Business transformation leads the way in speeding mobile adoption

Business transformation is the main reason why companies adopt mobile data and mobile applications, according to a survey by consultancy Henley Centre.

Business transformation is the main reason why companies adopt mobile data and mobile applications, according to a survey  by consultancy Henley Centre.

Some 31% of the 550 businesses surveyed said "completely transforming the business process" was the reason why they had adopted mobile data technology, including bespoke mobile applications.

A further 30% of companies had adopted mobile data technology to improve communication between their off-site and office-based employees.

Requiring employees to be "always on", improving the efficiency of field workers, enabling flexible working and improving office-based employees' efficiency were also cited as reasons for adopting mobile technology.

The Henley Centre, which was commissioned by mobile operator Orange for its Orange Future Enterprise Coalition, interviewed 150 companies with turnover of more than £5m, 100 companies with between £1m and £5m of turnover and 300 businesses with turnover of less than £1m.

The survey found that IT directors were the most important decision makers for mobile technology in companies with more than 100 employees. In smaller companies, the business owner or most senior manager was the person most likely to choose mobile technology.

Relatively few companies are equipping their employees with smartphones. Just 29% of firms said they gave smartphones to their staff.




Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT for small and medium-sized enterprises (SME)

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...