Management of Information: Bring Your Own Device (BYOD) Executive Summary The essay intends to illustrate about how the Bring Your Own Device (BYOD) program could be beneficial to the organisations in the context of modern day business environment and its allied altering needs…
Download full paperFile format: .doc, available for editing
Download file to see previous pages
It has been observed in the essay that BYOD program is quite beneficial in increasing the satisfaction of the employees and also to augment productivity of organisations. However, there are also certain privacy and security concerns which could be resolved with the incorporation and practice of certain steps and techniques. On the basis of those benefits and the rectification of the prevailing risks, the implementation of the BYOD program is recommended to AVIVA Plc. Table of Contents Executive Summary 2 Table of Contents 3 Introduction 4 Benefits and Challenges of BYOD Program 5 Benefits Related to BYOD Program 5 Risk Related to BYOD Program 6 Recommendations 7 Benefits of Mobile Devices in Employee Satisfaction and Productivity in AVIVA Plc 10 Conclusion 11 11 References 12 Introduction Aviva Plc is one of the most prominent and well known insurance companies of the world with its operations in various parts across the globe. It has been analysed that the company deals with certain products or services, such as insurance, savings and fund management among others. Geographically, the company operates in varied regions, which include the United Kingdom, Asia and Europe among others. It has been observed that company provide services to more than 43 million people all around the world. Furthermore, it has also been noted that the company employs approximately 36,600 people across the globe. It has been seeking to improve its domination in the global market and in this regard the company is aiming to implement the BYOD program in their operations. It has been observed that this program is helpful in enhancing employee happiness as well as increasing productivity of the business. It has been learnt that BYOD (bring your own device) is a program that enables the employs of an organisation to bring individually owned phones, laptops as well as other electronic gadgets in the workplace. As part of the program, the employees of the organisation would also be allowed to use those personal owned gadgets in accessing information and application related to the operations of company. It has been observed that this program is used by many of the companies in order to enhance their employees’ satisfaction and productivity (AVIVA, 2013; Nelson, 2012). The essay would aim to illustrate about the benefits as well the risks associated with BYOD program in an organisation. The essay would further recommend to Aviva Plc for the implementation of BYOD in their operations. Moreover, the essay would also portray about how mobile devices enhance the productivity as well as the employee satisfaction of any business. Benefits and Challenges of BYOD Program There are various benefits as well as challenges that are associated with the implementation of BYOD program in any organisation. A few of them would be discussed below: Benefits Related to BYOD Program The first and the foremost benefit of implementing a BYOD program would be to avoid the cost of the devices. The management of a company would be no longer responsible for the cost related to the upfront cost of the device that is going to be used by the employees. The employees are the ones who are going to bear all the costs related to the utilisation of the devices. Apart from this, it has also been noticed that BYOD program is helpful in increasing the satisfaction of the employees in the organisations. It has been analysed that rather than being stuck in the issues related to information technology (IT), the workers have evidently
...Download file to see next pagesRead More
Cite this document
(“Management of Information: Bring Your Own Device (BYOD) Essay”, n.d.)
Retrieved from https://studentshare.org/management/1472943-management-of-information-bring-your-own-device
(Management of Information: Bring Your Own Device (BYOD) Essay)
“Management of Information: Bring Your Own Device (BYOD) Essay”, n.d. https://studentshare.org/management/1472943-management-of-information-bring-your-own-device.
This report is aimed at developing the critical analysis of the literature that has been developed so far. Since the literature developed in the technological domain of business is very extensive, the scope of this study has been confined to the evaluation of the literature on technological change in Information Technology section of business anticipated for the year in which this report is developed.
This technology has improved a lot and has room for improvement and advancement more than the normal enterprise LAN, and much secure. It ensures safe mobility of the mobile devices of the enterprise network and allows hundreds of devices to be attached and configured with numerous remote users and remote network destinations.
What international background do you bring to M.B.A. school and how will it add value to your classmates and to your future management assignment?
I remember the first time I set foot on the United States three years ago, both giddy and uncertain about the future lying ahead of me.
Because we all are influenced by our backgrounds and childhood upbringing, it is important that anyone planning to move into a management arena, anywhere on the planet, understands the effect that preconceptions and even
Bring Your Own Technology (BYOT) or Bring Your Own Device (BYOD) is one method that enables an individual to learn at a faster pace. Smartphone, tablets and personal laptops are much faster as compared to the school computers,
Most rules in driving are aimed at protecting the driver, other drivers, the passengers and the pedestrians but not to limit the driver’s freedom as many people think. Knutson believes that imposing speed
Mobile devices have made the implementation of the BYOD technology simpler and less bound by time and physical boundaries, as employees can share can share and receive information on its cloud network on time regardless of their
The increased cyber-crimes are attributed to the increasing adoption of online transaction platforms. Many of credit card transactions need verification by the users to reduce high crime rate thus with the case of the medium