Government Technology

2012 Year in Review: BYOD



December 11, 2012 By

Editor's note: Over the course of a year, we write hundreds of stories covering myriad topics. And at year's end, we attempt to make sense of it all. We looked for trends that had a profound impact this year — and that are likely to be even more influential in the future. We think our choices fit that mold.

In this Web series, we'll look at social media, which is steadily reshaping how agencies deal with the public; big data, which holds new promise for improving government performance; BYOD, cloud computing and software as a service, all of which are challenging long-held assumptions for how agencies acquire and use technology; and the emergence of chief innovation officers, which hints at eventual challenges to traditional organizational structures themselves. We expect these trends, which took root in 2012, to impact our work and world as we move into next year and beyond.

Year in Review Timeline ... continued

BYOD: Resistance is Futile

CIOs this year who attempted to stop the adoption of personal mobile devices in government computing can perhaps sympathize with King Canute of England who sat in his throne on the beach, ordered the tide to stop and nearly drowned. Some 6 billion mobile devices have been purchased worldwide, and they have revolutionized personal life and society.

If our interviews with IT leaders throughout the year are any indication, 2012 is the year that bring your own device (BYOD) strategies reached a tipping point. Instead of resisting, many CIOs had begun to embrace the tsunami of privately owned mobile devices into city, county and state computing. Cities and counties struggled with the risks of lost or stolen devices, the acceleration of mobile malware, and troubling requirements such as discovery and Freedom of Information requests. But they recognized the efficiencies of replacing some government-owned devices with personally owned ones, the trend of "blurring" work and personal life, and welcomed new capabilities such as mobile apps for everything from transit schedules to pothole reporting.


View Full Story

| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
View All

Featured Papers