Get Steve's Book on Amazon
  • Eliminating
    Eliminating "Us And Them": Making IT and the Business One
    by Steven Romero
Wednesday
Oct192011

Exploiting the Consumerization of IT to Achieve Enterprise Mobility

In my last post I discussed the consumerization of IT and what enterprises can do to enable positive outcomes from this current phenomenon influencing their IT organizations. My timing was good because this morning I read a great MIT Center for Information Systems Research briefing titled, “Harnessing the Consumerization of IT” http://t.co/RVTN87Nr. Though I was delighted to see my favorite research organization was tackling this timely subject, I had no idea they were simultaneously addressing an equally opportune topic – Enterprise Mobility.

The direct correlation between these two hot topics became immediately apparent in MIT CISR’s definition of “the consumerization of IT.” Research Scientist Anne Quasdgras and Research Assistant Ifran Mohammed define the consumerization of IT as, “employees using mobile consumer technologies (smartphones, tablets) for work.” 

I had actually included social media applications such as Facebook, Twitter, and Chatter as consumer-driven information technology capabilities being ‘pushed’ on IT. I don’t take issue with MIT CISR’s narrower view of the consumerization of IT. It just shows how there is not a consensus in the industry and it underscores the need for each enterprise to ensure everyone in their organization is on the same page when discussing this critical trend.

The researchers conducted interviews and conversations at 31 organizations and as a result, developed a two-stage framework for responding to the consumerization of IT. The first stage involves “reactive responses” to the consumerization of IT and the second stage consists of “proactive responses.” 

Reactive Responses

Start a cross-functional dialogue

This dialogue involves business users, IT, finance, legal, and security people. The goal is to raise awareness of security concerns and cost concerns while discovering opportunities for creating value and identifying risks. 

Create device policies

This includes policies for device ownership, Security, data access.

Augment the IT infrastructure

IT organizations need to deploy mobile device management solutions (MDM). 50% of the organizations interviewed use MDM to create “secure containers.” Employees use one physical personal device that contained two virtual devices that don’t talk to one another. One virtual device is used to access corporate data while the other is used for consumer applications. 30% of organizations deployed MDM to enable device registration, password management, remote management, and remote wipe. There is additional risk exposure to the latter MDM, but this approach enables employees to explore using consumer apps for work. Each approach supports “learning by doing” which enables employees to discover what works for them.

Tap into the mobile application ecosystem

The researchers suggest using vendors for mobile app development, engineering and visual design support. They also note how vendors can provide development and trouble-shooting tools. They then recommend the establishment of “in-house user interface design teams” to incorporate organization-specific details.

Two types of value resulted from the reactive stage of MIT CISR’s framework. Employee personal productivity increased due to basic data and process access, and employee satisfaction with work increased as well.

Proactive Responses

The researchers noted the real power in harnessing the consumerization of IT is the potential to create an “organizational capability that can change how work is done.” To do this, proactive responses included:

Thinking mobile

Incorporating the power of location awareness, cameras, touch-screens, and anytime-anywhere capability into process design.

Architect

This entails creating an enterprise mobile architecture, with policies, standards and exceptions processes. 

Systematically integrate innovations

This involves capturing and deploying mobile innovation from employees and not just technology experts and process designers.

The timing of my last blog post and my reading the MIT research briefing also coincided with the publication of the latest CIO Magazine (which I read just yesterday). The October 15th edition is titled “Lead with Mobile” http://www.cio.com/issue/20111015. Editor in Chief Maryfran Johnson kicks of the issue with an editorial titled, “Creating a mobile-first mindset.”  Their cover story by Elisabeth Horwitt describes how to create a new development strategy to enable organizations to think mobility first when developing new applications. Another article provides some great views for addressing mobile security. And I am sure it is no accident that this issue includes the results of CIO Magazine’s “Global Information Security Survey.”  The article is titled, “A False Sense of Security” and their research resulted in a finding that our data is “not as safe as we think.”

I highly suggest you get a copy of the latest issue of CIO Magazine and you download the MIT CISR Research Briefing. (You will have to first register with MIT CISR but don’t let that deter you because your only regret will be not having done so sooner.)

I am sure you are involved in the latest cries for IT to drive business innovation. And as one of the respondents to MIT CISR’s interview noted, “Before we can carry on a conversation about innovation in the business, we have to clear out this iPad/smartphone access question.” When you do answer the question, you will find yourself exploiting the consumerization of IT to achieve enterprise mobility.

~ Steve ~

PrintView Printer Friendly Version

EmailEmail Article to Friend

References (6)

References allow you to track sources for this article, as well as articles that were written in response to this article.
  • Response
  • Response
    Workout regime must be appropriate to our body, Muscle tissue melt away a Nike TN Requin Homme great deal more calories as compared requin nike tn to fats so it is also best to build on a little muscle and looking great also.Additionally, Mortgage Rates Guideשטר משכנתא ראשונה mortgage worldtmall
  • Response
    Romero Consulting - Blog - Exploiting the Consumerization of IT to Achieve Enterprise
  • Response
  • Response
    Response: instagram search
  • Response

Reader Comments (1)

The MIT briefing was a great overview of the approach CIO's need to take. The most important part of the briefing was the directive to COMMUNICATE with the end users about their mobility needs. Sounds so simple but it is so often overlooked.

Thanks for pointing out this important topic and article, Steve.

October 19, 2011 | Unregistered CommenterDaniel Bobke

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>
« Managers, Who Needs Them? | Main | Enabling the “Consumerization of IT” »