As business processes shift to accommodate telecommuting, companies are looking to rely on devices that employees bring with them into the workplace. This means that IT departments are tasked with supporting and securing devices that weren’t originally designed for the company network. In some cases, these devices are being used for both personal and professional purposes, making them a target for hackers.
As a result, many employees are turning to a variant of byod called CYOD (choose your own device). While it’s not as flexible as BYOD, this approach is easier to secure and provides the benefits of employee choice without the security risks.
By requiring employees to choose their own device, IT can reduce the amount of malware and other threats that are downloaded onto the corporate network, as well as prevent sensitive information from being compromised if an employee’s device is lost or stolen. Despite these advantages, there are still several issues that must be addressed.
This study explores the psychological and managerial impacts of BYOD ISS, including managers’ perceptions and their ability to control it. It finds that when managers’ perceptions are passively satisfied and they lack a sense of control, they will adopt emotion-focused coping strategies to deal with the challenges of BYOD.
However, when the perception is a threat and the manager has a strong sense of control, they will take more proactive steps to mitigate and manage unforeseen BYOD ISS effects. The key is to have a written policy in place and be sure it’s updated as technology and threats evolve.