Example Of Case Study On O Employee Productivity And Efficiency

Published: 2021-06-25 07:25:05
essay essay
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY
Management Information System
- What role does IT play and what are the key IT objectives for Intel Corp? Identify also the key stakeholders for Intel Corp and their preferences.
Intel Corporation, a major computer infrastructure developer and software applications product manufacturer, is a global organization dedicated to the transfer of information and furtherance of business intelligence throughout the world. The company’s executive management is in daily contact with investor shareholders, the traditional stakeholders of the corporation, as well as company employees and an extended value chain of vendors and other partners involved in the research and development, manufacture and supply of Intel’s products and services.
Of the stakeholders present within the supply chain of operations, original equipment manufacturers (OEM) and original design manufacturers (ODM) and the more broadly the semiconductor industry are part of Intel Corporation’s stakeholder relationship, now benefit from employee BYOD participation in the network, as users tend to communicate more expediently, more often and in greater volume on the job (Intel Corporation, 2013).
The introduction of IT policy in support of personalized use and interface of (BYOD) bring-your-own-device activity onsite on the company stands apart from a tradition of discretionary politics marked by brand identity control within corporations. Understood as an inexpensive, employee benefit having the potential to increase communications, workflow and company loyalty, Intel’s BYOD policy soon proved to be a value added statement within Intel Corporation’s human resource management (HRM) strategy; one which also had reach across stakeholders within the company’s operations chain, and in relation to consumer segmentation marketing public relations.
- What is the Consumerization of IT (CoIT) ? Briefly discuss its impact to An organization.
Intel’s adoption of hand-held, consumer facing technology for business purposes has been underway for several decades. Consumerization of IT (CoIT) has been a boon for corporations in many ways, as the accessibility greatly increases, and costs proportionally decrease. Following the social media explosion, and universal cloud applications development phenomenon, the entrance of BYOD as a standard feature in the workplace has once again radically changed rules according to trends in IT.
The widespread acknowledgement of CoIT as an internal driver to policy and productivity is well founded, some suggest, because employees tend to become more resourceful, spending longer hours on work (Intel Corporation, 2013). Partners also see integration through the BYOD model of communications. Mobile devices platforms and apps add another gateway for employee and stakeholder user interface on the go. Now that CoIT has expanded the reach of the Intel workday to mobile access, data, meeting and strategic communications flow at lightning speed.
- Should BYOD be encouraged or banned ? Why ?
Three (3) sources of value contributed to the general consensus that BYOD should be encouraged at Intel: 1) cost reduction; 2) productivity gains; and 3) competitive advantage. Intel could eliminate the cost of 10,000 small form factor (SFF) devices in circulation in its company with the introduction of the BYOD policy. From the outset, prior to the BYOD policy, there was concern that sufficient security provision was not built into company guidelines (Bank Info Security, nd., Intel Corporation, 2012).
The nearly unanimous consensus that Intel should be responsible for designated user access to company data on the personal devices brought into its workspace would have created a serious challenge for an organization not involved in cutting-edge computer infrastructure and software applications. The development of an adequate system of secure monitoring and control of data was partly achieved by way of cloud support. Intel was already hosting its data on a cloud, which mean that the company’s information was uploaded automatically to a Web-based storage site.
Designated user access to the cloud required secure credentials, and knowledge of administration. Intel’s commitment to data sharing across its own value chain of operations increased the chances that users BYOD could be integrated. Interface of employee’ BYOD devices also required licensing and software registration. What came out of the evolution of the Intel BYOD program was an increased awareness of risk amongst employees, and a new five-tier risk model of permissions and access to increase control over systems violation (Intel Corporation, 2013).
- How can Intel turn BYOD into a new source of competitive advantage ?
When Intel first initiated the BYOD policy at its U.S. headquarters, 10,000 of the company’s employees near 80,000 worldwide had access to this innovative benefit (Intel Corporation, 2013). Harnessing the trend of employees bringing their own devices to work, Intel saw the future in sourcing competitive value in stakeholder communications.
While there was some distinction between the parameters and efficient access and usage of company data and personal data, research by the company soon evidenced that the BYOD activity at its headquarters was a new source of competitive advantage. Over time, it was argued, the development of better Intel products and services would be the result (Intel Corporation, 2013).
- Adopt the role of Malcolm Harkins and you are in favour of implementing BYOD. Prepare a proposal for the senior management of Intel to outline and review the steps, critical issues and recommendation when implementing the BYOD project.
In response to the multitude of questions following the announcement of Intel Corporation’s BYDO (bring-your-own-device) to work project 1 October 2013, this communication is intended to provide requested follow-up information on the development of a companywide policy, and rule protocol that might be effectively implemented as strategy by the organization. Critical issues and recommendations to be discussed at the forthcoming meeting may be augmented by employee and stakeholder feedback prior to that date.
The foregoing serves as preface for the forthcoming 4th Quarter Meeting, where a presentation of the BYOD policy and related IT administration and operations activities will be discussed in correspondence with short-term and long-term strategic goals and objectives. In regard to specific BYOD project activities at Intel Corporation, I have been engaged in both U.S. Global operations processes. Global activities are documented in a correspondence with the company’s shareholders and other stakeholders involved in data storage, distribution and use across Intel’s value chain of operations. The following will be addressed in response to the BYOD feasibility study:
o License and registration
o Apps interface and other technical issues
o Security protocols and risk management
o Audit of the project
Introduction of BYOD at Intel Corporation’s headquarters to 10,000 of the company’s more than 80,000 employees internationally, has so far been a success. Employees show that they are more productive, spending up to an additional hour on average “at work”. To this end, the BYOD project is highly recommended as a cost cutting and efficiency measure.
IT security is the single most critical concern on the forthcoming meeting agenda. BYOD stands to test the proficiency of the company’s security infrastructure. All further points regarding the BYOD project will be addressed at the forthcoming, 4th Quarter Meeting. A presentation on the above points will outline the agenda. Please let me know if there are additional actionable items that should be added to the BYOD project presentation prior to 1 November 20130.
Thank you for your attention to the current policies on use of external devices at Intel. I trust that sufficient indication of the coming agenda has been explained. I look forward to meeting with you all at that time.
- How should Intel manage BYOD in the face of its e-Discovery obligations?
Under the U.S. Federal Rules of Civil Procedures (FRCP), companies must comply with court discovery in part to evidentiary proceedings. Discovery now includes electronic mandate or e-discovery which was put into force in the United States in 2006. Where BYOD was concerned, Intel’s obligations to e-discovery in the face of potential litigation might include computer systems and digital storage elements should the company be served with an order of tortious negligence.
- Discuss what is PIPEDA and review if there is a role which Intel needs to consider in adopting BYOD in their Canadian operation?
Intel Corporation’s adoption of BYOD in Canadian operations must follow Canada’s internet Privacy Act (PIPEDA). The Act implemented to combat rogue websites and other IP transmitted information, is part of private-sector security law. Permissibility in transmission of personal information, and designated user credential access may vary according to country. Restrictions on business transactions within the law pose a challenge to BYOD policies, where employees are interfaced with company operations, and also using those devices for personal transactions. Offsite, technical DNS blocking and other security provisions also may cause delay in processing or deny access altogether as Canadian users attempt to login to company interface.
With the increasing number of Canadian employees and consultants incorporated into Intel’s product and service platform, the company will be required to meet regulatory rules to IP transmission, user access and security. Legal rules guiding innovations in IT, software application as system services and internet communications infrastructure at Intel will also prompt the company to negotiate new legislation in the markets Intel conduct business. Leadership in BYOD was the first important step in establishing stakeholder equity in business communications.
References
Intel Corporation (2013). Retrieved from: http://www.intelcorp.com
Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices (nd.). Bank Info Security. Retrieved from: http://www.bankinfosecurity.com/webinars/mobile-learn-from-intels-ciso-on-securing-employee-owned-devices-w-264\
Successful e-discovery in a bring-your-own-device environment (2012). Intel Corporation. 12 June 2012. Retrieved from: http://www.intel.com/content/dam/www/public/us/en/documents/best-practices/ediscovery-on-sff.pdf

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read