40
WHITE PAPER Understanding BYOD A Guide to Concepts and Issues for Learning Practitioners SHARON VIPOND, PHD

WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

WHITE PAPER

Understanding BYOD

A Guide to Concepts and Issues for Learning Practitioners

SHARON VIPOND, PHD

Page 2: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.comi

© 2016 by The eLearning Guild. All rights reserved.

The eLearning Guild 120 Stony Point Rd., Suite 125

Santa Rosa, CA 95401

www.eLearningGuild.com

+1.707.566.8990

Writer: Sharon Vipond

Copy Editors: Brian Hooper and Jillian Johnson

Publication Designer: Bill Webster

You may download, display, print, and reproduce this material in unaltered form only

(retaining this notice) for your personal, non-commercial use or use within your organization.

All other rights are reserved.

This is a FREE digital white paper. Other than the authors and sponsors of this white paper,

no one is authorized to charge a fee for it or to use it to collect data.

Attribution notice for information from this publication must be given and must credit the

title and individual author in any citation. Readers should be aware that Internet websites

offered as citations or sources for further information may have disappeared or been

changed between the date this white paper was written and the date it is read.

Page 3: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.comi i

Contents

What’s in This White Paper? 1

Introduction 3

Basic Terminology 4

Information Technology Consumerization 5

The Upside of BYOD 6

Satisfaction and Productivity 6

Reduced Demand for Technical Support 6

Improved Mobility 8

BYOD Challenges and Issues 9

Governance and Compliance 9

Mobile Device Management and Mobile Application Management 10

Workforce Expectations 10

Employee Pushback 11

Data Security 12

Resource Demand 13

Legal Exposure 13

Why Learning Practitioners Need to Understand BYOD 15

BYOD Guidelines and Considerations 16

Responsive Learning Design 19

Looking Forward 21

Business Drivers and Benefits 21

Page 4: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

i i i

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Security Concerns 22

Current Use 22

Inhibitors to Adoption 23

Risk Management 23

Conclusion 25

Resources 26

Glossary of Key Terms 33

About the Author 36

Page 5: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

1

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

What’s in This White Paper?

In 2013, a landmark study by Cisco found that 90 percent of full-time workers in the United

States used their personal smartphones for work purposes. The authors of the study went on

to observe:

It’s a staggering finding that validates a trend industry experts have been debating

for several years now: Bring Your Own Device or BYOD. The consumerization of this

technology has given the modern worker enormous work flexibility, while giving IT

departments substantial headaches.1

The purpose of this white paper is to provide learning leaders and practitioners a guide to

understanding current BYOD concepts and issues, with particular emphasis on how these

impact learning and development (L&D).

In this white paper, you will learn:

• How BYOD and related terms, such as MDM, MAM, BYOT, EMM, and VPN, are defined within the context of our discussion

• What role BYOD plays in the larger trend of information technology (IT) consumerization, or the “blending” of personal and business use of technology devices and applications

• About the upside of BYOD and the substantial satisfaction, productivity, and mobility benefits it can provide

• About the complex challenges and issues surrounding BYOD that, if left unmanaged, can lead to data loss, security breaches, and serious legal exposure

• What expectations today’s workforce has for using personal mobile devices, and how poorly managed device policies can cause employee dissatisfaction and refusal to participate in a BYOD program

• Why learning leaders and practitioners need a solid understanding of BYOD concepts and issues to continue creating leading-edge digital learning content in today’s consumerized corporate and academic environment

• Why an understanding of responsive design is critical for learning practitioners and essential for creating digital learning content that is device agnostic

• About The eLearning Guild’s forthcoming research into the use of BYOD practices and policies within the Guild’s global membership community

1Cisco, BYOD Insights 2013.

Page 6: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

2

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

• About a wide range of the Guild’s resources, external references, and industry reports regarding BYOD

• Definitions of key terminology discussed in this white paper

Page 7: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

3

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Introduction

Many of us in the L&D field have viewed the controversy around BYOD as a concern for the

IT community and data security specialists.

However, given the inescapable fact that much, if not most, of our learning content is now

digitized and delivered over global networks through a wide variety of devices, we can no

longer remain on the conceptual and policy-making sidelines of BYOD.

Although this white paper is not a comprehensive discussion of BYOD, it does provide learn-

ing leaders and practitioners a conceptual framework for understanding the BYOD context

and issues, with particular emphasis on how these impact L&D.

Throughout the white paper, we will refer to the individual users of personal and mobile

devices as employees, workers, and learners. This recognizes that although most industry

literature focuses on BYOD use within the corporate work environment, our goal here is to

move the overall focus to learners and learning practitioners. Thus, when we speak of BYOD

issues that impact the workforce or employees, be alert to how these same issues impact

learners in our L&D context.

Let us begin our review of BYOD concepts and issues with the following facts that are impor-

tant to our discussion:

• Gartner predicts that by 2018, more than 50 percent of users (read learners) will turn to a tablet or smartphone first for all online activities.

• A 2014 survey from Tech Pro Research revealed that 74 percent of organizations already allow employees to bring their own devices to work, or are at least planning for this to happen.

• In a blog post for TechRepublic, Scott Matteson quotes a Gartner study that predicts BYOD will become more of a requirement than a privilege:

The days of employees bringing their iPhones and iPads into the office begging for

them to be hooked up are over. In fact, if anything workers will start seeing com-

panies requesting or even mandating that they use their own devices for company

work.2

2Matteson, “Ways BYOD Will Evolve.”

Page 8: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

4

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

• A 2015 post by Springwise, a research curator, does a good job of summarizing the topic:

There are strong incentives for businesses to invest in employee-facing apps and

encourage their workforce to use their own devices. But understanding and mini-mizing the … risks is pivotal for any success in doing so [italics added]. While each

challenge will take work—whether writing up new rules for device management or

upgrading IT systems—the only risk not worth taking is eschewing the BYOD oppor-

tunity altogether.3

Let us start with some basic terminology and then establish the larger context (i.e., IT con-

sumerization) from which BYOD has emerged and continues to grow.

Basic Terminology

Be aware that there are many “bring your own” concepts. Some of them are compared

here (all definitions are excerpted from Techopedia), while other relevant terminology used

throughout can be found in the glossary at the end of this white paper.

• Bring Your Own Device (BYOD). Bring your own device (BYOD) refers to employees who bring their own computing devices—such as smartphones, laptops, and tablet PCs—to work with them and use them in addition to or instead of company-supplied devices. The prevalence of BYOD is growing as people increasingly own their own high-end mobile computing devices and become more attached to a particular type of device or mobile operating system.

• Bring Your Own Cloud (BYOC). Bring your own cloud (BYOC) is a concept/trend in which employees are allowed to use public or private third-party cloud services to perform certain job roles. BYOC often involves the piecing together of enterprise and consumer software, both in the cloud and on the premises, to get the job done.

• Bring Your Own Computer (BYOC). Bring your own computer (BYOC) is a concept/trend by which employees are encouraged or allowed to bring and use their own personal computing devices to perform some or part of their job roles. A BYOC policy defines the different types, models, and applications in which employees can use personal computing resources within an organization’s IT perimeter.

• Bring Your Own Technology (BYOT). Bring your own technology (BYOT) is a developing phenomenon in enterprise IT in which a company’s executives and employees choose, and often buy, their own computer devices. BYOT mostly applies to mobile devices such as smartphones and tablet computers.

3Springwise, “Revolutionizing the Workplace.”

Page 9: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

5

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

• Corporate Owned, Personally Enabled (COPE). Corporate owned, personally enabled (COPE) is an IT business strategy through which an organization buys and provides computing resources and devices to be used and managed by employees. COPE allows an organization to source and deliver computing devices and services to employees and is how most organizations provide handheld or portable devices/gadgets to their employees. These devices can include but are not limited to laptops/notebooks, smartphones, tablets, PCs, and/or software services.

Information Technology Consumerization

To provide a broader context, BYOD is part of the larger trend known as IT consumerization.

In this trend, personal devices are increasingly being brought into the business workplace

and used interchangeably for work and personal interests, often regardless of the employer’s

policies.

For the past several years, IT trade journals and technical publications have featured articles

warning of the numerous legal, security, privacy, and employee engagement issues that

emerge from this trend of “blending” uses. At the same time, CIOs and IT professionals

have been grappling with device management issues and implementing sophisticated mobile

device management (MDM) platforms to deal with the security implications of BYOD. Legal

firms have also issued opinions and recommendations regarding the risks, legal exposure,

and policy requirements of BYOD practices.

Although it might seem as though such technical or esoteric topics as IT consumerization,

MDM, mobile application management (MAM), virtual private network (VPN), and BYOD are

outside the realm of required knowledge for today’s learning leaders and practitioners, that

is no longer the case. In fact, key to a solid understanding of BYOD is identifying both posi-

tive and less positive aspects of this trend.

Let us first look at the benefits and opportunities that BYOD provides. In spite of the fear

and trepidation often expressed in industry publications, BYOD does indeed have an upside.

Page 10: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

6

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

The Upside of BYOD

In a recent issue of CIO Magazine, Sarah K. White reports that many companies clearly rec-

ognize the upside of BYOD and have already accepted BYOD as a reality. As a result, these

companies’ “challenge now is striking a balance between security and flexibility.”4

We can divide the upsides of BYOD into several categories. These benefits and positive

features may not be found in all situations; however, additional benefits may be identified as

the IT consumerization trend grows and becomes more pervasive.

Satisfaction and Productivity

It is clear from the research that employees increasingly recognize an upside to BYOD. A

survey from Software Advice found that employees view BYOD positively for several reasons

excerpted here:5

• Better productivity. Employees feel they get more work done when using their personal device.

• More flexibility. Employees can combine their work and personal lives, and access work content from anywhere.

• More utility. Employees may require specific functions that are better provided by their personal device.

• More familiarity. Employees may prefer the interface or operating system of their personal device.

Reduced Demand for Technical Support

The Software Advice survey looked at “how, why, and to what degree BYOD can be lever-

aged to reduce demand for support and lower IT help desk costs.” The findings reveal that

BYOD “has the potential to lower IT help desk expenses by minimizing the creation of new

tickets.” As Craig Borowski, a market researcher at Software Advice, further observes about

the survey results of BYOD’s effect on the IT help desk (see Figure 1):

It seems plausible that if people are more skilled using a device, they’ll run into tech-

nical problems with it less often. And when they do run into technical problems,

their higher skill level will enable them to solve more problems without outside

help.6

4White, “Effective BYOD Policy.” 5Borowski, IT Help Desk Burden.6Ibid.

Page 11: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

7

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Source: Software Advice, 2014

Figure 1: Frequency of technical problems with own device vs. company device

In fairness, there is also a downside. Troy Fulton and Bill Brandon report that:

[Seventy percent] of a typical information technology (IT) group’s budget goes

to support existing infrastructure. There’s not much left over for dealing with

employee-owned devices and software.7

Beyond just the budget issues, Fulton and Brandon also point out:

Troubleshooting gets complicated when the help desk staff is not familiar with the

employee’s device. It would be possible to leave employees on their own when they

need support (except for email), but this risks lower employee satisfaction and less-

ened productivity when they can’t figure out how to connect their personal device

to the company network.8

7Fulton and Brandon, “Bring Your Own Device.”8Ibid.

Page 12: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

8

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Improved Mobility

A recent report published by Crowd Research Partners identified multiple drivers and benefits

of BYOD (see Figure 2). As reported by information security expert Holger Schulze:

With over 4 billion mobile subscribers, we live in a world where mobility is ubiqui-

tous and enterprises have begun to benefit from it. This is supported by the findings

of our survey, which found that the top three drivers of BYOD among employees are

improved mobility (61 percent), greater satisfaction (56 percent), and increased pro-

ductivity (55 percent). Interestingly, these employee-related benefits are considered

more important than reduced costs (47 percent).9

Source: Crowd Research Partners, 2016

Figure 2: Main drivers and benefits of BYOD for survey-takers’ company

BYOD devices in the hands of users, employees, and learners can lead to potential increases

in productivity and create opportunities to expand and enrich the “anywhere, anytime”

learning experience. However, along with those opportunities come significant data security

risks that may carry severe legal ramifications.

9Schulze, BYOD & Mobile Security.

Page 13: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

9

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

BYOD Challenges and Issues

Entire books have been written about the numerous challenges, issues, pitfalls, and genu-

ine dangers of allowing employees to bring their own devices into the workplace and use

them behind a secure firewall. Given the space constraints of this short white paper, let us

establish an overview of the conceptual framework of those challenges and issues. See the

Resources section at the end of the paper for additional reading materials that provide a

more complete picture of the subject and address the complete list of BYOD challenges and

issues.

We can use some of the items identified in Gartner’s “Bring Your Own Device” overview, to

help build our selective framework of BYOD challenges and issues. As Gartner states:

Bring your own device, or BYOD, is a disruptive phenomenon [italics added] where

employees bring non-company IT into the organization and demand to be con-

nected to everything—without proper accountability or oversight.10

Governance and Compliance

BYOD exposes an organization to the real risk of endangering intellectual property and

violating governmental regulations and other critical business protocols. Mission-critical data,

market reputation, and brand loyalty may be damaged or lost. Gartner advises company

executives (including learning leaders and practitioners) to address these questions:11

• Is the help desk ready to deal with all of the device types that accompany BYOD?

• How will the IT department or security team recognize data leaks?

• How will the organization protect against Internet hacking threats?

• How will company executives face the auditor if critical information is compromised?

• How can company leaders assess level of risk and also quantify it?

• How can BYOD risks be balanced with the need to maintain user experience, employee morale, and productivity?

10Gartner, “Bring Your Own Device.”11Ibid.

Page 14: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

10

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Mobile Device Management and Mobile Application Management

To a large extent, this challenge relates to the following two BYOD concepts that learning

practitioners need to understand (definitions adapted from Techopedia):

• Mobile Application Management (MAM). A type of security management related to the use of specific mobile apps used to provide security for software products installed on smartphones, tablets, and mobile devices.

• Mobile Device Management (MDM). The control of one or more mobile devices through various types of access control and monitoring technologies. MDM is commonly related to enterprise use of mobile devices, in which it is important for businesses to both enable effective mobile device use and protect sensitive data from unauthorized access.

Gartner suggests asking these questions related to IT platforms and device management:12

• How much money will need to be allocated for new IT investments to support BYOD programs?

• How can costs be contained as BYOD usage grows within the workforce and learner community?

• What types of tools and technology platforms are available to manage and secure the company’s information assets in the BYOD world?

Workforce Expectations

Many organizations facing BYOD do not adequately understand employee (or learner) expec-

tations about device usage. They also do not clearly understand that these expectations are

significant, widespread, and deeply held.

Here is the key point: A growing body of research indicates that virtually all members of

today’s workforce—including employees, learners, contractors, job applicants, and recruits—

use multiple devices, and they expect to use any device or application at any time, anywhere.

12Ibid.

Page 15: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

11

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

For example, a 2011 PwC research study—Millennials at work: Reshaping the workplace—

found that these expectations are particularly strong among the Millennial workforce.

The Millennial generation’s world is digital. ... It’s hardly surprising then that Mil-

lennials have specific expectations about how technology is used in the workplace.

Millennials expect the technologies that empower their personal lives to also drive

communication and innovation in the workplace. 59% said that an employer’s pro-

vision of state-of-the art technology was important to them when considering a job,

but they habitually use workplace technology alongside their own.13

The important question is: How will organizations successfully balance mobile device/BYOD

management policies with the deeply held expectations (and demands) of their learners and

entire workforce? Before moving on with our discussion, let us take a closer look at these

demands and expectations to better understand why they often lead to significant BYOD

resistance.

Employee Pushback

The survey BYOD Security: 2015 Rise of the Employees found that a majority of the 2,000

individuals included in the survey had a negative response to attempts at MDM. The authors

of the study prefaced their findings with this observation:

Bring Your Own Device (BYOD) and mobility have completely transformed the way

that IT departments provision devices to employees. The first attempt at providing

secure mobility was to control and lock down devices via enterprise mobility solu-

tions like Mobile Device Management (MDM) or Mobile Application Management

(MAM). Unfortunately, employees frequently reject these solutions as too oppressive

or too invasive into personal privacy. The result is that millions of dollars are spent

on MDM/MAM solutions for BYOD programs that never achieve anticipated broad

adoption. So will BYOD be relegated to the dustbin or does it simply need a fresh

approach?14

13PwC, Millennials at work.14Bitglass, BYOD Security.

Page 16: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

12

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Furthermore, their research yielded the following insights, excerpted here:15

• A total of 57 percent of end users (and 38 percent of IT professionals) do not participate in a company BYOD program because they do not want IT departments to have visibility into their personal data and applications.

• IT and employees agree—67 percent of employees would participate in a BYOD program if employers had the ability to protect corporate data, but could not view, alter, or delete personal data and applications. A total of 64 percent of IT professionals believe such a solution would make their BYOD program more successful.

• MAM is dead on arrival. Despite a huge push by enterprise mobility management vendors, only 9 percent of organizations have deployed a MAM solution. Violations of application licensing agreements and fragile “wrapping” approaches have softened the impact of MAM.

The authors concluded that employees are increasingly “fed up with intrusive BYOD pro-

grams” and are refusing to share personal data with their companies. They recommend that

IT teams “come to terms with reality” and better understand that “participation in BYOD

programs is low because employees are worried about IT control over personal devices.”16

Data Security

While we can only briefly summarize BYOD security issues here, Gartner stresses that “the

key to a secure device is having a well-managed device. … If left unmanaged, BYOD can

lead to loss of control, impact your network availability, and cause data loss.”17 Gartner

stresses that in the BYOD environment, “devices are too easy to lose. Loss and theft statis-

tics are staggeringly high, and not just for travelers. Consumer devices are at risk from weak

passwords and OS defenses. ... Sensitive information loss is a certainty.”18

15Ibid.16Ibid.17Gartner, “Bring Your Own Device.”18Ibid.

Page 17: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

13

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Gartner suggests asking the following data security questions:19

• How can an organization ensure that company data is in the right place at the right time, encrypted, and ultimately deleted according to relevant business rules?

• What access controls will be needed to decide which devices can open a VPN or connect an employee to the company Wi-Fi?

• Should unmanaged (or unknown) devices be allowed to access a local area network?

Resource Demand

Coupled with the issues that Gartner identified, there are concerns about the additional

resources that BYOD environments require. Aislyn Fredsall, writing in a TechTarget blog,

discussed resource concerns raised by Bryan Barringer, an enterprise mobility expert. Fredsall

cites Barringer as saying that the BYOD-stimulated increase in devices also means an increase

in network demand and bandwidth consumption.20

Then going beyond the resource issue, Fredsall identifies another risk: There is more unen-

crypted data than ever before. And even when users set their devices to encrypt data, there

is still a very real danger, because as Barringer warns, “Once you … go past the [mobile

device’s] lock screen, that device is not encrypted anymore. It’s encrypted when it’s locked,

but for the most part when it’s unlocked, that is an open device.”21

Legal Exposure

Regardless of all else we may know about BYOD, we know that bringing personal devices

into the workplace—regardless of policy or personal use—is rife with potential legal expo-

sure for both users and employers. Library shelves are full of books and legal opinions about

the legal and illegal use of personal devices and mobile devices inside or outside the work-

place. Here we will only briefly review the legal issues of BYOD.

19Ibid.20Fredsall, “BYOD best practices.”21Ibid.

Page 18: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

14

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

A US legal firm specializing in security and privacy has summarized key points of relevant

federal guidance for BYOD security. According to the firm, these guidelines—available from

the National Institute of Standards and Technology website—specify “six high-level recom-

mendations that enterprises should address to securely deploy and manage mobile devices”

(excerpted here). Organizations should:22

• Have a mobile device security policy23 that defines the types of devices permitted, the resources that may be accessed, and how provisioning is handled

• Develop system threat models for mobile devices and the resources that are accessed through mobile devices

• Consider the merits of each provided security service, and determine which services are needed for the specific environment, and then design and acquire one or more solutions that collectively provide the necessary security services

• Implement and test a pilot of their mobile device solution before putting the solution into production

• Fully secure each organization-issued mobile device before allowing a user to access it

• Regularly maintain mobile device security

Now that we have a basic understanding of the key benefits and challenges of BYOD, let

us take a more detailed look at how these same issues impact today’s learning leaders and

practitioners. In particular, we will examine why a solid understanding of responsive design

principles and practices provides learning practitioners with the best tool for dealing with

BYOD implications.

22InfoLawGroup, “New Federal Guidance.”23A BYOD policy “is used to support the deployment of BYOD in an organization. An effective BYOD policy facilitates employee

productivity in a flexible manner. For example, a company may manage and track employee devices through an MDM process,

which involves setting up security for mobile devices and laptops to block intruders from breaking into a firewall or VPN.”

(source: Techopedia.)

Page 19: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

15

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Why Learning Practitioners Need to Understand BYOD

As we have stressed throughout this white paper, learning practitioners must have a solid

understanding of BYOD, including all of its advantages and challenges, if they are to work

successfully with other stakeholders, IT professionals, and policy makers to bring coherence

to today’s multiple-device learning environment.

The time has passed when learning practitioners could watch from the sidelines as numer-

ous types of devices flooded the corporate and academic24 learning space. No longer can

learning practitioners remain passively unaware, as they are overwhelmed with the task of

designing and deploying multiple versions of high-value content across a largely unsecured

digital environment. Most importantly, L&D must be an equal partner with the organization’s

IT and legal groups, and must ensure that the interests and concerns of learning practitioners

are reflected in BYOD policies and device management practices.

In addition to the BYOD issues previously discussed, learning practitioners should have a

basic understanding of the following guidelines and considerations, and be able to lever-

age that knowledge in their stakeholder advocacy, content strategies, and design decisions.

However, unlike the earlier issues that span various fields, from IT to data security to legal

compliance, these points relate directly to L&D and will inevitably come to impact learning

leaders and practitioners.

Mindful of the volume of BYOD literature, we will separate this large discussion into two

parts: BYOD Guidelines and Considerations, and Responsive Learning Design. Please note

that The eLearning Guild has published a substantial body of reference material, practical

guidelines, and resources on the topics of BYOD and responsive design. See the Resources

section at the end of this paper for a wide-ranging index of these materials.

Let us now dive into the detailed BYOD information and guidance, as provided by several

industry experts and Guild authors.

24Although our discussion can be equally applied to BYOD within both corporate and academic learning environments, other

research has focused on BYOD in academia only. In the Resources section are several examples: Gillies, “To BYOD or Not to

BYOD”; Brooks, ECAR Study of Undergraduate Students; and Hewlett-Packard, Simplifying Bring Your Own Device.

Page 20: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

16

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

BYOD Guidelines and Considerations

Robert Gadd and Katherine Guest have identified six BYOD considerations that learning

practitioners and training teams need to be aware of, as summarized here:

• Create flexible learning experiences. Do not assume that your learners will be able to access your standard learning portal using their device’s web browser. Gadd and Guest offer this best practice:

Implement a learning-portal architecture that is mobile aware, and build it using

tools and frameworks like jQuery Mobile using flexible CSS interfaces that can be

rendered differently for both your online- and mobile-learning communities. And

make sure you’ve verified smooth operation on as many Internet-connected devices

as possible (both modern and legacy).25

• Define your device universe. Determine and document a well-defined list of mobile devices that your learning content will support. As Troy Fulton advises, be careful to coordinate with the IT group, which may have its own list of devices.26 See the numerous BYOD policy-making guidelines and references included in the Resources section of this white paper.

• Provide support for mixed learning approaches. As Gadd and Guest further observed, “Learning on a mobile device is a different experience compared with more traditional instructor-delivered classes and online-delivered courses. ... Mobile devices often use competing media formats, storage mechanisms, and encryption methods,” all of which introduce complexity into a BYOD environment without optimal policy management.27 Gadd and Guest offer this best practice:

Look for mobile learning solutions that allow you to combine formal training with

informal learning interactions … for learners who invariably have their preferred

device in their pocket or purse wherever they may roam.28

• Adopt strict mobile security policies and practices. Some IT organizations implement sophisticated MDM platforms to control certain aspects of personally owned devices. Without going into all of the technical details, it is clearly advisable to work with your IT group to understand its overall BYOD policy and particularly those parts that directly impact devices that are likely to be used for learning purposes.29

25Gadd and Guest, “Top Six BYOD Considerations.”26Fulton, “Does Your mLearning Play Nicely?”27Gadd and Guest, “Top Six BYOD Considerations.”28Ibid.29Fulton, “Does Your mLearning Play Nicely?”

Page 21: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

17

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

• Future-proof your content. Instructional designers must make digital learning content and training deliverables more flexible and device agnostic to reach today’s learning communities at the specific device they are using. One way to do this is to use responsive web design principles to create content that dynamically adapts to the unique delivery and device requirements of a given learner community.30

• Tighten integration with L&D and HR platforms. As we emphasized earlier, enhanced teamwork and digital integration are essential for BYOD success. Gadd and Guest offer this advice:

Make sure all mobile learning apps directly connect with your LMS/TMS platforms

and ensure connections are possible between your learners and the various docu-

ment stores, media servers, and internal social networks your teams use to leverage

organizational preparedness.31

Michelle Lentz and Brandon Carson provide guidance for designers of mobile learning

(mLearning) content, and clearly define the challenges created by BYOD and the preference

among learners for their own mobile devices:

Consumers expect participatory content experiences. They want them to be con-

textually relevant (relevant to what they are doing right now), consumable with

multiple devices, and they want them to be trusted and sharable. This is what they

expect their experience of the learning content that we provide to be. The problem

for us with this is: What do we do? Do we design three different courses: one for

the smartphone, one for the tablet, and one for the desktop?32

30Gadd and Guest, “Top Six BYOD Considerations.”31Ibid.32Lentz and Carson, “Content for Multiple Mobile Devices.”

Page 22: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

18

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Stressing the point that BYOD means that learning content developers now need to “play

nice” with the IT group, Fulton offers importance guidance to those designing and launching

learning apps for mobile devices:33

• Learning content developers need to support MAM and their company’s BYOD policies. Cooperate with IT security managers who are wisely trying to restrict apps because they are not easy to manage, control, or secure.

• Understanding and following MAM and BYOD policies will better enable content developers to proactively adjust their apps to meet the wants and needs of IT.

Fulton also offers important MAM tips for mLearning content creation, adapted here:34

• Make sure the app can be optimized in a cloud environment.

• Use simple updates that are not confusing for the end user.

• Make the app available over both Wi-Fi and cellular; include a cost-saving option of Wi-Fi only.

• Make sure the IT group can easily find information describing your application’s operating system, memory, and other operational requirements.

• Enable the app to be deployed privately rather than through an external app store, such as Apple’s app stores.

• Determine whether the application tracks location or usage. If the app does this, it may be illegal in some countries. Determine whether the IT group can disable and enable this functionality easily.

• Determine whether the application requires a specific type of hardware certificate35 ensuring that a specific device is authorized to access the application and its data.

33Fulton, “Does Your mLearning Play Nicely?”34Ibid.35This certificate may be a hardware security certificate or a client authentication certificate. (See the glossary for definitions of

each type.)

Page 23: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

19

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Responsive Learning Design

If learning practitioners gain only one insight from the entire BYOD discussion, it should be

this: Become proficient in responsive learning design; it is the future of digital learning.

Responsive design refers to the creation of content that can adapt itself to any type of device

(Figure 3) and any screen resolution. In Responsive Web Design Best Practices, authors Ben

Gremillion, Jerry Cao, and Zack Rutherford point out that responsive design has traditionally

been recognized by these three concepts:36

• Fluid grids. A type of grid used to structure content predictably and consistently “by adjusting the size and positioning of the elements contained within.”

• Flexible images. “Visual content or media that adjusts to fit a user’s screen size.” Placing images within a flexible grid prevents images from being larger than the grids they are in, while also allowing them to resize and maintain their aspect ratio.

• Media queries. Applying different styles “according to a number of device-specific qualities such as screen width, height, and orientation.”

Source: Guild Research, 2016

Figure 3: Digital learning devices

36Gremillion, Cao, and Rutherford, Responsive Web Design Best Practices.

Page 24: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

20

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

A good example is discussed in one of our recent case studies. This case study describes

Rent-A-Center’s successful mLearning initiative and deals with many of the same issues

regarding mobile devices, digital learning, and responsive design that are addressed in this

white paper. You can read the Learning Solutions Magazine article, “Research Spotlight:

Supporting Multiyear Business Transformation at Rent-A-Center,” or the Guild Insights case

study: Supporting Multiyear Business Transformation: Rent-A-Center’s Innovative Approach to Mobile Learning and Performance Coaching.

For the Buzzword Decoder column in Learning Solutions Magazine, Pamela Hogle provides

an excellent definition of the concept of responsive design.37 Here is her definition of the

term:

Content designed to be ‘responsive’ detects the size of the screen or browser

window that a learner is using and adjusts to fit that window. Using responsive

design when creating eLearning ensures that learners can access the content on any

device—smartphone, tablet, laptop, or desktop computer. It frees the content from

the constrictions of a particular size or type of screen.38

Equally important, Hogle goes on to note that while responsive design “does not specifically

refer to eLearning content targeted for use on smartphones, using responsive design simpli-

fies support for mobile eLearning.”39 She also stresses that:

A truly responsive design does more than simply shrink font sizes and move blocks

of text to accommodate narrower or wider screens, though; it provides all learners

an appealing, easily navigable eLearning experience. Using responsive design also

eliminates the need to create separate web and mobile modules for an eLearning

course, making it easier to update and maintain eLearning content.40

37Compare Pamela Hogle’s definition with Cammy Bean’s definition of responsive eLearning: “A single version of your course

delivered to multiple devices, built using everyday web technology (HTML, JavaScript, CSS).” (Source: Bean, “Responsive

eLearning Is a Must-have.”)38Hogle, “Buzzword Decoder: Responsive Design.”39Ibid.40Ibid.

Page 25: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

Looking Forward

A 2017 goal for Guild Insights, the Guild’s research practice, is to gather more practical

data and insights on the topic of BYOD. In particular, we want to understand how well

the members of the Guild community are managing BYOD in their learning environments,

both corporate and academic. We also want to identify best practices and other practical

guidelines that members of our community can apply to the challenges and opportunities of

BYOD, in 2017 and beyond.

As we look forward to that research initiative, here is a small sample of the topics, and

associated questions, that we plan to explore. As always, if you have any input or sugges-

tions regarding specific topics or survey questions, please send them to Sharon Vipond at

[email protected].

Business Drivers and Benefits

Regardless of whether your company currently has a BYOD policy in place, what do you

think are the main business drivers and benefits of using personal devices for work pur-

poses?

• Improved employee mobility or flexibility

• Enhanced employee morale or job satisfaction

• Increased employee productivity

• Reduced costs

• Reduced security risks

• Employee privacy

21

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Page 26: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

22

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Security Concerns

Regardless of whether your company currently allows the use of personal devices for work

purposes, what do you see as the main security concerns related to BYOD?

• Data leakage or loss of company data

• Unauthorized access to company systems

• Employees’ downloading unsafe apps or inappropriate data

• Malware

• Lost or stolen devices

• Vulnerability exploits or external hacking attacks

• Network attacks via Wi-Fi

• Inability to control endpoint security

• Ensuring that security software is up to date

• Compliance with regulations

• Device tracking, management, and maintenance

Current Use

Does your organization currently allow the use of personal devices for work purposes?

• Yes, we currently allow the use of personal devices for work purposes, such as accessing company networks and data

• No, we do not currently allow the use of personal devices for work purposes, but within the next 12 months we will begin allowing BYOD for work purposes

• No, we have no plans to allow the use of personal devices for work purposes

Page 27: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

23

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Inhibitors to Adoption

If your organization allows the use of personal devices for work purposes, what is the

number one inhibitor to BYOD adoption within your company?

• We do not experience any resistance to BYOD adoption

• Employees do not need personal device access because we offer managed device alternatives

• Employees do not want personal device access for work purposes

• Employees do not want to take on the additional expense of personal devices for work

• Employees have privacy and data access concerns

• Employees have other types of user experience concerns such as limited battery life, confusion over app choices, and privacy fears for their personal data

• Concerns about IT support costs

• Opposition from management

Risk Management

Thinking of the ways in which your organization manages the risks associated with BYOD,

which of these are used most often?

• Educating employees about your organization’s BYOD policies

• Educating employees about mobile device security risks

• Mobile device management (MDM) tools

• Network access controls (NACs)

• Guest networking

• Configuration controls

• Endpoint integrity checking

• Endpoint malware protections

• Endpoint security tools (with permanent agents)

• Endpoint security tools (without permanent agents)

• Application controls

Page 28: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

24

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

• Configuration control or lifecycle management

• Handled by managed services providers or software-as-a-service cloud providers (e.g., Google apps)

Page 29: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

Conclusion

If we want to get a good picture of where BYOD is going in 2017 and beyond, we can look

across the wide body of industry research and digital marketing studies and realize that

BYOD is here and growing exponentially year over year.

To illustrate, here are some striking observations from Akuity Technologies, as adapted from

its blog post “Seven Stats about the Future of BYOD”:

• 10 billion: This is the number of personal mobile devices that are estimated to be in use by 2020. This does not take into account technology yet to be invented. Some employees will be more likely to use more than one personal device for work.41

• Two out of three companies will adopt a BYOD solution by 2017: This is progress, but one might wonder why the remaining third of companies are still waiting to adopt a BYOD solution when so many employees are already using BYOD.42

• 1.3 billion devices will have mobile security applications installed on them by 2018: As the mobile market grows so will cyberattacks aimed at portable devices. The next five years will reveal whether security app and BYOD policies will be sufficient to thwart these emerging threats.43

• Globally, the BYOD market is expected to grow to $181.39 billion by 2017: The market was worth only $67.21 billion in 2011. The 2017 estimate represents almost a 200 percent jump in six years.44

• By 2017, half of employers will require employees to buy their own devices: Though today’s workers are clamoring for more BYOD, it remains to be seen how they will react if it becomes mandatory, along with strict policies on security, device choice, and limited or no stipends to purchase the technology and accompanying data charges.45

As we can already see, the global community’s current dependence on multiple personal

devices, and its resulting need for BYOD, will continue to evolve in complex and challenging

ways.

The goal of our 2017 BYOD study is to better understand that evolution. What we want to

accomplish with the study is to focus specifically on the Guild’s global community and gain

unique insights that apply specifically to the knowledge and practice needs of learning lead-

ers and practitioners.

41Akuity Technologies, “Future of BYOD.” 42Ibid.43Ibid.44Ibid.45Ibid.

25

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Page 30: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

Resources

The eLearning Guild

Articles

Batt, Jeff. “Design for Mobile First: CSS Best Practices for Responsive HTML.” Learning Solu-tions Magazine. 29 September 2016.

https://www.learningsolutionsmag.com/articles/2073/

Bean, Cammy. “Responsive eLearning Is a Must-have, Not Just Nice-to-have.” Learning Solutions Magazine. 23 February 2015.

https://www.learningsolutionsmag.com/articles/1628/

de Waard, Inge. “Make Your Cloud/MOOC Course BYOD Friendly (Part 4).” Learning Solu-tions Magazine. 26 September 2012.

https://www.learningsolutionsmag.com/articles/1017/

Fulton, Troy. “Does Your mLearning Play Nicely with the IT Department?” Learning Solu-tions Magazine. 13 February 2013.

https://www.learningsolutionsmag.com/articles/1104/

Fulton, Troy, and Bill Brandon. “‘Bring Your Own Device’: Are You Ready?” Learning Solu-tions Magazine. 4 June 2012.

https://www.learningsolutionsmag.com/articles/941/

Gadd, Robert, and Katherine Guest. “Top Six BYOD Considerations: Adopting an Open

(Screen) Door Policy.” Learning Solutions Magazine. 7 April 2014.

https://www.learningsolutionsmag.com/articles/1396/

Hogle, Pamela. “Buzzword Decoder: Responsive Design.” Learning Solutions Magazine.

25 October 2016.

https://www.learningsolutionsmag.com/articles/2097/

Hogle, Pamela. “Responsive Design and Vertical Video Add Up to Engaging eLearning.”

Learning Solutions Magazine. 26 October 2016.

https://www.learningsolutionsmag.com/articles/2098/

Ivec, Stephanie. “Five Tips: Are You Ready to Deploy Mobile Learning?” Learning Solutions Magazine. 29 October 2014.

https://www.learningsolutionsmag.com/articles/1556/

26

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Page 31: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

Lasher, Neil. “Is Cybersecurity the Next Compliance?” Learning Solutions Magazine.

22 February 2016.

https://www.learningsolutionsmag.com/articles/1905/

Lassoff, Mark. “Mobile, Tablet, and Laptop: Coding Responsive Design.” Learning Solutions Magazine. 20 March 2014.

https://www.learningsolutionsmag.com/articles/1387/

Lentz, Michelle, and Brandon Carson. “Designing Content for Multiple Mobile Devices.”

Learning Solutions Magazine. 1 October 2012.

https://www.learningsolutionsmag.com/articles/1018/

Medved, J.P. “Mobile eLearning Design: How to Survive Your First mLearning Project.”

Learning Solutions Magazine. 3 March 2014.

https://www.learningsolutionsmag.com/articles/1359/

Poulos, Dawn. “Mobile Migration: Why Your Training Content Belongs in the Cloud.”

Learning Solutions Magazine. 11 June 2012.

https://www.learningsolutionsmag.com/articles/944/

Rasmussen, James. “Learner Engagement: Tips for Responsive Design.” Learning Solutions Magazine. 21 May 2014.

https://www.learningsolutionsmag.com/articles/1427/

Vipond, Sharon. “Research Spotlight: Supporting Multiyear Business Transformation at

Rent-A-Center.” Learning Solutions Magazine. 7 April 2016.

https://www.learningsolutionsmag.com/articles/1940/

Conferences and Events

Bean, Cammy. “Top Tips for Responsive eLearning Instructional Design.” DevLearn 2014 Conference & Expo. 30 October 2014.

https://www.elearningguild.com/conference-archive/index.cfm?id=5843

Richards, Debbie. “Exploring BYOD Approaches for Mobile Learning.” FocusOn Learning 2016 Conference & Expo. 9 June 2016.

https://www.elearningguild.com/conference-archive/index.cfm?id=7474

Tyler, Keith. “Getting Started with Mobile Implementation.” FocusOn Learning 2016 Con-ference & Expo. 9 June 2016.

https://www.elearningguild.com/conference-archive/index.cfm?id=7481

27

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Page 32: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

Reports and Papers

Hoober, Steven, and Patti Shank. Making mLearning Usable: How We Use Mobile Devices. The eLearning Guild, 2014.

https://www.elearningguild.com/insights/index.cfm?id=174

Vipond, Sharon. Supporting Multiyear Business Transformation: Rent-A-Center’s Innovative Approach to Mobile Learning and Performance Coaching. The eLearning Guild, 2016.

https://www.elearningguild.com/insights/index.cfm?id=194

Additional Resources

Articles

CIO Magazine. “All About BYOD.” 25 June 2014.

http://www.cio.com/article/2396336/byod/all-about-byod.html

Gillies, Christopher Graham Mckercher. “To BYOD or Not to BYOD: Factors Affecting

Academic Acceptance of Student Mobile Devices in the Classroom.” Research in Learning Technology, Vol. 24. October 2016.

http://www.researchinlearningtechnology.net/index.php/rlt/article/view/30357

Goldman, Jeff. “38 Percent of IT Security Pros Don’t Participate in Their Own BYOD Pro-

grams.” eSecurity Planet. 28 September 2015.

http://www.esecurityplanet.com/mobile-security/38-percent-of-it-security-pros-dont-partici-

pate-in-their-own-byod-programs.html

Hamblen, Matt. “The bring-your-own-device fad is fading.” Computerworld. 15 July 2015.

http://www.computerworld.com/article/2948470/byod/the-bring-your-own-device-fad-is-

fading.html

Hendrikse, Rene. “How to introduce bring-your-own-device schemes in the enterprise.”

Computer Weekly. April 2012.

http://www.computerweekly.com/opinion/Bring-Your-Own-Device-in-the-Enterprise

Kaneshige, Tom. “BYOD Became the ‘New Normal’ in 2013.” CIO Magazine.

19 December 2013.

http://www.cio.com/article/2380058/byod/byod-became-the--new-normal--in-2013.html

Kaneshige, Tom. “BYOD Stirs Up Legal Problems.” CIO Magazine. 10 May 2012.

http://www.cio.com/article/2395061/legal/byod-stirs-up-legal-problems.html

28

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Page 33: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

Kaneshige, Tom. “How BYOD Puts Everyone at Legal Risk.” CIO Magazine. 21 November

2013.

http://www.cio.com/article/2380725/byod/how-byod-puts-everyone-at-legal-risk.html

Maddox, Teena. “Research: 74 percent using or adopting BYOD.” ZDNet. 5 January 2015.

http://www.zdnet.com/article/research-74-percent-using-or-adopting-byod/

Navetta, David. “The Legal Implications of BYOD: Preparing Personal Device Use Policies.”

ISSA Journal. November 2012.

http://www.infolawgroup.com/files/2012/12/BYOD_ISSA1112-pdf1.pdf

White, Sarah K. “How to implement an effective BYOD policy.” CIO Magazine.

26 September 2016.

http://www.cio.com/article/3124127/byod/how-to-implement-an-effective-byod-policy.html

Zaveri, Jay. “Rise of the ‘consumer enterprise.’” VentureBeat. 24 June 2013.

http://venturebeat.com/2013/06/24/rise-of-the-consumer-enterprise/

Books

Gremillion, Ben, Jerry Cao, and Zack Rutherford. Responsive Web Design Best Practices: Advice, Tutorials, Case Studies. Mountain View, CA: UXPin, 2015. PDF eBook.

https://www.uxpin.com/studio/ebooks/responsive-web-design-best-practices/

Reports and Papers

Bitglass. BYOD Security: 2015 Rise of the Employees. https://pages.bitglass.com/Bitglass_BYOD_Security_report_2015.html

Borowski, Craig. BYOD’s Effect on the IT Help Desk Burden: IndustryView 2014. Software

Advice. 18 September 2014.

http://www.softwareadvice.com/crm/industryview/byod-help-desk-burden-2014/

Brooks, D. Christopher. ECAR Study of Undergraduate Students and Information Technol-ogy, 2016. EDUCAUSE Center for Analysis and Research, October 2016.

https://library.educause.edu/resources/2016/6/~/media/files/library/2016/10/ers1605.pdf

Cisco. BYOD Insights 2013: A Cisco Partner Network Study. March 2013.

https://iapp.org/media/pdf/knowledge_center/Cisco_BYOD_Insights_2013.pdf

29

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Page 34: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

Enterprise Mobility Foundation. The Enterprise Mobility Policy Guidebook. April 2012.

http://www.ndm.net/mobile/pdf/wp_emf_byod_policy_guide_tools.pdf

Hewlett-Packard. Simplifying Bring Your Own Device (BYOD) in Education: New solutions ease management and ensure security. 2013.

http://www.i-kan.org/Resources/BYODInEducation.pdf

Johnson, Kevin. SANS Mobility/BYOD Security Survey. SANS Institute InfoSec Reading

Room. March 2012.

https://www.sans.org/reading-room/whitepapers/analyst/mobility-byod-security-survey-35210

LeHong, Hung, and Nick Jones. CIOs’ Next-Generation Mobile Strategy Checklist. Gartner.

April 2012.

https://www.gartner.com/doc/1998618?ref=SiteSearch&sthkw=BYOD&fnl=search

Mann, Jeffrey. What the Apple iPad and Other Mobile Devices Mean for Collaboration Plan-ners. Gartner. July 2013.

https://www.gartner.com/doc/2545015

PwC. Millennials at work: Reshaping the workplace. 2011.

https://www.pwc.com/m1/en/services/consulting/documents/millennials-at-work.pdf

Schulze, Holger. BYOD & Mobile Security: 2016 Spotlight Report. Crowd Research Partners.

2016.

http://www.crowdresearchpartners.com/wp-content/uploads/2016/03/BYOD-and-Mobile-

Security-Report-2016.pdf

Souppaya, Murugiah, and Karen Scarfone. Guidelines for Managing the Security of Mobile Devices in the Enterprise. National Institute of Standards and Technology, U.S.

Department of Commerce.

http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf

Websites

Akuity Technologies. “Seven Stats About The Future of BYOD.” 17 March 2014.

http://www.akuity.com/2014/03/17/seven-stats-about-the-future-of-byod/

Basili, Joe. “BYOD, CYOD, CLEO, COPE: Making Sense of Mobility Terminology.” Channel

Partners. 7 June 2013.

http://www.channelpartnersonline.com/blogs/peertopeer/2013/06/byod-cyod-cleo-cope-

making-sense-of-mobility-term.aspx

30

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Page 35: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

Fredsall, Aislyn. “BYOD best practices call for mobility governance team.” TechTarget.

13 April 2015.

http://searchcompliance.techtarget.com/video/BYOD-best-practices-call-for-mobility-gover-

nance-team

Fredsall, Aislyn. “Don’t let BYOD legal issues sink your BYOD initiative.” TechTarget.

13 April 2015.

http://searchcompliance.techtarget.com/video/Dont-let-BYOD-legal-issues-sink-your-BYOD-

initiative

Frost & Sullivan. BYOD Done Right is a Win-Win for Workforce Mobility. SlideShare, posted

by “Samsung Business USA.” 7 August 2015.

http://www.slideshare.net/SamsungBusinessUSA/byod-done-right-is-a-winwin-for-workforce-

mobility

Gartner. “Bring Your Own Device: BYOD is here and you can’t stop it.”

http://www.gartner.com/technology/topics/

Gartner. “Gartner Says Bring Your Own Device Programs Herald the Most Radical Shift in

Enterprise Client Computing Since the Introduction of the PC.” 28 August 2012.

http://www.gartner.com/newsroom/id/2136615

Gartner. “Gartner Says By 2018, More Than 50 Percent of Users Will Use a Tablet or Smart-

phone First for All Online Activities.” 8 December 2014.

http://www.gartner.com/newsroom/id/2939217

InfoLawGroup. “New Federal Guidance for BYOD Security Released.” 26 June 2013.

http://www.infolawgroup.com/2013/06/articles/mobile/nist_sp800-124r1/

InfoLawGroup. “The Security, Privacy and Legal Implications of BYOD (Bring Your Own

Device).” 28 March 2012.

http://www.infolawgroup.com/2012/03/articles/byod/the-security-privacy-and-legal-implica-

tions-of-byod-bring-your-own-device/

i-SCOOP. “The consumerization of IT: overview and evolutions.”

http://www.i-scoop.eu/byod-consumerization/

Lord, Nate. “BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach.”

Digital Guardian Blog. 12 October 2016.

https://digitalguardian.com/blog/byod-security-expert-tips-policy-mitigating-risks-preventing-

breach

31

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Page 36: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

Matteson, Scott. “10 ways BYOD will evolve in 2016.” TechRepublic: 10 Things Blog.

22 January 2016.

http://www.techrepublic.com/blog/10-things/10-ways-byod-will-evolve-in-2016/

Moody, Jason. “Defining terms: A quick guide to mobility terminology.” Dell TechCenter.

7 April 2015.

http://en.community.dell.com/techcenter/enterprise-client/emm/b/weblog/

archive/2015/04/07/defining-terms-a-quick-guide-to-mobility-terminology

Redfield, Will. “Survey: Despite Security Incidents, BYOD Worth The Risks.” Symantec Offi-

cial Blog. 24 April 2013.

https://www.symantec.com/connect/blogs/survey-despite-security-incidents-byod-worth-risks

Rouse, Margaret. “IT consumerization (information technology consumerization).” TechTar-

get. November 2011.

http://searchmobilecomputing.techtarget.com/definition/IT-consumerization-information-

technology-consumerization

Springwise. “How ‘Bring Your Own Device’ Is Revolutionizing the Workplace.” 22 July

2015.

http://www.springwise.com/bring-device-revolutionizing-workplace/

Techopedia. https://www.techopedia.com/

TechTarget. “Put it on paper: A guide to mobile device policy creation.”

http://searchmobilecomputing.techtarget.com/essentialguide/Put-it-on-paper-A-guide-to-

mobile-device-policy-creation

WhatIs. “Wireless and mobile.”

http://whatis.techtarget.com/glossary/Wireless-Mobile

32

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Page 37: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

Glossary of Key Terms

Note: All of the following terms and definitions are excerpted from the Techopedia online IT

and computer dictionary, except for the definition of “Intellectual Property (IP),” excerpted

from WhatIs.com.

Bring Your Own Cloud (BYOC): Bring your own cloud (BYOC) is a concept/trend in which

employees are allowed to use public or private third-party cloud services to perform certain

job roles. BYOC often involves the piecing together of enterprise and consumer software,

both in the cloud and on the premises, to get the job done.

Bring Your Own Computer (BYOC): Bring your own computer (BYOC) is a concept/trend

by which employees are encouraged or allowed to bring and use their own personal com-

puting devices to perform some or part of their job roles. A BYOC policy defines the different

types, models, and applications in which employees can use personal computing resources

within an organization’s IT perimeter.

Bring Your Own Device (BYOD): Bring your own device (BYOD) refers to employees who

bring their own computing devices—such as smartphones, laptops and tablet PCs—to work

with them and use them in addition to or instead of company-supplied devices. The preva-

lence of BYOD is growing as people increasingly own their own high-end mobile computing

devices and become more attached to a particular type of device or mobile operating system.

Bring Your Own Device Policy (BYOD Policy): A bring your own device policy (BYOD

policy) is used to support the deployment of BYOD in an organization. An effective BYOD

policy facilitates employee productivity in a flexible manner. For example, a company may

manage and track employee devices through a mobile device management (MDM) process,

which involves setting up security for mobile devices and laptops to block intruders from

breaking into a firewall or virtual private network (VPN).

Bring Your Own Technology (BYOT): Bring your own technology (BYOT) is a developing

phenomenon in enterprise IT in which a company’s executives and employees choose, and

often buy, their own computer devices. BYOT mostly applies to mobile devices such as smart-

phones and tablet computers.

Client Authentication Certificate: A client authentication certificate is a certificate used

to authenticate clients during an SSL handshake. It authenticates users who access a server

by exchanging the client authentication certificate. Client authentication is identical to server

authentication, with the exception that the telnet server demands a certificate from the access-

ing client. This is to verify that the client is who they claim to be. This eliminates the listing of

anonymous entries in a database’s user activity log when an Internet user accesses the server.

33

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Page 38: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

34

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Corporate Owned, Personally Enabled (COPE): Corporate owned, personally enabled

(COPE) is an IT business strategy through which an organization buys and provides com-

puting resources and devices to be used and managed by employees. COPE allows an

organization to source and deliver computing devices and services to employees and is how

most organizations provide handheld or portable devices/gadgets to their employees. These

devices can include but are not limited to laptops/notebooks, smartphones, tablets, PCs,

and/or software services.

Data-Retention Policy: A data-retention policy is an organization’s policy or protocol

regarding the saving of data for regulatory or compliance purposes, or the disposal of it

when no longer needed. The policy highlights how data or records need to be formatted and

what storage devices or system to use, as well as how long these need to be kept, which is

usually based on a regulatory body’s rules.

Enterprise Mobility Management (EMM): Enterprise mobility management (EMM) is the

collective set of tools, technologies, processes, and policies used to manage and maintain

the use of mobile devices within an organization. EMM is an evolving organizational trend

that deals with the business, as well as technological context, of the increasing trend of

mobile and handheld device usage in routine business operations.

Intellectual Property (IP): Intellectual property (IP) is a term for any intangible asset—some-

thing proprietary that doesn’t exist as a physical object but has value. Examples of intellectual

property include designs, concepts, software, inventions, trade secrets, formulas and brand

names, as well as works of art. Intellectual property can be protected by copyright, trade-

mark, patent, or other legal measure.

IT Consumerization: IT consumerization refers to a trend in which a business’s employees

expect to be able to use personal devices to connect to corporate networks. The consumer-

ization of IT has grown out of consumers’ increasing integration with their personal mobile

devices, such as smartphones and tablet computers.

Local Area Network (LAN): A local area network (LAN) is a computer network within a

small geographical area such as a home, school, computer laboratory, office building, or

group of buildings. A LAN is composed of interconnected workstations and personal com-

puters, which are each capable of accessing and sharing data and devices, such as printers,

scanners, and data storage devices, anywhere on the LAN.

Page 39: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

35

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

Legal Hold Order: A legal hold is a situation in which a business or organization makes

changes to its method of records management in order to preserve information because of

a pending litigation. This often involves the handling of complex digital data across sophisti-

cated IT architectures. A legal hold may also be called a “preservation” order, “hold” order,

or “data preservation” order.

Mobile Application Management (MAM): Mobile application management (MAM) is a

type of security management related to the use of specific mobile apps. In general, MAM

is practiced in the business world to provide security for the types of software products

installed on smartphones, tablets, and mobile devices.

Mobile Device Management (MDM): Mobile device management (MDM) refers to the

control of one or more mobile devices through various types of access control and monitor-

ing technologies. This term is commonly related to enterprise use of mobile devices, where it

is important for businesses to both allow for effective mobile device use, and protect sensi-

tive data from unauthorized access.

Responsive Web Design (RWD): Responsive web design (RWD) is an approach in web

development and design that is geared toward creating sites that provide an efficient and

appealing visual experience with text that is easy to navigate without altering the resolution

of a display screen. This capability extends to any device or browser used to view a website,

which means the website appearance and layout change according to the size of the display

screen.

Virtual Private Network (VPN): A virtual private network (VPN) is a private network that is

built over a public infrastructure. Security mechanisms, such as encryption, allow VPN users

to securely access a network from different locations via a public telecommunications net-

work, most frequently the Internet.

Website Security Certificate: A website security certificate is a validation and encryption

tool, part of the HTTPS protocol, which secures and encrypts data going back and forth

between the server and the client browser. It is issued by a trusted certification authority (CA)

who verifies the identity of the owner of a website. The certificate then ensures for the user

that the website it is connected to is legitimate and that the connection is safe and secure.

Wireless Fidelity (Wi-Fi): Wi-Fi is a type of wireless network technology used for con-

necting to the Internet. The frequencies Wi-Fi works at are 2.4 GHz or 5 GHz, ensuring no

interference from cellphones, broadcast radio, TV antenna, or two-way radios is encountered

during transmission.

Page 40: WHITE PAPER Understanding BYOD - cedma-europe.orgcedma-europe.org/newsletter articles/eLearning...is no longer the case. In fact, key to a solid understanding of BYOD is identifying

36

WHITE PAPERUnderstanding BYOD: A Guide to Concepts and Issues for Learning Practitioners

1.707.566.8990 www.eLearningGuild.com

About the Author

Sharon Vipond, the director of research and principal analyst for The eLearning Guild, is

an executive consultant, researcher, and writer with core competencies in adult learning,

courseware development, delivery, and certification; enterprise training software evalua-

tion; and large-scale project management, human capital management, and organizational

development. Before joining The eLearning Guild, she was an associate vice president for

information systems at the Georgia Institute of Technology and a practice director for Oracle

Corporation. Sharon holds a doctorate in organizational communication and psychology

from the University of Minnesota–Twin Cities.