Validation: Assessment Model of BYOD

Demonstrate the value of ICT.

   This artifact demonstrates the value of ICT research process and methodology.   

   ICT research explores the dissemination of innovations throughout the workplace.  For example, the employee practice of bring your own device (BYOD) is innovative because it changes the way people work.

   This research covers a wide scope of material relating to BYOD.  The literature review explores the origins of BYOD, and is defined by four significant events: 
  •  Moore's Law, as it relates to workplace technology.  Perpetual innovation of computer systems has changed the way people work. 
  • Moore's Law for Power Consumption.  Traditional models do not scale well for mobility becuse computers have an insatiable appetite for power.  
  • Koomey's Law, as it relates to mobile efficiency.  Efficiency gains are revolutionary for battery powered mobile devices. 
  • Grove's Law, as it relates to bandwidth influences.    Grove’s Law transcends bandwidth innovation from cables to the airwaves.  The broadband revolution has begun to take shape and current designs favor mobility. 
   UW-Stout incorporates research methodology throughout the entire ICT curriculumThis research topic is about personal technology in the workplace.  It closely relates to the advanced switching and routing concepts in the emphasis curriculum.

   Employees connect their personal devices to the company network.  Consequently, network threats may manifest as smart devices connect to the corporate network.Unfounded assumptions, “can lead to broken, misconfigured, or bypassed security mechanisms” (Cisco Press, 2010).  An effective network assessment allows companies to make informed decisions.  Managers and network administrators may use it as reference to support decisions on whether to implement, or reject BYOD policy.

Cisco. (2010). 6.4.3 Wireless Security Solutions. In Cisco, CCNA Security Course Booklet (p. 180). Indianapolis, IN: Cisco Press.


Post a Comment

My Instagram