2016 | nr 4 | 66--80
Article title

Bring Your Own Device (BYOD) – szansa czy zagrożenie dla przedsiębiorstwa?

Title variants
Bring Your Own Device (BYOD) – a chance or threat for the company?
Languages of publication
Popularyzacja koncepcji Bring Your Own Device (BYOD) w ostatnich latach wynika ze wzrostu mobilności pracowników, zmiany ich zwyczajów oraz dalszego poszukiwania przez firmy możliwości optymalizacji kosztów funkcjonowania biur. Celem artykułu jest systematyka rozwiązań wchodzących w skład BYOD, a także przegląd dotychczasowych doświadczeń w jego wdrażaniu. Wykorzystane zostały zarówno opracowania teoretyczne, jak i praktyczne, na bazie których dokonano analizy szans i zagrożeń płynących z polityki BYOD. Praca na własnym sprzęcie ma liczne zalety, wzrost kreatywności, efektywności i zadowolenia z pracy pracowników. Jednocześnie wdrożenie BYOD może oznaczać dla przedsiębiorstwa wzrost ryzyka utraty danych, a także wzrost kosztów funkcjonowania i tym samym okazać się nieopłacalne.
Popularization of the concept of Bring Your Own Device (BYOD) in recent years resulted from the increase of labour mobility, employee’s preferences and further search for the cost optimization possibilities. Aim of this article is to systematize the solutions included in the BYOD concept as well as to review existing literature in this field. Articles presenting both theoretical and practical studies were examined, leading to SWOT analysis of BYOD. Working on own hardware has numerous advantages, including creativity, efficiency and job satisfaction increase. On the other hand, implementing BYOD may lead to increased risk of data loss as well as increased operating costs, and thus may not be unprofitable.
Physical description
Bibliogr. 21 poz.
  • 1. Cousins K., Robey D.: Managing work-life boundaries with mobile technologies. „Information Technology & People”, Vol. 28, No. 1, 2015.
  • 2. Dawson P.: Five ways to hack and cheat with bring-your-own-device electronic examinations. „British Journal of Educational Technology”, 2015.
  • 3. Dhingra M.: Legal Issues in Secure Implementation of Bring Your Own Device (BYOD). „Procedia Computer Science”, Vol. 78, 2016.
  • 4. Disterer G., Kleiner C.: BYOD Bring Your Own Device. „Procedia Technology”, No. 9, 2013.
  • 5. Grant C., Wallace L.M., Spurgeon P.C.: An exploration of the psychological factors affecting remote e-worker’s job effectiveness, well-being and work-life balance. „Employee Relations”, Vol. 36, No. 5, 2013.
  • 6. Hao Y.: Exploring undergraduates’ perspectives and flipped learning readiness in their flipped classrooms. „Computers in Human Behavior”, No. 59, 2016.
  • 7. Horton R.: Not safe for work, „Computer Fraud and Security”, March, 2015.
  • 8. Hovav A., Putri F.F.: This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy, „Pervasive and Mobile Computing”, Vol. 32, 2016.
  • 9. Jeske D., Briggs P., Coventry L.: Exploring the relationship between impulsivity and decision-making on mobile devices, „Personal and Ubiquitous Computing”, Vol. 20, No. 4, 2016.
  • 10. Leclercq-Vandelannoitte A.: Leaving employees to their own devices: new practices in the workplace. „Journal of Business Strategy”, Vol. 36, No. 5, 2015.
  • 11. Van Leeuwen D.: Bring your own software. „Network Security”, March 2014.
  • 12. Mansfield-Devine S.: Interview: BYOD and the enterprise network. „Computer Fraud and Security”, April 2012.
  • 13. Morrow B.: BYOD security challenges: Control and protect your most sensitive data. „Network Security”, December 2012.
  • 14. Podgórski G.: BYOD w organizacji. „Studia Ekonomiczne Regionu Łódzkiego”, nr XI, 2013.
  • 15. Romer H.: Best practices for BYOD security. „Computer Fraud and Security”, 2014.
  • 16. Song Y.: “Bring Your Own Device (BYOD)” for seamless science inquiry in a primary school. „Computers and Education”, No. 74, 2014.
  • 17. Thomson G.: BYOD enabling the chaos. „Network Security”, February 2012.
  • 18. Wright K.B., Abendschein B., Wombacher K. et. al.: Work-Related Communication Technology Use Outside of Regular Work Hours and Work Life Conflict: The Influence of Communication Technologies on Perceived Work Life Conflict, Burnout, Job Satisfaction and Turnover Intentions. „Management Communication Quarterly”, Vol. 28, No. 4, 2014.
  • 19., 16.12.2016.
  • 20., 10.12.2016.
  • 21. h2bzt14uklx, 17.12.2016.
Rekord pochodzi z bazy danych BazTech.
Document Type
Publication order reference
YADDA identifier
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.