Embracing “Bring Your Own Device”

Author(s):  
James Blaisdell ◽  
Michael Kelly ◽  
Michael Lang ◽  
Kieran Muldoon ◽  
Joe Toner

People today have greater access to information than ever previously thought possible, and through the acquisition of knowledge feel, they have more control and certainty in their lives. New usages of IT, the expansion of smart phones and tablets, and the arrival of the Internet generation in the job market now mean that the separation between private life and professional life has become muddled. A challenge for modern organisations is whether to allow employees to use their own devices or attempt to halt this advancing tide. Although there is some disagreement about the drivers and perceived benefits, an increasing number of organisations are beginning to accept the practice of “Bring Your Own Device” (BYOD). In view of this emerging trend in the modern workplace, this chapter outlines a number of risk control and mitigation strategies that organisations may consider adopting to address the challenges associated with BYOD that lie ahead.

Author(s):  
Shankar Chaudhary

Despite being in nascent stage m-commerce is gaining momentum in India. The explosive growth of smart-phone users has made India much loved business destination for whole world. Indian internet user is becoming the second largest in the world next to China surpassing US, which throws open plenty of e-commerce opportunities, not only for Indian players, offshore players as well. Mobile commerce is likely to overtake e-commerce in the next few years, spurred by the continued uptrend in online shopping and increasing use of mobile apps.The optimism comes from the fact that people accessing the Internet through their mobiles had jumped 33 per cent in 2014 to 173 million and is expected to grow 21 per cent year-on-year till 2019 to touch 457 million. e-Commerce brands are eyeing on the mobile app segment by developing user-friendly and secure mobile apps offering a risk-free and easy shopping experience to its users. Budget 4G smart phones coupled with affordable plans, can very well drive 4G growth in India.


Mousaion ◽  
2016 ◽  
Vol 34 (1) ◽  
pp. 83-100
Author(s):  
Solomon Bopape

The study of law focuses, among other aspects, on important issues relating to equality, fairness and justice in as far as free access to information and knowledgeis concerned. The launching of the Open Access to Law Movement in 1992, the promulgation of the Durham Statement on Open Access to Legal Scholarshipin 2009, and the formation of national and regional Legal Information Institutes (LIIs) should serve as an indication of how well the legal world is committed to freely publishing and distributing legal information and knowledge through the Internet to legal practitioners, legal scholars and the public at large aroundthe world. In order to establish the amount of legal scholarly content which is accessible through open access publishing innovations and initiatives, this studyanalysed the contents of websites for selected open access resources on the Internet internationally and in South Africa. The results of the study showed that there has been a steady developing trend towards the adoption of open access for legal scholarly literature internationally, while in South Africa legal scholarly literature is under the control of commercial publishers. This should be an issue for the legal scholarship which, among its focus, is to impart knowledge about the right of access to information and knowledge.


Publications ◽  
2021 ◽  
Vol 9 (3) ◽  
pp. 34
Author(s):  
Ruth Breeze

At times of crisis, access to information takes on special importance, and in the Internet age of constant connectedness, this is truer than ever. Over the course of the pandemic, the huge public demand for constantly updated health information has been met with a massive response from official and scientific sources, as well as from the mainstream media. However, it has also generated a vast stream of user-generated digital postings. Such phenomena are often regarded as unhelpful or even dangerous since they unwittingly spread misinformation or make it easier for potentially harmful disinformation to circulate. However, little is known about the dynamics of such forums or how scientific issues are represented there. To address this knowledge gap, this chapter uses a corpus-assisted discourse approach to examine how “expert” knowledge and other sources of authority are represented and contested in a corpus of 10,880 reader comments responding to Mail Online articles on the development of the COVID-19 vaccine in February–July 2020. The results show how “expert” knowledge is increasingly problematized and politicized, while other strategies are used to claim authority. The implications of these findings are discussed in the context of sociological theories, and some tentative solutions are proposed.


2021 ◽  
Vol 1 (3) ◽  
pp. 58-60
Author(s):  
Katanakal Sarada ◽  
◽  
Dr. K. Nirmalamma ◽  
◽  

Mobile commerce is the buying and selling of goods and Services through wireless handled devices such as smart phones and tablets etc. Ecommerce Users to access M-commerce enables online shopping platforms without needing to use & a desktop computer. For example, purchase and sale of products. Online like banking and paying bills. (Virtual market place apps the Amazon mobile App, Android pay, Samsung pay etc...) The main idea behind M. commerce Is to enable various applications and services available on the internet to portable devices (mobiles, laptops, tables etc.) to overcome the constraints of a desktop computer. M commerce aims Serve all information and material needs of the people in a convenient and easy way.


2019 ◽  
Vol 43 (5) ◽  
pp. 799-817 ◽  
Author(s):  
Ivan-Damir Anic ◽  
Jelena Budak ◽  
Edo Rajh ◽  
Vedran Recher ◽  
Vatroslav Skare ◽  
...  

Purpose The purpose of this paper is to investigate the relationship between individual and societal determinants of online privacy concern (OPC) and behavioral intention of internet users. The study also aims to assess the degree of reciprocity between consumers’ perceived benefits of using the internet and their OPC in the context of their decision-making process in the online environment. Design/methodology/approach The study proposes comprehensive model for analysis of antecedents and consequences of OPC. Empirical analysis is performed using the PLS–SEM approach on a representative sample of 2,060 internet users. Findings The findings show that computer anxiety and perceived quality of regulatory framework are significant antecedents of OPC, while traditional values and inclinations toward security, family and social order; and social trust are not. Furthermore, the study reveals that perceived benefits of using the internet are the predominant factor explaining the intention to share personal information and adopt new technologies, while OPC dominates in explanation of protective behavior. Research limitations/implications Although the authors tested an extended model, there might be other individual characteristics driving the level of OPC. This research covers just one country and further replications should be conducted to confirm findings in diverse socio-economic contexts. It is impossible to capture the real behavior with survey data, and experimental studies may be needed to verify the research model. Practical implications Managers should work toward maximizing perceived benefits of consumers’ online interaction with the company, while at the same time being transparent about the gathered data and their intended purpose. Considering the latter, companies should clearly communicate their compliance with the emerging new data protection regulation. Originality/value New extended model is developed and empirically tested, consolidating current different streams of research into one conceptual model.


2007 ◽  
Vol 2 (1) ◽  
pp. 43-50
Author(s):  
Ana Maya Goto Uyehara

At the end of XX century, the old age theme has been approached due to concern of the society with the quality of man’s life in the aging process and the fact of seniors correspond to a growing representative portion of the population in the quantitative point of view. So the aging changes in a problem that wins expressiveness and legitimacy in the field of the daily current concerns. This article intends to demonstrate that the work can articulate other life projects for the seniors and to avoid psychic pathologies in the old age that can appear due to the loss of personal identity, to the involvement lack in motivated activities or starting from the adoption of inadequate consumption ways or lifestyles. For this, this article assumes a line of preventive character explanation under two slopes: the first refers to the fact that, if the work ennobles the man, he must acquire or improve this individual competences, adapting them to the new demands of the job market to get a job, or even to reactivate his professional life because new life projects. The second slope follows the direction of the discovery of the seniors’ potentialities for the companies, which can adapt the qualities [and limitations] of this workers category to the various functions in the organization. The Brazilian entrepreneur needs to be attentive to the image of his company and the differential competitive that can distinguish it of the other companies. And this can be to employee senior people or to maintenance it in the company personnel staff.


2003 ◽  
Vol 4 (4) ◽  
pp. 251-263 ◽  
Author(s):  
Stein Kristiansen ◽  
Bjørn Furuholt ◽  
Fathul Wahid

Internet cafés represent a potential means of bridging the information gap between social groups and geographical areas This study examines the spread of Internet cafés in Indonesia The main objectives are to identify characteristics of Internet café entrepreneurs and to enhance the understanding of preconditions for the provision of Internet access by small-scale private enterprises. A survey methodology is used and the data reveal clear statistical associations between entrepreneurial adaptations, such as connection types and service variety, and success variables. The authors' policy recommendations include government intervention, primarily in infrastructure development and awareness creation, for a more equitable spread of access to information through the Internet.


2018 ◽  
pp. 2124-2138
Author(s):  
Priya Makarand Shelke ◽  
Rajesh Shardanand Prasad

Over past few years, we are the spectators of the evolution in the field of information technology, telecommunication and networking. Due to the advancement of smart phones, easy and inexpensive access to the internet and popularity of social networking, capture and use of digital images has increased drastically. Image processing techniques are getting developed at rapidly and at the same time easy to use image tampering soft-wares are also getting readily available. If tampered images are misused, big troubles having deep moral, ethical and lawful allegations may arise. Due to high potential of visual media and the ease in their capture, distribution and storage, we rarely find a field where digital visual data is not used. The value of image as evidence of event must be carefully assessed and it is a call for from different fields of applications. Therefore, in this age of fantasy, image authentication has become an issue of utmost importance.


Sign in / Sign up

Export Citation Format

Share Document