Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 177 tok/s
Gemini 2.5 Pro 43 tok/s Pro
GPT-5 Medium 26 tok/s Pro
GPT-5 High 25 tok/s Pro
GPT-4o 119 tok/s Pro
Kimi K2 202 tok/s Pro
GPT OSS 120B 439 tok/s Pro
Claude Sonnet 4.5 38 tok/s Pro
2000 character limit reached

BYOD and the Mobile Enterprise - Organisational challenges and solutions to adopt BYOD (1512.03911v1)

Published 12 Dec 2015 in cs.CY

Abstract: Bring Your Own Device, also known under the term BOYD refers to the trend in employees bringing their personal mobile devices into organisations to use as a primary device for their daily work activities. With the rapid development in computing technology in smartphones and tablet computers and innovations in mobile software and applications, mobile devices are becoming ever more powerful tools for consumers to access information. Consumers are becoming more inseparable from their personal mobile devices and development in mobile technologies within the consumer space has led to the significance of Consumerization. Enterprises everywhere want to introduce BYOD strategies to improve mobility and productivity of their employees. However making the necessary organizational changes to adopt BYOD may require a shift away from centralized systems towards more open enterprise systems and this change can present challenges to enterprises in particular over security, control, technology and policy to the traditional IT model within organisations. This paper explores some of the present challenges and solutions in relation to mobile security, technology and policy that enterprise systems within organisations can encounter. This paper also reviews real-life studies where such changes were made in organisations aiming to implement BYOD. This paper proposes a mobile enterprise model that aims to address security concerns and the challenges of technology and policy change. This paper ends with looking ahead to the future of mobile enterprise systems.

Citations (6)

Summary

We haven't generated a summary for this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (1)

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.