{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]


Mobile Strategy for a Fictional INS Corporation


Subject Technology Pages 3 Style APA


Secure use of mobile devices and application with BYOD

The increased use of mobile phones and other portable devices in organizations has led to new challenges, mostly related to security. As a result, organizations and individual employees are responsible for security and device management. Ivanov (2014) proposes the use of a solid mobile device security strategy based on best practiced and one that is consistently implemented in all the departments and key sections of the organization. The author acknowledges that designing and implementing an effective mobile device security strategy for an organization without an enterprise-wide mobile device security program is challenging. These challenges mostly affect the bring-your-own-device (BYOD) program since the devices have varied operating systems and configurations from multiple manufacturers (Ivanov, 2014). In such a case, the best strategy is introducing a role-based access security. This strategy allows only the authorized personnel to access secured enterprise resources and applications. This allows mobile device security programs to be cost effectively and efficiently managed. In addition, the role-based access strategy allows organizations to automate complex workflows that are essential in sustaining security strategies.

In addition to this strategy, Brodin (2016) proposes that enterprises use Mobile Device Management (MDM) solutions to create layered security that provides additional security and protection. MDM ensures that an organization has the capability to connect multiple devices to networks while allowing it to manage data and applications in a manner that is consistent with prevailing organizational policies and objectives. Using MDM, an enterprise can create layered security of mobile devices by designing and implementing a multi-factor authentication that limits access to essential data to authorized users.

  1. Selecting and implementing MDM / EMM system as a backbone for mobile security communications

Sacolick (2017) details the process of selecting and implementing mobile device management (MDM) when using BYOD programs. The author emphasizes that it is important to manage all the mobile devices that interface with the networks of enterprises. The author further explains that MDM is a software solution that enables and allows network administrators to control and manage mobile devices namely tablets and smartphones. The MDM selected should have the ability to interface with the mobile devices, their apps, and operating systems of devices used by employees. Another significant consideration is that MDM should operate with varied providers used by the workers. As opposed to BOYD program, business-owned devices depend on one wireless service provider (High, 2014). This is unlike employee-owned devices where each employee has a preferred wireless provider. In the case of BOYD therefore, the organization must select and implement an MDM system that interfaces with multiple service providers. This way, the MDM will be properly positioned to optimize the capabilities and functionality of workforce mobile devices while ensuring the safety of the business IT infrastructure.

An MDM system should be implemented in a manner that allows for interfacing with prevailing enterprise systems and services. This process ensures that corporate-owned applications and data are secured and synchronized with mobile devices to allow sending out patches, adding, removing devices and sharing of files across networks (McKeen & Smith, 2015). These services should be done efficiently using through carrier networks. In addition, MDM should prevent system and network exposure from multiple threats. The most recommended MDM solution is Mobile Iron MDM system. This software is hosted by the Mobile Iron IT Platform thus provides turnkey abilities that enable users of mobile devices to interface with the backend of corporations by downloading an application. By activating and authenticating a network, the users of mobile device will have access to content and resources they are permitted to access. McKeen and Smith (2015) note that MDM is only but one layer of securing BYOD programs. Device management often markets the start of the complex process of managing the implementation of mobile applications and mobile content. These two services are often abbreviated as Mobile Content Management (MAM) and Mobile Application Management (MAM).

  1. Creating a Framework for implementing, assessing / controlling, and evolving of Mobility Systems

Mobility systems denote a transformed approach to transportation. The future of mobility is defined by a large network of interconnected information systems, smart charging stations, and heavily interconnected electric vehicles. Kirpes et al. (2019) explain that when engineering and implementing a framework for mobility systems, it is important to ensure that the complex systems are interoperable and can handle vital tasks. In such cases, model-based system architecture is used to support engineering processes in information systems pegged on the concept of reduction, separation, and abstraction of concerns.

The best framework for implementing mobility systems entails three main activities; analysis, action, and design. These activities are conducted in a cyclic manner. It could begin with analyzing the current mobility systems used by an enterprise. The first step is to analyze expectations, resources, capabilities, and the IT environment as a whole (Kirpes et al. 2019). The analysis helps identify whether the organization needs a new system or if it will have to replace few components to improve the systems performance and capabilities. This activity could lead to either action or design. Assuming that the analysis emphasizes the need for a redesign of the mobility system, then the systems administrator will have to list and consider options, whether to develop the current systems or select from existing systems. This activity could usher in the third activity which entails planning of the mobility systems, implementing the system, and evaluating its suitability to the enterprise.

Out of these three activities, the activities labelled as action are the most practical and have to be undertaken after a lot of considerations are put into place. This includes assessing whether the mobility system will contribute towards the creation of value and meeting of customer needs. In addition, the organization has to make sure that it has the capability and resources to introduce and maintain a secure and effective mobility systems (Kirpes et al. 2019). Similarly, the management has to design the system effectively to meet stakeholder expectations, and be adaptable to the environment in which it is used. Apart from these considerations, the person in charge of developing the mobility system should ensure that the best and most productive system is selected.




Brodin, M. (2016). Management of mobile devices: How to implement a new strategy. In The 27th International Business Information Management Association Conference, IBIMA 2016, Milan, Italy, May 4-5, 2016 (pp. 1261-1268). International Business Information Management Association (IBIMA).

High, P. (2014). Implementing World Class IT Strategy: How IT Can Drive Organizational Innovation. John Wiley & Sons, Inc., http://wiley.com

Ivanov, I. (2014). BYOD: The Next Wave of Consumerization of IT The Impact of BYOD on the Enterprise IT Landscape. In Fourth International Symposium on Business Modeling and Software Design (Vol. 1, pp. 245-251). SCITEPRESS.

Kirpes, B., Danner, P., Basmadjian, R., De Meer, H., & Becker, C. (2019). E-mobility systems architecture: a model-based framework for managing complexity and interoperability. Energy Informatics, 2(1), 15.

McKeen, J. & Smith, H. (2015). IT Strategy – Issues and Practices, 3rd Edition. Pearson, http://pearsonhighered.com

Sacolick, I. (2017). Driving Digital: The Leaders Guide to Business Transformation through Technology. AMACOM, http://www.amacombooks.org


Related Samples

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?