SlideShare une entreprise Scribd logo
1  sur  32
Exploring BYOD
Approaches for Mobile
Learning
WHAT IS BYOD?
*http://www.networkworld.com/article/2854044/microsoft-subnet/byod-is-saving-serious-money-for-it
BRING YOUR OWN DEVICE:
Permitting employees to bring personally owned mobile devices for
use with company applications or access to company information.
will support some form
of BYOD
Enterprise
owned devices
90% 2Xmore employee
owned devices
vs.
ENHANCES
EMPLOYEE
SATISFACTIONGives employeesa choice
WHY BYOD?
SAVES
MONEY
Can support
nearly 3X as
many devices
than
company
owned*
HELPS WITH
END USER
ADOPTIONEmployees already know
how to use the devices
*http://www.networkworld.com/article/2854044/microsoft-subnet/byod-is-saving-serious-money-for-it
BYOD Can Deliver Tangible
Benefits
IS IT SAFE?
BYOD brings up big
questions around safety:
1. What information is
shared?
2. Is information secure in
transit and storage?
3. Can information be
saved to the device, or
is it only accessible
through a portal?
*Ponemon Institute LLC. (March 2014). Fourth Annual benchmark Study on Patient Privacy & Data Security
WHO PAYS FOR WHAT?
QUESTION TO CONSIDER
Do we need to cover upgrade costs if it is required for compatibility with
certain company-approved or purchased apps?
DEVICES
Users are expected to purchase the personal devices
Provides cost savings for company
WHO PAYS FOR WHAT?
QUESTIONS TO CONSIDER
• Is the device essential to the employee’s job?
• What is Wi-Fi availability like?
• How much data will work-related apps use?
DATAAND
CELLULAR
PLANS
Pay staff a flat stipend
Pay a percentage of the bill
Reimburse based on actual
use
IF THEY USE IT, WILL YOU
SUPPORT IT?
• IT decides:
www.networkworld.com/article/2854044/microsoft-subnet/byod-is-saving-serious-money-for-it
WHICH DEVICES
• Device Type: Smartphones,
tablets, laptops, wearables,
etc.
• Brands: Apple®, Android®
etc.
WHAT HELP IS AVAILABLE
• Registering devices
• Installing apps
• Troubleshooting problems
• Etc.
WHAT HELP WILL YOU
PROVIDE?
• New app
installations
• Day-to-day
questions of how to
integrate to certain
systems
• Remote wiping for a
lost or stolen device
• Faulty batteries or
broken screens
HOW WILL YOU PROVIDE THE
SUPPORT?
How will IT staff be reached?
How many employees will be needed?
Will FAQ documents
help?
BYOD POLICIES
How devices
are used
What systems they need access to
Potential risks
Get input from device users to better understand:
BYOD POLICIES
Should address:
EXPENSE ALLOCATIONS
(Who pays for what?)
IT SUPPORT
(If they use it, will you support it?)
ACCESS
(What is effective and acceptable to use?)
SECURITY
(Is it safe?)
Policy
13
Which types of the organization’s
resources may be accessed via
mobile devices?
Which types of mobile devices are
permitted to access the organization’s
resources?
MOBILE DEVICE MANAGEMENT
(MDM) SOLUTIONS
• Can help keep track of all approved BYOD
devices
• Control access to enterprise networks
and systems
• Manage app installations and upgrades
• Offer enhanced security
• TIP: Give employees a heads-up of what organization
will be able to access once MDM is installed
15
Ensure your IT folks are in the
loop with your mobile learning
interventions.
There may be many back-end
needs that are out of your hands.
It’s also nice to have a contact
when you’re in a pinch!
Megan McKee
• Give employees
access to all the
necessary data,
but also see to it
that this data
cannot be stored
anywhere on the
device.
User’s Limit of Accessing Information
17
Create flexible learning
experiences
Define Your Device Universe
19
Include only the latest mobile devices, which offer
better security features and device-level encryption.
Provide Support for Mixed
Learning Approaches
20
Tighten Integration with L&D & HR
platforms
21
Deploying for BYOD
Include
Necessary
content only
Break the
course
content into
bite-size
chunks.
Be careful
when
integrating
audio
elements.
1. CREATE a mobile device security policy.
2. SPREAD the word across your organization.
3. TRAIN your people in best practice.
4. IMPOSE security settings on the workforce.
5. ENSURE enforceable mandatory access to all devices.
6. SET standards for central, controlled synchronization
7. DECIDE whether your employees are able to ‘Bring Your Own
Device’.
8. CONSIDER automatic and user-transparent encryption on all
data on every mobile device and removable medium.
9. TRACK and label every device – and take a regular inventory.
10. DEPLOY mobile anti-virus solutions.
Ten tips for mobile peace of
mind
23
http://www.computerworld.com/article/2490062/consumerizati
on/byod-morphs-from-lockdown-to-true-mobility.html
https://www.whitehouse.gov/digitalgov/bring-your-own-device
https://www.shrm.org/templatestools/samples/policies/page
s/bringyourowndevicepolicy.aspx
http://www.itmanagerdaily.com/byod-policy-template/
http://www.techproresearch.com/downloads/byod-bring-your-own-
device-policy/
http://www.techproresearch.com/downloads/facing-the-
challenges-of-byod-in-the-enterprise/
Summary
• Use mobile as a platform for delivering
short form and on demand learning, as
well as supporting the formal learning
process.
• BYOD is the perfect option for mobile
learning, enabling more freedom and
flexibility to users to learn at the point of
need, not just when they are told to.
Resources
• http://www.cantechletter.com/2015/01/bring-device-next-big-
trend-education/
• The Ten Commandments of Bring Your Own Device (BYOD)
• http://www.ciscoservicesdynamics.com/byod
• http://www.networkworld.com/article/2854044/microsoft-
subnet/byod-is-saving-serious-money-for-it.html
• https://www.gaggle.net/speaks/5-tips-administrators-can-lead-
successful-byod-implementation/
• http://www.learningsolutionsmag.com/articles/1396/top-six-
byod-considerations-adopting-an-open-screen-door-policy
• http://www.techradar.com/news/computing/what-is-byod-and-
why-is-it-important--1175088
• https://www.pulselearning.com/blog/mobile-learning-for-the-
byod-era/
• http://www.zdnet.com/article/how-to-make-byod-work/
Contact Information
• Debbie Richards, Creative Interactive
Ideas
• debbie@cre8iveii.com
• @cre8iveii
• 713-419-1198

Contenu connexe

Tendances

3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting users
mrmwood
 
E2 Manage Tech Design Implementation General 2010
E2 Manage Tech Design Implementation General 2010E2 Manage Tech Design Implementation General 2010
E2 Manage Tech Design Implementation General 2010
bdwwork
 
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development ApproachThe Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
Thoughtworks
 

Tendances (20)

Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution Security
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Driving Usage & Adoption of Visual Collaboration
Driving Usage & Adoption of Visual CollaborationDriving Usage & Adoption of Visual Collaboration
Driving Usage & Adoption of Visual Collaboration
 
E-Team Grant Training & Program
E-Team Grant Training & ProgramE-Team Grant Training & Program
E-Team Grant Training & Program
 
Djm storyboard innovation for multimedia presentation
Djm storyboard innovation for multimedia presentationDjm storyboard innovation for multimedia presentation
Djm storyboard innovation for multimedia presentation
 
MagSlideDeck_17_External_v1.0
MagSlideDeck_17_External_v1.0MagSlideDeck_17_External_v1.0
MagSlideDeck_17_External_v1.0
 
Accessible procurement: Stories from the trenches
Accessible procurement: Stories from the trenchesAccessible procurement: Stories from the trenches
Accessible procurement: Stories from the trenches
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting users
 
E2 Manage Tech Design Implementation General 2010
E2 Manage Tech Design Implementation General 2010E2 Manage Tech Design Implementation General 2010
E2 Manage Tech Design Implementation General 2010
 
Software Outsourcing: Pitfalls and Best Practices
Software Outsourcing: Pitfalls and Best PracticesSoftware Outsourcing: Pitfalls and Best Practices
Software Outsourcing: Pitfalls and Best Practices
 
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development ApproachThe Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
 
Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...
Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...
Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...
 
Trainers Matter: Making the Case for VILT
Trainers Matter: Making the Case for VILTTrainers Matter: Making the Case for VILT
Trainers Matter: Making the Case for VILT
 
Emertxe Certified Embedded Professional (ECEP): Assessment system
Emertxe Certified Embedded Professional (ECEP): Assessment systemEmertxe Certified Embedded Professional (ECEP): Assessment system
Emertxe Certified Embedded Professional (ECEP): Assessment system
 
Agile Network India | Agility Driven Risk Regulations in Banking Space | Jose...
Agile Network India | Agility Driven Risk Regulations in Banking Space | Jose...Agile Network India | Agility Driven Risk Regulations in Banking Space | Jose...
Agile Network India | Agility Driven Risk Regulations in Banking Space | Jose...
 
SMEs Unleashed - Enabling those with the Knowledge to Share
SMEs Unleashed - Enabling those with the Knowledge to ShareSMEs Unleashed - Enabling those with the Knowledge to Share
SMEs Unleashed - Enabling those with the Knowledge to Share
 
final
finalfinal
final
 
Agile Network India | Jump over the High bar of Enterprise Agility with Jile ...
Agile Network India | Jump over the High bar of Enterprise Agility with Jile ...Agile Network India | Jump over the High bar of Enterprise Agility with Jile ...
Agile Network India | Jump over the High bar of Enterprise Agility with Jile ...
 
Innovation as a Discipline - Can innovation be managed?
Innovation as a Discipline - Can innovation be managed?Innovation as a Discipline - Can innovation be managed?
Innovation as a Discipline - Can innovation be managed?
 
Accessible User Experience: In Strategy, In Practice...In Thinking!
Accessible User Experience: In Strategy, In Practice...In Thinking!Accessible User Experience: In Strategy, In Practice...In Thinking!
Accessible User Experience: In Strategy, In Practice...In Thinking!
 

Similaire à Exploring byod approaches for mobile learning

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
Jim Sutter
 

Similaire à Exploring byod approaches for mobile learning (20)

Byod
ByodByod
Byod
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
BYOD
BYODBYOD
BYOD
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Securing the Remote Working Environment
Securing the Remote Working EnvironmentSecuring the Remote Working Environment
Securing the Remote Working Environment
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 

Plus de Debbie Richards

Qr codes mlearning_101011
Qr codes mlearning_101011Qr codes mlearning_101011
Qr codes mlearning_101011
Debbie Richards
 

Plus de Debbie Richards (16)

Technology on a Shoestring Budget
Technology on a Shoestring BudgetTechnology on a Shoestring Budget
Technology on a Shoestring Budget
 
S118 toolbox richards
S118 toolbox richardsS118 toolbox richards
S118 toolbox richards
 
S226 adobe captivate – all about styles and master slides richards
S226 adobe captivate – all about styles and master slides    richardsS226 adobe captivate – all about styles and master slides    richards
S226 adobe captivate – all about styles and master slides richards
 
OLC13 704 From Storytelling to Immersive Simulation
OLC13 704 From Storytelling to Immersive SimulationOLC13 704 From Storytelling to Immersive Simulation
OLC13 704 From Storytelling to Immersive Simulation
 
Writing for training
Writing for trainingWriting for training
Writing for training
 
Storytelling
StorytellingStorytelling
Storytelling
 
Adobe Acrobat X
Adobe Acrobat XAdobe Acrobat X
Adobe Acrobat X
 
PowerPoint to Video
PowerPoint to VideoPowerPoint to Video
PowerPoint to Video
 
Scenarios
ScenariosScenarios
Scenarios
 
Acrobat
AcrobatAcrobat
Acrobat
 
Ppt2 video
Ppt2 videoPpt2 video
Ppt2 video
 
Qr codes mlearning_101011
Qr codes mlearning_101011Qr codes mlearning_101011
Qr codes mlearning_101011
 
Html5- what you need to know and why you should care
Html5- what you need to know and why you should careHtml5- what you need to know and why you should care
Html5- what you need to know and why you should care
 
Smes
SmesSmes
Smes
 
LMS 101
LMS 101LMS 101
LMS 101
 
Using Blogs for eLearning
Using Blogs for eLearningUsing Blogs for eLearning
Using Blogs for eLearning
 

Dernier

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Exploring byod approaches for mobile learning

Notes de l'éditeur

  1. There was a time when organizations or companies provided all the resources for employees to get their job done. From the basic infrastructure to training and persistent development of every individual, everything was the exclusive responsibility of the organization. That era of corporate responsibility has changed with the development of smartphones and devices; enter Bring Your Own Device (BYOD). We are now living in the era of BYOD, an age where employees are enhancing their knowledge, developing new skills, and finding resolutions on their own. Organizations that can support this era are optimizing on their employees’ own devices. Offering employees a larger infrastructure, resources, and financial support helps advance their knowledge and consistently evolve them as professionals.
  2. By encouraging BYOD leaners and deploying courseware suitable to mobile devices, organizations can eliminate setup or training times associated with company-owned devices. By removing the training need to operate an unfamiliar device, BYOD learners can immediately access and focus their attention on specific training requirements. A BYOD mobile learning policy also gives employees access to performance support materials, wikis, or instructional videos around the clock. Having access to this information anytime, anywhere provides employees with additional flexibility and allows them to choose a time that is most convenient for them to complete training.
  3. BYOD can deliver tangible benefits, as proven by Cisco’s own IT results. Cisco now has more than 53,000 personal and corporate smart devices and has seen a 96 percent increase in smart devices over the last 2 years. Yet mobility costs have reduced by over 30 percent. Cisco estimates that the annual benefits from BYOD range from $300 to $1300 per employee, depending upon the employee's job role, and that Cisco employees pay an average of $600 out of pocket for a smart device that will give them more control over their work experience.
  4. A mobile device security policy should define which types of the organization’s resources may be accessed via mobile devices, which types of mobile devices are permitted to access the organization’s resources, the degree of access that various classes of mobile devices may have—for example, organization-issued devices versus personally-owned (bring your own device) devices—and how provisioning should be handled. It should also cover how the organization's centralized mobile device management servers are administered, how policies in those servers are updated, and all other requirements for mobile device management technologies. The mobile device security policy should be documented in the system security plan. To the extent feasible and appropriate, the mobile device security policy should be consistent with and complement security policy for non-mobile systems.
  5. The company has to next set a limit to the user’s right of accessing and storing corporate information received via his or her mobile device. This limit largely depends upon the type of the organization and the nature of information the establishment gives its employees access to. The best practice for companies would be to give employees access to all the necessary data, but also see to it that this data cannot be stored anywhere on the device. This means that the personal mobile device merely becomes a type of viewing platform – one that does not support exchange of information.
  6. You’re going to need a consistent approach to the way you organize, deliver, and manage your learning content. Be mindful of creating a learning experience that matches or thematically mirrors your traditional online learning experiences, which likely also need updating. Assuming learners can just access your standard learning portal via their device’s web browser is likely a poor judgment call when considering what the mobile experience should be.
  7. Next, it’s imperative you determine and document a well-defined list of mobile devices your team intends to permit—devices you’ll allow through your screen door rather than allowing use of anything and everything. Realize that your list may be more concise than the devices IT plans to support under their BYOD policies for tasks like accessing corporate email or intranets. You should consider supporting what I’d term “tier one” devices, which include most of the “top- and middle-shelf” offerings being sold by wireless carriers around the globe. As stated before, real challenges come from older devices with restricted screen sizes and incapable web browsers. Legacy devices also tend to offer poor security features and slower connection speeds, and can force content degradation due to limited support for HTML5.
  8. Learning on a mobile device is a different experience compared with more traditional instructor-delivered classes and online-delivered courses. Mobile devices are great for short, “bursty” learning activities but also a good way to mix formal learning activities with informal social interactions. Mobile provides easier opportunities to promote the creation and collection of user-generated content (e.g., taking photos, capturing videos, or recording podcasts) that can turn content consumers into content creators. Mobile devices also use competing media formats, storage mechanisms, and encryption methods, which all introduce challenges in a BYOD environment unless properly organized and managed.
  9. All previous considerations flow nicely through the screen of our sixth and final consideration—tighter connections between mobile workers and your backend systems of record; e.g., your learning management system (LMS), talent management system (TMS), and human resource information system (HRIS). Mobile workers outfitted via their own devices want assurances that their efforts to learn and grow will count where it matters most—in the training records and histories managed by T&D. Nothing can divert interest faster than the realization that a mobile learner is unable to use his or her device of choice to complete the required or selected training. Best practice Make sure all mobile learning apps directly connect with your LMS/TMS platforms and ensure connections are possible between your learners and the various document stores, media servers, and internal social networks your teams use to leverage organizational preparedness.
  10. three key elements to consider when deploying mobile learning for a BYOD environment 1. Include Necessary content only When converting eLearning courseware for mobile learning, you need to consider what content is absolutely necessary. Images and unnecessary content will take up valuable space and need to be removed for mobile deployment. Remember that the display screen on mobile devices and tablets is a lot smaller than on a laptop or PC. Avoid including images, graphics, and charts for aesthetic appeal; only include images and content blocks that are deemed important and necessary to the content. 2. Break the course content into bite-size chunks. Your BYOD learners want to access training content quickly and conveniently. Content needs to be broken into bite-sized chunks so it can be easily accessed and absorbed. Keep content blocks short and summarize text using bullets and simple forms. 3. Be careful when integrating audio elements. Your BYOD learners will be accessing mobile learning courseware in a variety of different environments, which needs to be considered when adding video and audio elements to content. Adding subtitles to video and audio elements is a simple way to overcome difficult environments, allowing your learners to turn off audio as required.
  11. CREATE a mobile device security policy. SPREAD the word across your organization. Make sure everyone knows the security implications of mobile working, and the importance of following the protocol. TRAIN your people in best practice. Focus on real life situations and make sure everyone knows what they can and can’t do with company data, how to access it securely, and how to recognize and deal with suspicious activity. IMPOSE security settings on the workforce. Do not rely on users setting their own security: even with the best intentions, they can get it wrong. ENSURE enforceable mandatory access to all devices, so your IT team can always act if a device is compromised. Ensure users are not able to override your access rights. SET standards for central, controlled synchronization, so important data is backed up automatically and only approved applications are used. This is difficult to control with smartphones, especially BYOD devices. DECIDE whether your employees are able to ‘Bring Your Own Device’. Though issuing company equipment offers maximum control, a ‘BYOD’ policy is cheaper to implement. And with careful management, it is an increasingly attractive option for company and employee alike. CONSIDER automatic and user-transparent encryption on all data on every mobile device and removable medium. Think of every separate piece of equipment as a self-contained unit that could hold sensitive data, and protect it accordingly. TRACK and label every device – and take a regular inventory. DEPLOY mobile anti-virus solutions – and ensure they are compatible with the other solutions you use, so infected devices cannot harm your network.
  12. The White House has a rather complete BYOD toolkit online that was developed in support of federal agencies implementing a BYOD program. Highlights of the toolkit include case studies and example policies. Templates can be a better starting point because they come from the enterprise, not some pundit or analyst's desk.
  13. SHRM has sample policy template
  14. IT Manager Daily published this basic template by Megan Berry. She does a good job of breaking down and explaining the critical parts of a BYOD policy.
  15. Tech Pro Research's BYOD policy includes a pre-written policy designed to allow you to copy the text from the zipped PDF into your favorite word processor and customize it to fit your organization's BYOD policy needs.
  16. Use mobile as a platform for delivering short form and on demand learning, as well as supporting the formal learning process. This is what makes BYOD the perfect option for mobile learning, enabling more freedom and flexibility to users to learn at the point of need, not just when they are told to.