Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their freedom and love it. IT will simply never be the same.
Bring Your Own Devices (BYOD) Survival Guide explains the psycho-techno phenomenon also known as bring your own technology (BYOT). Providing the guidance necessary for living in this new world, it describes the new end-users (Millennials) and their demands, as well as the strategic and tactical ramifications of these demands.
Examining the business aspects of BYOD—selection, purchasing, and corporate culture—the book covers the broad range of technical considerations including selection, connectivity, training, support, and security. It also includes an extensive set of best practices.
The book is geared for the small- to medium-size enterprise that needs to integrate BYOD into their environment. It addresses topics such as content and data management, risk assessment, performance measurement, management, and even configuration management.
The text includes a set of Quick Start guides that provide tips for such things as assessing costs, cloud integration, and even legal issues. There is also a full set of appendices that supply helpful information on everything from security settings for Apple iOS devices to a sample employee mobile device agreement.
The BYOD Revolution
What’s in It for the Organization?
So, What Can Go Wrong?
Mobile Device Management
Consumerization of IT
Business as Usual
Making a Financial Case for BYOD
Estimating ROI for an IT Project
Rapid Economic Justification
Value Measuring Methodology
Step 1: Develop a Decision Framework
Task 1—Identify and Define Value Structure
Task 2—Identify and Define Risk Structure
Task 3—Identify and Define Cost Structure
Task 4—Begin Documentation
Step 2: Alternative Analysis—Estimate Value, Costs, and Risk
Task 1—Identify and Define Alternatives
Task 2—Estimate Value and Cost
Task 3—Conduct Risk Analysis
Task 4—Ongoing Documentation
Step 3: Pull Together the Information
Task 1—Aggregate the Cost Estimate
Task 2—Calculate the Return on Investment
Task 3—Calculate the Value Score
Task 4—Calculate the Risk Scores
Task 5—Compare Value, Cost, and Risk
Step 4: Communicate and Document
Task 1—Communicate Value to Customers and Stakeholders
Task 2—Prepare Budget Justification Documents
Task 3—Satisfy Ad Hoc Reporting Requirements
Task 4—Use Lessons Learned to Improve Processes
Integrating BYOD into Performance Measurement and Management Systems
Guidelines for Managing and Securing Mobile Devices in the Enterprise
Integrating BYOD into Resource Management
BYOD Means Social Networking
Jessica Keyes is president of New Art Technologies, Inc., a high technology and management consultancy and development firm started in New York in 1989. She has given seminars for such prestigious universities as Carnegie Mellon, Boston University, University of Illinois, James Madison University and San Francisco State University.
Keyes is a frequent keynote speaker on the topics of competitive strategy and productivity and quality. She is former advisor for DataPro, McGraw-Hill's computer research arm, as well as a member of the Sprint Business Council. Keyes is also a founding Board of Director member of the New York Software Industry Association. She has recently completed a two-year term on the Mayor of New York City's Small Business Advisory Council. She is currently a professor of computer science at Fairleigh Dickinson University's graduate center as well as the University of Phoenix, where she is the Area Chair for Programming and Operating Systems, and Virginia Tech. She is the former editor-in-chief of CRC Press' Information Management and Systems Development Management.
Prior to founding New Art, Keyes was Managing Director of R&D for the New York Stock Exchange and has been an officer with Swiss Bank Co. and Banker's Trust, both in New York City. She holds a Masters of Business Administration from New York University, and a doctorate in Management. She is a member of the Kappa Delta Pi, Beta Gamma Sigma and Delta Mu Delta honorary societies.
A noted columnist and correspondent with over 200 articles published, Keyes is the author of the following books:
The New Intelligence: AI in Financial Services, HarperBusiness, 1990
The Handbook of Expert Systems in Manufacturing, McGraw-Hill, 1991
Infotrends: The Competitive Use of Information, McGraw-Hill, 1992
The Software Engineering Productivity Handbook, McGraw-Hill, 1993
The Handbook of Multimedia, McGraw-Hill, 1994
The Productivity Paradox, McGraw-Hill, 1994
Technology Trendlines, Van Nostrand Reinhold 1995
How to be a Successful Internet Consultant, McGraw-Hill 1997
Webcasting, McGraw-Hill 1997Datacasting, McGraw-Hill, 1997
The Handbook of Technology in Financial Services, Auerbach, 1998
The Handbook of Internet Management , Auerbach, 1999
The Handbook of eBusiness, Warren, Gorham & Lamont, 2000
The Ultimate Internet Sourcebook, Amacom, 2001
How to be a successful Internet consultant, 2nd Ed, Amacom, 2002
Software Engineering Handbook, Auerbach 2002
Real World Configuration Management, Auerbach 2003
Balanced Scorecard, Auerbach, 2005
Knowledge Management, Business Intelligence, and Content Management: The IT Practitioner's Guide, Auerbach 2006
X Internet: The Executable and Extendable Internet, Auerbach 2007
Leading IT Projects: The IT Manager's Guide, Auerbach 2008
Marketing IT Products and Services, Auerbach, 2009
Balanced Scorecard and the Project Manager, Auerbach 2010
Social Software Engineering: Development and Collaboration with Social Networking, Auerbach 2011