BYOD also commonly referred to as bring your own device refers to a policy where organizations allow employees to use their personally devices to access company information and applications. Keyes refers to the policy as a psycho-technical phenomenon in an attempt to understand the practical application of the concept psychologically. It help elaborate and analyze the social and economic problems that might be caused by BYOD policy (Keyes, 2013). Calling the idea a psycho-technical phenomenon help people understand the implication the policy can have on any organization. Psychological analysis of the policy is important as IT departments are being overwhelmed making employees prefer using their own devices in carrying out their daily work activities. Understanding the practical application of the policy shows how the policy offers both employees and employers more flexibility at their work places.
The revolutionary effects of the BYOD and marketplace of products are similar to the widespread adoption of various cloud-based information services in multiple ways. They both offer organization employees with the flexibility on their work as they provide avenues and ease of information access (Stąpór and Laskowski, 2016). The two ideas both allow the use of mobile technology to share files and folders while at the same time take full advantage the functionality of the applications on the market. BYOD and cloud based information systems are major revolutionary ideas that work hand in hand in ensuring the businesses are flexible in carrying out their activities. The two form major changes in technological revolution as IT departments now look into adopting BYOD and cloud based solutions (Stąpór and Laskowski, 2016). The functionality of the two ideas has gone a long way in revolutionizing the way businesses carry out their operations. They have ensured continuity of business operations at any time as they allow for ease of access to critical information and business processes.
In as much as BYOD has its own advantages there is no denying its continuous use has been made possible through the increased use of computers and information technology. This has led to questions as to whether the idea is revolutionary or evolutionary. However, referring to the idea as revolutionary is appropriate as the idea is still being as there are concerns with its security once organizations allow their employees to adopt it (Olalere and Mahmod, 2015). BYOD means that organizations will not be able to keep track of what devices their employees use or at what time and where their employees access critical company information. It is therefore logical to refer to the concept as revolutionary as it will begin a new era in sharing and accessing of information (Olalere and Mahmod, 2015). By calling the concept revolutionary it becomes harder to understand the changes that the policy brings to organizations. Business operations would go on as usual however company employees will be in a position to carrying out their work activities from anywhere as long as they have a device that can access business data.
The BYOD revolution is therefore easily comparable to the championed quality management policy of the 1950’s. Deming and Juran called for the removal of the wall that exists between people and departments in organization hindering them from carrying out their work effectively. The introduction of BYOD in business has enabled the implementation of quality management as it has empowered employees and allowed them to perform better and provide high quality jobs (Oakland, 2014). Both quality management and BYOD movement champion for freedom in accessing data without having to rely on departments and having to be physically present in the organization to access the data. They two concepts work hand in hand as they help company employees to efficiently utilize their abilities within the organizations without much human influence.
References
Keyes, J. (2013). Bring your own devices (BYOD) survival guide: Managing the Consumerization of IT. Boca Raton, FL: Auerbach Publishers.
Oakland, J. S. (2014). Total quality management and operational excellence: Text with cases (4th ed.). London, United Kingdom: Taylor and Francis.
Olalere, M., & Mahmod, R. (2015). A review of bring your own device on security issues. SAGE Open, 5(2), . doi:10.1177/2158244015580372
Stąpór, P., & Laskowski, D. (2016). Bring your own device - providing reliable model of data access. Journal of KONBiN, 39(1), . doi:10.1515/jok-2016-0031