)70013-2
Vapnyarskaya, O.I., & Krivosheeva, T.M. (2020). Improving the Quality of Tourist Services in Central Russia. Utopía y Praxis Latinoamericana, 25 (5), 317-327. https://doi.org/10.5281/zenodo.3984259
Walker-Osborn, C., Mann, S., & Mann, V. (2013). To Byod or … Not to Byod. ITNOW, 55 (1), 38-39. https://doi.org/10.1093/itnow/bws142
Winter, E. A., Babaskin, D. V., Litvinova, T. M., & Loseva, S. A. (2020). Marketing Research of Personnel Motivation and Pharmacy Chains. Utopía y Praxis Latinoamericana, 25 (5), 338-347. https://doi.org/10.5281/zenodo.3984263
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Irina Albertovna Duborkina, Elena Ivanovna Kuznetsova, Dmitry Vladimirovich Dianov, Olga Vladimirovna Lezina
This work is licensed under a Creative Commons Attribution 4.0 International License.
- The authors retain their copyright but assign to the journal the right of the first publication, with the work registered under the Creative Commons attribution license, which allows third parties to use the published information as long as they mention the authorship of the work and that it was first published in this journal.
- Authors may make other independent or additional contractual arrangements for non-exclusive distribution of the version of the article published in this journal (eg, include it in an institutional repository or publish it in a book) as long as it clearly indicates that the work was first published in this journal.
- Authors are encouraged and advised to publish their work on the Internet (for example, on institutional or personal pages) before and during the review and publication process, as it can lead to productive exchanges and a greater and faster dissemination of the published work (see The Effect of Open Access).