Page 93 -
P. 93

60     Part 1  •  SyStemS analySiS FundamentalS

                                         of time, such as 24 hours. Peruse the support services documents accompanying the purchase of
                                         equipment and remember to involve appropriate legal staff before signing contracts for equip-
                                         ment or services.
                                             Unfortunately, the process of evaluating computer hardware and cloud providers is not
                                         as straightforward as simply comparing costs and choosing the least expensive option. Before
                                         becoming convinced that buying cheaper compatibles is the way to endow your system with
                                         add-on capability, you need to do enough research to feel confident that a hardware vendor or
                                         cloud provider is a stable corporate entity.
                                         Understanding the Bring Your Own Device (BYOD) Option
                                         Bring your own device (BYOD) or bring your own technology (BYOT) is a trend appear-
                                         ing in a variety of organizations in different industries. These organizations range in size and
                                         have employees of differing skills. In general, BYOD or BYOT means that rather than using
                                         a smartphone or tablet issued by the organization, the employee uses his or her own device to
                                         access corporate networks, data, and services remotely when working outside the office. The
                                         BYOD approach is often presented as a way to keep the organization’s hardware costs down and
                                         improve morale among employees who, on average, already bring one or more mobile devices
                                         to work for personal tasks.
                                             Loading up an employee’s mobile device with work software can also extend the workplace
                                         into leisure hours. This continual connectivity was initially welcomed as a way to ensure that
                                         employees were responsive to the company all of the time, but organizations are now re-
                                         examining this ’round–the-clock approach. Now, organizations and unions often curtail the
                                         hours that an employee will be emailing or interacting with the corporate office so they are not
                                         conducting business during the valuable “off hours” they need to maintain balance between their
                                         work and personal lives.
                                             As a systems analyst, you will work to discover through a combination of interviews, sur-
                                         veys, and observation what personal technology is being used by the majority of the group you
                                         are designing for. For example, if you observe that all the executives in the decision-making group
                                         already bring in iPads every day, you might conclude that designing dashboards for the iPad has
                                         some merit. They are devices you want to include in your original design rather than as an after-
                                         thought. If your observations show that most executives prefer face-to-face meetings, but they use
                                         their handheld devices (such as mobile phones) to check other corporate data and emails during
                                         meetings, then you might want to consider supporting corporate email on their personal phones.

                                         BENEFITS AND DRAWBACKS OF BYOD.  The benefits of BYOD computing include building
                                         employee morale, a potential for lowering the initial cost of organizational IT hardware purchase,
                                         facilitating remote, ’round–the-clock access to corporate computer networks regardless of
                                         location, and building on a familiar user interface to access corporate computing services,
                                         applications, databases, and storage. Security risks posed by untrained users are probably the
                                         biggest drawback. Identified threats are loss of the device itself, theft of the device and its data,
                                         unauthorized access to corporate networks using personal mobile devices, and so on. Other
                                         threats are posed by commonly occurring behavior with mobile devices that may be fine on the
                                         private side but not on the corporate side, such as using free Wi-Fi hotspots, using apps such as
                                         Dropbox, and others. While these and other behaviors may not meet high levels of corporate
                                         security, they are well within the realm of typical behavior for the use of one’s own phone
                                         or tablet. Users might be lulled into thinking that their mobile device, since it is theirs, is no
                                         different once it is put in service to the business.
                                         Creating Custom Software
                                         Analysts and organizations are increasingly faced with a make, buy, or outsource decision when
                                         assessing software for information systems projects, particularly when contemplating upgrades to
                                         existing or legacy systems. Analysts have three choices: creating their own software, purchasing
                                         commercial off-the-shelf (COTS) software, or using software from a Software as a Service (SaaS)
                                         provider. Figure 3.8 summarizes the advantages and disadvantages of each of these options.
                                             Several situations call for the creation of original, custom software or software components.
                                         The most likely instance is when COTS software does not exist or cannot be identified for the
                                         desired application. Alternatively, the software may exist but be unaffordable or not easily pur-
                                         chased or licensed.
   88   89   90   91   92   93   94   95   96   97   98