CFP last date
22 April 2024
Reseach Article

BYOD Technological: Next Generation Business Development Programs for Future Accelerations, Innovations and Employee Happiness

by Mohammad Khaled Al Hassan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 165 - Number 10
Year of Publication: 2017
Authors: Mohammad Khaled Al Hassan
10.5120/ijca2017913929

Mohammad Khaled Al Hassan . BYOD Technological: Next Generation Business Development Programs for Future Accelerations, Innovations and Employee Happiness. International Journal of Computer Applications. 165, 10 ( May 2017), 4-14. DOI=10.5120/ijca2017913929

@article{ 10.5120/ijca2017913929,
author = { Mohammad Khaled Al Hassan },
title = { BYOD Technological: Next Generation Business Development Programs for Future Accelerations, Innovations and Employee Happiness },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 165 },
number = { 10 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 4-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume165/number10/27607-2017913929/ },
doi = { 10.5120/ijca2017913929 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:12:03.831294+05:30
%A Mohammad Khaled Al Hassan
%T BYOD Technological: Next Generation Business Development Programs for Future Accelerations, Innovations and Employee Happiness
%J International Journal of Computer Applications
%@ 0975-8887
%V 165
%N 10
%P 4-14
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The changing trends of technology have change the way of doing businesses. 21st century world is categorized by a dense addiction on information technology and technical devices to accomplish even the modest of tasks. Smart phones are one of the technical device that influences the dependence to put in a circumstances where the privacy, honesty and convenience of information resources. Bring Your Own Device (BYOD) is a new leaning area the IT organization that has to deal with the costs, profits and risks. In this research, the consumer is put in the focus of consideration to measure the discrete concepts in the research model with a qualitative approach of case studies is accompanied. The research offers consequences about which factors have an impact on a personal devices use and employer appeal changes by the presenting of a BYOD service and when the impending employees are attentive in BYOD use and how BYOD will help on future accelerations and employee happiness.

References
  1. Apple, 2014. RCS BYOD Program Acceptable Devices, USA: Apple Incorporations.
  2. Aruba, 2013. Conquering Today’s Conquering Today’s, USA: Aruba White Paper.
  3. Aschmoneit, J., 2006. Methoden der empirischen Sozialforschung, Berlin: Schmidt.
  4. Balasubramanian, S. P. R. &. J. S., 2002. Exploring the Implications of M-Commerce for Markets and Marketing, s.l.: Journal of the Academy of Marketing Science.
  5. Ballano, 2010. Android Threats Getting Steamy, s.l.: Symantec Connect Community.
  6. Berelson, 2001. Qualitative Research Methods for the Social Sciences, Boston: Allyn & bacon.
  7. Botha, R. A. F. S. M. &. C. N. L., 2009. From Desktop to Mobile: Examining the Security Experience, s.l.: Computer and Security.
  8. Boyce, C. &. P. N., 2006. Conducting In-Depth Interviews: A Guide for Designing and Conducting In-Depth Interviews for Evaluation Input. Pathfinder International Tool Series.
  9. Bradley, 2003. Methodological issues and practices in qualitative research, s.l.: Libarary.
  10. Burns, N., 2014. Making the Case for BYOD Instruction in Teacher Education. Informing Science and Information Technology, Volume 11.
  11. Buscher, M. &. U. J., 2009. Mobile Methods and the Empirical, s.l.: European Journal of social theory.
  12. BÜSSING, B. H. &. A., 2004. The role of explicit and implicit knowledge in work performance. International Journal of Psychology Science, 46(4), pp. 408 - 432.
  13. Cavoukian, A., 2013. Bring Your Own Device: Is Your Organization Ready?, s.l.: TELUS.
  14. CDW-G, 2013. Bring Your Own Devices, New York: Whit e paper.
  15. Chen, L. &. N. R., 2003. A Framework for Mobile Business Applications, s.l.: International journal of Mobile Community.
  16. Chia, P. M. S. a. R. A., 2010. Understanding Organisational Security Culture, Las Vegas: Information Institute.
  17. CIO, 2012. Business Technological Leadershiip with BYOD fields, s.l.: www.cio.com.
  18. Cisco, 2014. Device Freedom Without Compromising the IT Network, s.l.: Cisco Enterprise.
  19. citrix, 2013. Best practices to make BYOD simple and secure, s.l.: White Papers.
  20. Clarke, N. a. F. S., 2007. Advanced User Authentication for Mobile Devices, s.l.: Computers and Security.
  21. Cleeremans, A., 2012. Implicit learning. Journal of Cognitive Science, Volume 7.
  22. Conlin, M., 2006. Smashing the Clock, s.l.: Business Week.
  23. Corbin, J. &. S. A., 2008. Grounded Theory Research: Procedures, s.l.: Qualitative Sociology.
  24. Daniel, D., 2008. Human Error Tops the List of Security Threats, s.l.: Social Computer World.
  25. Data, D., 2012. BYOD: A five key considerations, s.l.: Dimension Data.
  26. De Wever, B. S. T. V. M. &. V. K. H., 2008. Content Analysis Schemes to Analyze Transcripts of Online Asynchronous Discussion Groups, s.l.: A Review. Computer & technology.
  27. Dehlstrom, E., 2012. Consumerization in Information technology of BYOD, London: EDUCAUSE.
  28. Dell, 2012. Use Bring-Your-Own-Device Programs Securely, USA: Dell Incorporations.
  29. Dell, 2013. Enabling devices and device management for your mobility/BYOD program, s.l.: Dell Corporations.
  30. DeSanctis, G. &. P. M., 2001. Capturing the Complexity in Advanced Technology Use, s.l.: Organization Science.
  31. Desemery, B. A. &. J., 2012. Bring Your Own Device It’s all about Employee Satisfaction and Productivity, not Costs!, s.l.: Capgemini Consulting.
  32. Desemery, B. A. &. J., 2012. Bring Your Own Device It’s all about Employee Satisfaction and Productivity, not Costs!, England: CapGimini Consulting.
  33. Dhillon, G. &. B. J., 2010. Information system security management in the new millennium, s.l.: Communications of the ACM.
  34. Dixon, B., 2013. Bring Your Own Device To School, New York: Microsoft Corporation.
  35. Drew, M., 2006. Bringing Enterprise Mobility to Industry, s.l.: Manufacturers’ Monthly.
  36. Dunning, J. P., 2006. Taming the Blue Beast: A Survey of Bluetooth Based Threats, s.l.: IEEE.
  37. Eason, K., 2006. Changing Perspectives on the Organizational Consequences of Information Technology, s.l.: Behavior & Information Technology.
  38. Elgan, M., 2009. It's Time We Stopped Talking About Smartphones, s.l.: Technology World.
  39. Emea, 2013. Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD, France: Fortinet.
  40. Emery, S., 2012. Factors for Consideration when Developing a Bring Your Own Device (BYOD) Strategy in Higher Education. CAPSTONE REPORT.
  41. Ernest-Jones, T., 2006. Pinning Down a Security Policy for Mobile Data, s.l.: Network Security.
  42. Eschelbeck, G., 2013. BYOD Risks and Rewards, s.l.: Whitepaper.
  43. Fitzgerald, J., 2006. Managing Mobile Devices, s.l.: Computer Fraud & Security.
  44. Forozia, H. M. &. A., 2012. Challenges in Managing BYOD : A Study on Difficulties in Diffusion of BYOD models. International Journal of Business and Social Science, 3(19).
  45. Fortinet, 2013. Enabling Secure BYOD, s.l.: Fortinet.
  46. Fratto, M., 2009. Strategic Security Survey, s.l.: Technological Security.
  47. Furnell, S. a. T. K., 2009. Recognising the Varying User Acceptance of IT Security., s.l.: Computer Fraud and Security.
  48. Furnell, S. J. A. &. K. D., 2006. The challenges of understanding and using security, s.l.: Computers and Security.
  49. Gajar, P. K., 2013. BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES. Journal of Global Research in Computer Science, 4(4).
  50. Ghonaimy, M. A. E.-H. M. T. &. A. H. K., 2002. Security in the Information Society:Visions and Perspectives., s.l.: Kluwer Academic Publishers.
  51. Google, 2013. The New BYOD: Best Practices for a Productive BYOD Program, United States: AirWatch.
  52. Gourlay, S., 2008. ‘BYOD Model:THE VARIETY OF MEANINGS IN EMPIRICAL RESEARCH. International Journal of Technology Management.
  53. Grant, K. A., 2007. BYOD Models: We Can Still Learn from Polanyi. The Electronic Journal of Knowledge Management, Volume 5, pp. 173 - 180.
  54. Hamza, H. M. a. M. S., 2008. Achieving Organizational Competitiveness through capturing BYOD Model. Journal of Knowledge Management, Volume 7.
  55. Hannam, K. S. M. &. U. J., 2006. Mobilities, Immobilities and Moorings, s.l.: Mobilities.
  56. Heikkila, F. M., 2007. Encryption: Security Considerations for Portable Media Devices, s.l.: Security & Privacy, IEEE.
  57. Hildenbrand, J., 2012. Android 4.2 brings new security features to scan sideloaded apps, s.l.: Android Central.
  58. HP, 2014. Simplifying Bring Your Own Device (BYOD) in Education, s.l.: HP .
  59. IBM, 2014. Top ten commendments of BYOD, New York: Fiber Link Communication.
  60. ICT, 2012. BYOD program at St Julian’s School, s.l.: St. Julian School.
  61. Intel, 2012. Getting Started with BYOD, s.l.: Intel Corporations.
  62. Intel, 2012. Insights on the Current State of BYOD, s.l.: Intel IT Center.
  63. Johnson, K., 2012. InfoSec Reading Room, s.l.: SANS Institute.
  64. Kessel, P. v., 2013. Bring your own device: Security and risk considerations for your mobile device program, s.l.: E-Y.
  65. McGuire, G. G. M. &. M. J., 2012. THE “BRING YOUR OWN DEVICE”TO WORK MOVEMENT, s.l.: The Littler Report.
  66. MobileIron, 2011. Building “Bring-Your-Own-Device” (BYOD) Strategies, s.l.: MobileIron.
  67. Navetta, D., 2012. The Legal Implications of BYOD. ISSA Journal, Volume 4.
  68. Networks, A., 2013. The Definitive Guide to BYOD, s.l.: ARUBA Networks.
  69. NMC, 2013. NMC Horizon Project Short List, s.l.: NMC.
  70. Paul, 2013. Bring Your Own Device, Washington: Booker T. Washington High School.
  71. pelino, m., 2012. Building The Business Case For A Bring-Your-Own-Device (BYOD) Program, s.l.: Forrester.
  72. Priyadarshi, G., 2013. Leveraging and Securing the Bring Your Own Device and Technology Approach. ISACA JOURNAL, Volume 4.
  73. Taylor, H., 2007. Bring Your Own Devices: conceptualizations and operationalizations. International Journal of Knowledge Management, 3(3).
  74. Venkatesh, V. M. M. G. D. G. B. &. D. F. D., 2003. User Acceptance of Information Technology. Toward a Unified View. In: MIS , Volume 27(3), p. 425–478.
  75. Verhagen, J., 2012. Tracing BYOD: Practices and Promises. Journal of Acadmic Publishing.
  76. Vogel, R. K. T. &. B. T., 2010. Desktopvirtualisierung: Definitionen - Architekturen - Business-Nutzen. , s.l.: Wiesbaden: Viewer & Teubner Verlag.
  77. Watch, A., 2012. Enabling Bring Your Own Device (BYOD) In the Enterprise, s.l.: AirWatch.
  78. Weiber, R. &. M. D., 2010. The Nature and Determinats of Customer Expectations of Service. Journal of the Academy of Marketing Science, Volume 21.
  79. Zhixin Chen, M. S. a. S. S. R. A., 2006. Linking BYOD MOdel in the Pediatric Pain e-Mail Archives in PubMed. Hawaii, Proceedings of the 39th Hawaii International Conference on System Sciences.
Index Terms

Computer Science
Information Sciences

Keywords

Information Technology BYOD Organizational Efficiency Developing Knowledge Innovations Employee Happiness Future Accelerations.