Using the power of research to inform ICT integration in education

Posts tagged ‘byod’

What are the Security and Privacy Concerns raised by BYOD?

Keith W. Miller, Jeffrey Voas, George F. Hurlburt (2012) BYOD: Security and Privacy Considerations, Published by the IEEE Computer Society

Clearly, there are several important advantages for employees and employers when employees bring their own devices to work. But there are also significant concerns about security (where the employers have more to lose) and privacy (where the employees have more to lose). Companies and individuals involved—or thinking about getting involved—with BYOD should think carefully about the risks as well as the rewards. At the same time, there must be realization that the next generations of “digital natives” will likely have strong BYOT expectations.

Read Full Text

What factors need to be considered when Developing a Bring Your Own Device (BYOD) Strategy in Higher Education?

Scott Emery (2012) Factors for Consideration when Developing a Bring Your Own Device (BYOD) Strategy in Higher Education, Applied Information Management and the Graduate School of the University of Oregon in partial fulfillment of the requirement for the degree of Master of Science

The consumerization of IT changes the ways in which IT departments must plan for and manage technology. This annotated bibliography presents factors for consideration by IT leaders in higher education when developing an institution-wide strategy to address the use of personally owned mobile handheld devices, known as bring your own device (BYOD). Literature published between 2007 and 2012 is examined in regards to four categories: (a) policy creation, (b) data security, (c) user education, and (d) mobile learning.

Read Full Text

Tag Cloud