![Using MIS (9th Edition)](https://www.bartleby.com/isbn_cover_images/9780134106786/9780134106786_largeCoverImage.gif)
Explanation of Solution
Advantages and disadvantages of employees using mobile systems at work:
The advantages of the workers using mobile phone at work are as given below:
- The use of mobile phone at work saves the cost and time.
- It offers greater employee satisfaction because they choose the work based on their own preferences rather than organization.
- It needs less training with more productivity because workers are already using the mobile devices for their own use.
- It also minimizes the support costs.
The disadvantages of workers using the mobile phone at work are as given below:
- The use of mobile phone at work station may leads to data loss or damage.
- Organization may loss the control at the time of data which is brought from workers owned device and it also loss the control when updating the software.
- This control loss may leads to compatibility issues.
- These drawbacks may leads to maximize the support costs.
BYOD (Bring Your Own Device):
The increasing trend among business organizations are employee-owned devices to perform specific official tasks known as BYOD. Tablets, Smartphone and laptops are the common example of BYOD.
BYOD policy:
The BYOD policy is a statement regarding permissions and responsibilities of workers when they utilize their own mobile device for business purpose.
List of BYOD policies:
The six BYOD policies are listed below:
- They don’t exit
- We’ll be a coffee shop
- We’ll offer limited systems you can access from any device
- You’re responsible for damage
- We’ll check it out, reload software, then manage remotely
- If you connect it, we own it
Compare the six policies with their functionalities and organizational control:
BYOD Policy | Functionality | Organizational control |
They don’t exit | This policy does not provides any functionality | This policy does not provide any control to organization. So the control is low. |
We’ll be a coffee shop | This policy uses wireless network to access to internet for business. | This policy does not provide any control to organization. So the control is low... |
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Chapter 4 Solutions
Using MIS (9th Edition)
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)