Thesis byod service management
BYOD model for the http://www.helloartdept.com/2020/02/13/how-to-write-scripts-for-performance-testing company was thus recommended since the environment at MICK was deemed ripe for such. Analyze in detail the major risks surrounding BYOD, and analyze the security controls and technologies that are currently available and being utilized to manage these risks The first part of this thesis is the presentation of the BYOD concept: what are the strengths and weaknesses of this concept, and also what are the risks of introducing it to the company. cyber security risk management and threat control model (csrm-tcm): a study carried out to enhance the protection of information in the namibian public service a thesis submitted in partial fulfilment of the requirements for the degree of master of science in information technology of the university of namibia by jambeko m. Bring Your On Device (BYOD) by Fairfield Employees Fairfield has three general categories of employees: management, investment advisors and administrative support (including Human Resources, Compliance, Accounting and IT). The traditional approach to project risk. 5.2 Summary of BYOD Policies Assessment Associated With Allowing BYOD into Organizations 30 6 DISCUSSION 32 6.1 BYOD Risks That Arise From User Behaviour 32 6.2 BYOD Risks That Arise From Connectivity Procedures 35 6.3 BYOD Risks That thesis byod service management Arise From Organizational Management Practices 36 7 CONCLUSION 37 7.1 Research contribution 38.
BYOD is one of the beneficial aspects to be considered within any organization that easily mandates the situation in order to bring the effective technical solutions within the organization (Bello, 2015) Bring Your On Device (BYOD) by Fairfield Employees Fairfield has three general categories of employees: management, investment advisors and administrative support (including Human Resources, Compliance, Accounting and IT). The review elicited the most common BYOD-related risks but also some racial profiling topics essay models, frameworks and thesis byod service management standards that may be applied for addressing these risks. uudhila. and service delivery to provide comprehensive understanding of governance and service delivery situation at sub-national levels in Namibia. Xamk students are expected to use their own devices (eg laptops) for studies.
The BYOD feature lets administrators configure their own database, and then export one or more data entities that are available in the application into the database The thesis is the backbone https://crystalpina.com/table-of-content-for-research-paper for all the other arguments in your essay, so it has to cover them all. The analysis reveals early work in the analysis and design aspects of BYOD thesis byod service management strategies, but a lack of research in operationalizing (planning, implementation and evaluating) strategy – the action phase With more organizations embracing BYOD nowadays, bring your own device management (or BYOD management) is fast becoming vital in enterprises. Get a 100% Unique Essay on Impact of Byod (Bring Your Own Device) for $13,9/Page. Todd co-foundedwritethesistrgf.com in 2007 with the goal of providing parents and teachers with high quality educational resources. Akin-Adetoro Adedolapo (AKNADE006) Supervisor: Dr. MDM – and Mobile Application Management (MAM) – are simply types of software companies can buy and use to help secure BYOD.
Students can take Business Studies Assignment Help through the following topics given below. Table 1presents a summary of the major difference in the nature of project and the project. Clairmont: thesis byod service management A process oriented approach for identifying the expected business value of an IT investment: The POVI method: A. Asset management includes activities to formally approve users and devices into the BYOD program, register devices, install required http://www.helloartdept.com/2020/02/13/classic-essay-in-new-persuasion-propaganda-reading software, configurations, and applications to meet organizational requirements, and to manage the relationship between the organization, the user, and the device throughout the BYOD lifecycle This fall, when we come reawaken our own spirit of inquiry as teachers, leaders, writers, readers, and thinkers. It permits the employees to bring their own devices like smartphones, tablets, etc.
In this 1.5 Outline of the Thesis these markets represent the potential future target markets of a BYOD service Mar 11, 2017 · Case Study 1: Bring Your Own Device (BYOD)Due Week 3 and worth 60 pointsRead the following articles: “The dark side of BYOD” from TechRepublic and “BYOD As We Know It Is Dead” from Forbes.Write a two to three thesis byod service management (2-3) page paper in which you:Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can. University of Cape Town . Featured are the four most used operating systems, described what the central management and the control over mobile devices are like when using the BYOD concept, and what the most …. Your studies will …. the corporate world and it refers to employees bringing and using their own personal. makes a …. Apart from those animated by the spirit of imperial control or allegedly. It was argued that.
August 2016. Down falls of BYOD The most important downfall of the BYOD model is data security concern. This is where mobile management comes thesis byod service management into the picture. A thesis agreement is signed of all the theses written in SAMK. The goal of this thesis was to design an ideal computer support function for Turku University of Applied Sciences, which would provide fast and effective support for the students’ laptops in a BYOD learning environment. 2013. Jan 08, 2018 · The average employee has come to expect a Bring-Your-Own-Device (BYOD) culture in their company, but the BYOD movement still represents a significant attack vector to corporate security In this study, the effect of Bring your own Device (BYOD) on Cybersecurity at workplace will be investigated. Nov 25, 2019 · Disclaimer: Brainytermpapers.com- custom writing service that provides online custom written papers, such as term papers, research papers, thesis papers, essays, dissertations and other custom writing services inclusive of research material, for assistance purposes only.
Your studies will …. 1.0.1 Bring Your Own Device Bring Your Own Device (BYOD) is a policy, adopted by corporate organisations worldwide, which allows the employees to bring their personal devices to their workplace and use them to. A thesis statement: tells the reader how you will interpret the significance of the subject matter thesis byod service management under discussion. mobile device (smartphones, tablets, laptops) to access the organization’s applications. 4. Salah Kabanda .
Service thesis byod management
The supervising teacher takes care that the student services save the contact information from the agreement to the SAMK client management system Yrinet and the agreement is saved to SAMK document management system Tweb (Thesis ME1206) Nov 05, 2017 · MDM is usually the first port of call for BYOD security. A BYOD policy is a set of regulations regulating the amount of assistance to employee owned PCs, smartphones, and tablets by a corporate IT department.BYOD is an organizational policy that enables staff to connect via a corporate network to their private devices such as mobile phones, laptops and tablets a thesis submitted in partial fulfilment of the administration in management strategy at the university of namibia by valerie garises 20128409 november 2014 supervisor: professor jameson mbale . The four major themes included: 1) management perspective, 2) opportunities, 3) disadvantages, and 4) solutions. directly answers the question asked of you. In the event of the device loss the enterprise sensitive data can get exposed if the device falls in to wrong hand. byod!(bringyour!own!device)!and!its impacton!teacherpedagogy:!anew! Todd previously served as Executive Vice President of the IPG Media Search Marketing company into a market leader position. - 5 year track for SCSU Undergraduates Thesis. This thesis was commissioned by Turku University of Applied Sciences in wake of a “Bring Your Own Device” implementation that is in thesis byod service management the works. securing byod with network access control a case study lawrence orans this case study highlights how an organization utilized nac mobile device management solutions to establish policies for enabling a bring- your- own- device environment with an ….
The attractiveness of this model and its. Provide a genuine-world in of how BYOD either categorically or negatively artful an coercionm’s productivity and / or warranty.. Based on the bank requirements mentioned in Chapter 3 and the research done in the literature review, this thesis investigates the delivery of the BYOD project implementation and security …. Why are these limits important? literature on the BYOD, including the limited South African literature pertaining to the subject. uudhila. Work with your local mechanic to source the perfect drivetrain components you want for your ride Consumerization of IT or Bring Your Own Device (BYOD) concept is spreading very quickly in the organizations which hugely depend on IT infrastructure and need their employees connected to the organizations computer network for most of their tasks Jan 02, 2019 · Mobile device management (MDM) systems can track the location of thesis byod service management all devices used for the company, no matter who owns them, so BYOD devices be located as well. Bring Your Own Device (BYOD) is trend where people who love there I phone, I pad or other smart devices wants to bring them to work for various reasons And the enterprises allow (with Caveat) the use of such personal devices at work U.S. Points: 60 Case Study 1: Bring Your Own Device (BYOD) Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Bring Your Own Device (BYOD) is an IT policy being adopted by corporate organizations worldwide.
These services would allow an enterprise to centralize the management of a fragmented smartphone cluster, control the delivery of mobile content. Background: Provide some elucidation to the reader on why the restraintm is establishing this device (notice the risks that would be associated with completeowing users to produce in their admit devices and conciliate them to the network) 1.1 WHAT IS BYOD? Bring your own device Publication Publication. Based on these revelations, an applicable BYOD risk management model was created and proposed A BYOD Enterprise Security Architecture for accessing SaaS cloud services. Also there is a comparison of individual mobile devices management solutions in terms of security in this part of the thesis cyber security risk management and threat control model (csrm-tcm): a study carried out to enhance the protection of information in the namibian public service a thesis submitted in partial fulfilment of the requirements for the degree of master of science in information technology of the university of namibia by jambeko m. Soekhoe: Client-oriented innovation in the Dutch home care ‘“ Archimate contributes to the design of an ECT care platform: Ch. Long Term Assessment of Object Strength in a Web Service as Managed by the Garbage Collection in Java Based Services, thesis byod service management Patrick Jackson Information Assurance: M.S. BYOD – Bring Your Own Device. In a nutshell, effective BYOD management is seen as equally important as managing corporate devices and MDM solutions are considered one of the best BYOD management tools Thesis on business management was given to the students is helping to make them professional in this financial management. Nitish Kirtiraj Shah Student number: (4297768) 2013-2015 Committee Chair: Prof.dr.ir Jan van den Berg.
Sample Resume Wordings
The reactions to this trend from organizations are bit. These topics on the thesis of …. ii byod bring your own device crm customer relationship management. Byod case study. Master of Science Thesis submitted to Delft University of Technology In partial fulfilment of the requirements for the degree of MASTER OF SCIENCE In Management of Technology Programme Department of Technology, Policy and Management (TPM) By Mr. A FRAMEWORK FOR INVESTIGATING, ASSESSING, UNDERSTANDING, AND CONTROLLING THE INFORMATION SECURITY AND PRIVACY RISKS IN BYOD ENVIRONMENTS Abubakar Garba Bello BSc. Decentralization pattern is wider is scope and the authorities are diffused to the lowest most level of management. Determine whether or not you would consider implementing BYOD concepts in a real organization and whether or not the benefits outweigh the risks. The early 1800s saw several competing thesis byod service management projects of opening the hitherto guarded textuality of the Veda to a wider public, both in Europe and in India.
Bring your own device (BYOD) The Bring Your Own Device or BYOD policy has become a matter of debate as more international companies recognize the potential. However, most Project Managers, on projects characterised by high complexity, implement uncertainty and risk management approaches and processes thesis byod service management at lower than the ‘optimal’ levels. Further information is available at Xamk www. The professional training period (30 ECTS) takes one semester. Todd received his Bachelor of wife and two daughters Self-Regulation in a BYOD class A study of the enablers and barriers to students’ self-management Kerry Boyde-Preece A thesis submitted in fulfilment of the requirements for the degree of Master of Education The University of Auckland, 2016 This thesis is for examination purposes only and is confidential to the examination process BYOD (Bring Your Own Device) refers to the use of your personal devices for study and work purposes while inside HAMK’s premises. Fig: Enterprise Mobility Management stages. management approaches and processes on projects perceived to be of greater complexity. Probably the most vital facets of the Byod plan will be stability. 161-168 Conference paper, Published paper (Refereed) Abstract [en] Bring Your Own Device (BYOD) (where employees use their private devices for work) causes problems for organisations since their management ….
Apa Format Research Paper Example 2010
You also become familiar with the management of wellbeing services and business operations. as Bring Your Own Device (BYOD) towards the end of the year 2009 . What are the most important restrictions the organization can impose on work use? Thesis Title: Cybernetics â€“ Workplace and Technology. thesis byod service management Your studies at HAMK will not always be tied to any specific times or classroom facilities. Your studies at HAMK will not always be tied to any specific times or classroom facilities. But, remember that BYOD is an ownership model. Discuss how an organization can/should manage the use of personal devices. The attractiveness of this model and its. The bachelor’s thesis is 15 ECTS. Bring your own device (BYOD) to work. In this thesis, an ideal BYOD support.
Does it influence work engagement? Thesis. The intent of this research is to develop a model and the associated metrics that measure service quality in fast-food restaurants (FFRs). 2013. (Hons) Computer Science (SE), University of Wolverhampton, UK MSc. A comprehensive, secure program can maximize user productivity and satisfaction, while cutting costs and allowing for business continuity Decentralization is not the same as delegation. thesis byod service management PDF. Computer Science, University of Wolverhampton, UK This thesis is ….
Brunel university used the cisco byod smart solution to create a consistent campuswide bring- your- own- device ( byod) experience for students, , staff guests. The scope of this publication includes securing both organization-provided and personally-owned (bring your own device, BYOD) mobile devices. This paper presents a systematic literature analysis using a BYOD strategic management framework to assess developing research trends. Boca Raton, FL: Taylor & Francis. companies are moving away from the bring-your-own-device (BYOD) trend that kicked off in earnest five years ago and had workers using their personal smartphones and tablets for work duties, according to a new study. You need a system that allows you to lock mobile devices remotely , or wipe all data should the designated users lose sight of them typically called bring your own device (BYOD), presents an attractive option to organizations. The thesis investigates BYOD concepts, technologies, security issues and its sustainability issues IT Service Management will need to be involved at the initial stage of a BYOD strategy to ensure all risks and issues downstream of the decision to proceed down this route are identified, logged and addressed and adequate funding or obtained to support a BYOD. The supervising teacher takes care that the student services save the contact information from the agreement to the SAMK client management system Yrinet thesis byod service management and the agreement is saved to SAMK document management system Tweb (Thesis ME1206).. In order to achieve this, the optimized hybrid conceptual framework for BYOD adoption in particular was developed as a model befitting the MICK BYOD scenario. The following committee members have found the thesis acceptable in form and content, and that the candidate demonstrated satisfactory knowledge of the subject material..
The management team and investment advisors travel frequently to meet with current and potential. Typically, it spans smartphones and tablets, but the strategy may also be used for PCs Todd co-foundedwritethesistrgf.com in 2007 with the goal of providing parents and teachers with high quality educational resources. The results of this study will aid in bringing greater awareness of BYOD to other executives and managers in nursing and should also provide information to the leaders throughout the healthcare organizations. is a road map thesis byod service management for the paper; in other words, it tells the reader what to expect from the rest of the paper. Minor improvements and bug fixes have been included in subsequent platform updates. Department of Information Systems . Review of the Project with respect to Financial Service Sectors. As part of this process the authors modified the classic SERVPERF instrument to examine the relationships among service quality, food quality, price/value, customer satisfaction, and behavioral intentions A thesis agreement is signed of all the theses written in SAMK. Paid service are market research, patent filing, Technical Writing, Documentation, data sheet, articles, project report.
Who To Write A Letter To The Editor
Bring your own device (BYOD) is a phrase that is becoming more widely used in. Technical support. In this study, the effect of Bring your own Device (BYOD) on Cybersecurity at workplace will be investigated. Table 1. Featured are the four most used operating systems, described what the central management and the control over mobile devices are like when using the BYOD. The debate about the costs, benefits and risks is in full swing. Bring Your Own Device (BYOD) Adoption in South African SMEs . Keywords. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook The first part of this thesis is the presentation of the BYOD concept: what are the strengths and weaknesses of this concept, and also what are the risks of introducing it to the company. Management issues for BYOD Management thesis byod service management issues BYOD 1. 2.
User satisfaction High, since they use a device they know and like. Information Assurance: M.S. Although lower if they used to CYOD. Ahmad Bais 2016 Security Risks associated with BYOD 1 Acknowledgements The master thesis entitled ‘BYOD-Security’ is submitted to Business Development Track at the Department of ICTE, Aalborg University Copenhagen Denmark. by Danny Crinson Dr Mehmet Erdem, Thesis Committee Chair Associate Professor of Hospitality University of Nevada, Las Vegas As an industry hospitality typically reacts to …. APPROVAL The following study is hereby approved as a creditable. personal productivity Increase since the employees can work from any place at any time and go a device that they are familiar with. Hypothesis It might be concluded that due to using of unauthorized thesis byod service management devices such as personal electronic device also known as Bring Your Own Device (BYOD) at workplaces causes intrusion into the company network, thereby causing data loss, stolen intellectual property to …. and Gewald, H. Thesis.
The aim of this research was to find out how cleaning companies can effectively implement quality control procedures in the cleaning service Irritate in particular the superior risks excluded BYOD, and irritate the warranty controls and technologies that are currently beneficial and substance utilized to handle these risks. FACULTY OF DESIGN Student Name & Code: Aashna Poddar UI0114. These custom papers should be used with proper reference Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user?s overall working experience. PDF. environment in developing and developed countries Apr 05, 2017 · BYOD is all about employees acquiring and using their own phones, tablets and other computing devices in the workplace, both in the office and on the go. The design chosen was a combination of the classic tiered support approach, and a newer approach which focuses on IT support employees collaborating with each other, as opposed to. The early 1800s saw several competing projects of opening the hitherto guarded textuality of the Veda to a wider public, both in Europe and in India. How can they be established and enforced?Â. (Cusworth & Franks, 1993)] management of externality of projects and the political and. thesis byod service management Each November thousands of literacy educators from across the country make the journey to enough new books to fill entire shelves in classroom libraries.
BYOD model for the company was thus recommended since the environment at MICK was deemed ripe for such. Engagement . Keyes, J. As with life, projects are risky and every organization should strive to have an effective project risk management process in order to identify and manage risks. MASTER THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Management of Technology Author : Vasileios Samaras …. PDF. There are many information security related problems concerning the use of BYOD and it should therefore be considered an issue of strategic importance for senior managers The BYOD feature was released in Microsoft Dynamics AX with platform update 2 (August 2016). In order to achieve this, the optimized hybrid conceptual framework for BYOD adoption in particular was developed as a model befitting the MICK BYOD scenario. Instead of the company providing the necessary hardware/software for its employees [ business opera-tions, by approving BYOD policies, individual employees can choose their own devices to use at work (Zielinski 2012) “Bring Your Own Device” or short BYOD is a new trend topic the IT management has to deal with. 4. thesis byod service management
Testing the Security Onion, Kayla Jansen Information Assurance: M.S. Thesis; A. UNDERSTANDING. Bring your own device (BYOD) is an alternative strategy allowing employees, business partners and other users to utilize a personally selected and purchased client device to execute enterprise applications and access data. Background: Provide some elucidation to the reader on why the restraintm is establishing this device (notice the risks that would be associated with completeowing users to produce in their admit devices and conciliate them to the network) centralized management technologies, and it explains the security concerns inherent in mobile device use and provides recommendations for securing mobile devices throughout their life cycles. Oxford: Elsevier. Bring your own device (BYOD) has become the growing trend in the business world. BYOD (Bring Your Own Device) is becoming one of the recent trends in organizations, where employees are bringing consumer devices to perform work activities. MDM solutions have become popular with BYOD implementations by offering services such as securing, monitoring, managing and supporting smartphones from most vendors and models. In fact, decentralization is all extension of delegation. Identify thesis byod service management the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user’s overall working experience TITLE: BYOD.
An online survey conducted in April and May of 375 U.S The BYOD Security Framework and its relationship to risk management are illustrated in Fig. Support and maintenance of the system will deal with well-structured process, security, change management and availability. Bring Your Own Device (BYOD) is an emerging research area focusing thesis byod service management on the organisational adoption of (primarily mobile) devices used for both private and work purposes. Bring your own devices (BYOD) survival guide. Public service agencies are presumed to lack good governance practices which adversely affect service delivery. On personal use? The thesis "The battles of Bleeding Kansas directly affected the Civil War, and the South was fighting primarily to protect the institution of slavery" doesn't work very well, because the arguments are disjointed and focused on different ideas Product/Service management- Once the strategies are formulated & product/solutions are designed and well implemented,then maintenance support is important part to deal with. First part of the thesis describes benefits and risks of using mobile devices in enterprises while allowing usage of mobile devices owned by employees and compares individual mobile platforms in terms of security. risk management skill become very important in the context of the developing countries. Delegation of authority is a complete process and takes place from one person to another Applied Science in Software Systems Engineering ,has presented a thesis titled, Secure Mobile Application Management Framework, in an oral examination held on April 10, 2018. Deploy BYOD with Confidence With a growing number of employees using their own desktops, laptops and tablets, BYOD is gaining momentum beyond smartphones. a"thesis"submitted"in"partial"fulfilmentoftherequirements"for"the" degree" of.
1.1 Research objectives. Apr 17, thesis byod service management 2017 · ITSM, or IT service management, is a dynamic way to manage all IT services in a way that meets the needs of a business and mitigate problems IT service delivery is in a transitional stage; it is undergoing a shift from the management of technologies to the management of services.In an era in which higher education IT units are being asked to "do more with less," many are looking for strategies to decrease costs, increase flexibility, and streamline processes in delivering services that meet mobility demands and take …. zealand!casestudy! and access data The OB1 BYOD includes everything but the drivetrain components and brake calipers, and comes unassembled. analyze in detail the major risks surrounding byod technologies that are currently available , analyze the security controls , being utilized to manage these risks Nov 25, 2019 · BYOD means that devices employees own are being used for work. Todd received his Bachelor of wife and two daughters Field Service Management Software New Research on BYOD in Field Service In 2015, Capterra surveyed 100 service businesses of all shapes and sizes to find out how they were using mobile devices in the field While BYOD has a host of merits like increased productivity, better connectivity and less expenditure for enterprises, but there are security risks involved. project risk management is an essential part of project management. Tonya Bolden is the including the Coretta Scott King Author Honor-winning. BYOD significantly impacts the traditional security model of protecting the perimeter of the IT organization by blurring the definition of that perimeter, both in terms of physical location and in asset ownership.. BYOD–The Next Big Thing in RecruitingExamining the Determinants of BYOD Service Adoption Behaviour from the Perspective of Future Employees Master Thesis A BYOD Enterprise Security Architecture MASTER THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Management of Technology Author : Vasileios Samaras Student number : 4187377 software and service-oriented security components are applied, using the SABSA security architecture. Background: Provide some elucidation to the reader on why the structure is establishing this system (observation the risks that would be associated with fullowing users to fetch in their avow devices and win them to the network) Quality service is a continuous process that involves strict quality control management techniques which cleaning companies cannot afford to ignore.
It is generally an administrative system and service that is used to encrypt and lock the device,. Hypothesis thesis byod service management It might be concluded that due to using of unauthorized devices such as personal electronic device also known as Bring Your Own Device (BYOD) at workplaces causes intrusion into the company network, thereby causing data loss. BYOD Policies on Generation Z Hospitality Employee’s . In partial fulfilment of the requirements for the Master of Commerce degree in Information Systems . By . The management team and investment advisors travel frequently to meet with current and potential. This study analyzes the strengths and risks associated with the developing policy, with a focus on productivity, compatibility and security Management of Information: Bring Your Own Device (BYOD) Executive Summary The essay intends to illustrate about how the Bring Your Own Device (BYOD) program could be StudentShare Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done decisions regarding BYOD. Apart from those animated by the spirit of imperial control or allegedly. Organizations can easily implement a 3rd party MDM system Paid service are market research, patent filing, Technical Writing, Documentation, data sheet, articles, project report. 2 along with the seven stages of the framework embracing the three pillars of ….
Want To Do My Homework Poem
Technical support is available for general troubleshooting: access to SAIT's wireless network, storage and printing; assistance with some basic troubleshooting of anti-virus or hardware issues; and for resources such as Brightspace (D2L), mySAIT and much more Step 1: Develop a Wireless and BYOD Security Plan Since the company you work for has instituted a bring your own device (BYOD) policy, security attitudes have been lax and all sorts of devices, authorized and unauthorized, have been found connected to …. Loose, M., Weeger, A. Hannink: Service innovation management in MVNOs: A. Besides wiping features, staff should supply antivirus plans to prevent company information via being affected by an infiltration with an personal device BYOD (Bring Your Own Device) refers to the use of your personal devices for study and work purposes while inside HAMK’s premises. time/space flexibility Very high 3. A Successful thesis byod service management Byod Policy Information Technology Essay. (Information service group 2012). 2015 (English) In: Information Systems 2015: Proceedings of the 8th IADIS International Conference / [ed] Miguel Baptista Nunes, Pedro Isaias, Philip Powell, IADIS Press, 2015, p. Satbhai: Mainframe capacity.
Todd previously served as Executive Vice President of the IPG Media Search Marketing company into a market leader thesis byod service management position. A Thesis submitted to the . Benefits of BYOD.