1 / 17

IT Consumerization

IT Consumerization. By Katarina Sandorova BUS 550 The Contemporary Firm CSU Channel Islands June 02, 2014. More Mobile Devices than Number of People on Earth?. 526 million mobile devices were added in 2013 (Cisco, 2014). Users Dependent on their Mobile Devices .

jolie
Download Presentation

IT Consumerization

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Consumerization By Katarina Sandorova BUS 550 The Contemporary Firm CSU Channel Islands June 02, 2014

  2. More Mobile Devices than Number of People on Earth? 526 million mobile devices were added in 2013 (Cisco, 2014)

  3. Users Dependent on their Mobile Devices • Lookout’s Mobile Mindset Study; 2,097 American adult respondents: • 60% check mobile devices every hour • 54% check mobile devices while lying in bed • 40% check their devices while in bathroom (Lookout, 2012) • Survey by Marriott; 890 American adult respondents: • for a 25% of hotel discount, 54% would forgo alcohol, but only 26% would give up their mobile devices (Marriott, 2014)

  4. Mobile Workers Carry Personal & Business Devices (The Times, 2012)

  5. Greater Benefits With Personal Devices • Consumer devices are attractive and inexpensive • Availability of millions of apps in ‘the cloud’ • These devices and apps are more powerful, useful and user-friendly, faster to get and more enjoyable than those provided by company IT • Opportunity to chose own tools • Accenture survey; 4,017 employees respondents: in 2011, 23% of employees were already using personal technology tools for work on a routine basis (MIS Quarterly Executive, 2012)

  6. Company IT’s ConcernsWith Personal Devices @Work • Security • How do we manage potential security breaches? • Support • How do we manage the increased complexity of our IT environment? • (MIS Quarterly Executive, 2012)

  7. Providing Innovative Tools to Employees: Solution? • Upside • Support: improved control over devices within company IT portfolio • Security: potential improvement via company device usage policy • Downside • Hard to select tools to everyone’s liking – employees’ frustration might continue • Short lifecycle – average professionals replace devices every two years (MIS Quarterly Executive, 2012) • High capital cost (the device), expense cost (accessories) • Company device usage policy often rigid, complex, hard to follow by the user and costly to keep up to date by IT • Apps ownership and transferability upon employment termination

  8. So What Is IT Consumerization? • Employee perspective: experiences gained from usage of devices in personal life seamlessly transferred and expected in workplace • Company IT perspective: informally used devices and apps may be seen as either a threat or opportunity • Market perspective: technologies available in the consumer marketplace are finding their way into the enterprise (MIS Quarterly Executive, 2012) IT Consumerization is Multi-faceted

  9. Management Strategies for IT Consumerization Middle Ground Strategies Laissez – Faire Management allows external devices and applications to enter the enterprise without restrictions Authoritarian Management exercises tight control and restricts the number of devices and applications entering the enterprise • (MIS Quarterly Executive, 2012)

  10. Middle Ground Strategy #1:Broadening the Scope • Create list of acceptable phones • Rather than specific devices, focus on technical requirements: • Encryption • Password • Remote locking • Employees agree to an acceptable-use policy: • Allows the corporation to remove all data in case the device is lost • Advise on “safe” apps Challenge: Keeping the list of acceptable devices and apps up to date; potential removal of private data • (MIS Quarterly Executive, 2012)

  11. Middle Ground Strategy #2: Providing a Gadget Budget • Employees receive a fixed allowance to be used to pay for own devices and apps subscriptions – choosing from allowable items • Requires a development of efficient approval process Challenge: Keeping the list of allowable items up to date • (MIS Quarterly Executive, 2012)

  12. Middle Ground Strategy #3: Segmenting Employees by Role • Addressing different needs and interest in using consumer technology in the workplace • Requires a development of IT Consumerization profiles for different role categories • Company provides equipment accordingly (i.e. iPad for C-level management, sales representatives, etc.) • Employees not falling into above role categories receive mobile device allowance (gadget budget) Challenge: Keeping the IT Consumerization profiles and allowable items up to date • (MIS Quarterly Executive, 2012)

  13. Middle Ground Strategy #4: Advocating Uptake • Enforcement of the use of cutting-edge consumer technology in the organization • Appropriate for high-tech industries (law firms, biotechnology, etc.) • “For organizations that desire to demonstrate how technology can be employed in new, and perhaps unanticipated, ways” (MIS Quarterly Executive, 2012) Challenge: High cost

  14. The Current Future:BYOD* and MDM** • MDM is a general term for a software that secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises (Wikipedia, 2014) • MDM can be installed on personal device of employees and it typically includes: • Distribution of applications (new apps, updates) • Configuration settings (company email system configuration, enforcing passwords) • Separation of personal data from company data • Remote control of device (administrator can remove access to company email and data when employee leaves the company or the device is lost/stolen) • Important when selecting MDM for an enterprise: • Flexibility: support of all major mobile platforms • Simplicity: simple enrollment process and self-service portal • Access to enterprise resources: connection to intranet sites, VPN access - to perform remote actions • Privacy concerns: prevention of tracking GPS location, personal user information, and telecom data; possibility of enterprise wipe without affecting personal content on the device (Air-watch, 2014) * Bring Your Own Device ** Mobile Device Management

  15. Key Take Away • Employees drive a gap closure between personal and business technology • Employees are emotionally attached to their personal devices, and will carry and use them everywhere • Company IT is recommended, rather sooner than later, to develop a strategy to manage the new environment; a solution that is the best fit for the company • Company IT’s focus should be on managing devices rather than managing people

  16. Quiz • What does not fall under the IT Consumerization? • Using personal iPhone for looking up facts needed for a clarification during a business meeting • Taking home a company provided laptop to play games • Apple iPad becoming a tablet standard in lot of companies • None of the above • In case of unofficially/informally used personal devices at work, what concerns the company IT the most? • Security • Support • Employees’ decreased focus on work • A & B • Which is/are the most important feature/s to look at when selecting Mobile Device Management (MDM) solution? • Easy to Jailbreak the device: Possibility to modify the operating system of the device • Flexibility: Compatibility with most mobile devices on the market • Simplicity: Easy to install and use; self-service • B & C • A & C

  17. References Air-Watch. (2014). Bring your own device (BYOD). Retrieved June 1, 2014, from http://www.air- watch.com/solutions/bring-your-own-device-byod Cisco. (2014, February 5). Cisco Visual Networking Index: Global mobile data traffic forecast update, 2013–2018. Retrieved June 1, 2014, from http://www.cisco.com/c/en/us/solutions/ collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.html Lookout. (2012). Mobile mindset study. Retrieved June 1, 2014, from https://www.lookout.com/ resources/reports/mobile-mindset Marriott. (2013, April 25). Vacationers trade sun and surf for art and culture. Retrieved June 1, 2014, f rom http://news.marriott.com/2013/04/vacationers-trade-sun-and-surf-for-art-and- culture.html MIS Quarterly Executive. (2012, September). IT Consumerization: When gadgets turn into enterprise IT tools [Case study]. Retrieved from http://informationstrategyrsm.files.wordpress.com/ 2012/09/it-consumerization-when-gadgets-turn-into-enterprise-it-tools.pdf The Times. (2012, May 1). The rise of the mobile worker. Retrieved June 1, 2014, from http:// www.thetimes.co.uk/tto/public/smallbusinessmasterclass/article3400136.ece Wikipedia. (2014, May 18). Mobile device management. Retrieved June 1, 2014, from http:// en.wikipedia.org/wiki/Mobile_device_management

More Related