Skip to main content
Nov 02, 2012

Apperian's Response - "Beyond BYOD: How BYOD Acceptance Changes Organizations"

"Beyond BYOD: How BYOD Acceptance Changes Organizations" portrays adoption of BYOD in companies similarly to Kubler-Ross's acceptance of grief. Very funny, and so true. But I'd argue that organizations need to go well beyond mere acceptance to get real benefits, and this requires smart use and deployment of enterprise apps. The "Technology Acceptance Model" might be a another way to look at things. Technology must be both "perceived as useful" and have "perceived ease of use". Doing it right leads to employee empowerment, and enthusiastic endorsement by the company -- not just acceptance. OK, so this has big implications for companies that try to use old-fashioned mobile device management type policies to onboard users and control the experience. The real value is creating apps and access to data that helps us do our jobs. It's about widespread and daily use and less about mitigation. The keys to success are apps that empower users, a great app store experience that encourages trial and adoption, and ultimately creating a valuable community of users within a company that can provide additional ideas on high-value apps for future development. In summary, I'd like add two more stages beyond acceptance:
  1. Excitement. Users getting excited (and using apps and data).
  2. Enthusiasm. Management getting enthusiastic about mobile when they see the ROI.

Apperian

More from the Blog
Feb 20, 2019

Part 4: App Security Should Be An Integral Part Of Your DevSecOps Process — Not An Afterthought

How Arxan can help streamline and optimize your DevSecOps process One of the most important factors to keep in mind when dep ...
Read more
Feb 13, 2019

Part 3: App Security Should Be An Integral Part Of Your DevSecOps Process — Not An Afterthought

Situations When DevSecOps Won’t Work Though DevSecOps is getting more popular by the day, and has many benefits to an organi ...
Read more
Feb 06, 2019

Part 2: App Security Should Be An Integral Part Of Your DevSecOps Process — Not an Afterthought

How to start implementing a DevSecOps process As you may have read in our
Read more