Search results

1 – 10 of 234
Article
Publication date: 9 October 2017

Abubakar Garba Bello, David Murray and Jocelyn Armarego

This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by…

1481

Abstract

Purpose

This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by organisations that use mobile devices as part of their business strategy. While BYOD deployment can provide work flexibility, boost employees’ productivity and be cost cutting for organisations, there are also many information security and privacy issues, with some widely recognised, and others less understood. This paper focuses on BYOD adoption, and its associated risks and mitigation strategies, investigating how both information security and privacy can be effectively achieved in BYOD environments.

Design/methodology/approach

This research paper used a qualitative research methodology, applying the case study approach to understand both organisational and employee views, thoughts, opinions and actions in BYOD environments.

Findings

This paper identifies and understands BYOD risks, threats and influences, and determines effective controls and procedures for managing organisational and personal information resources in BYOD.

Research limitations/implications

The scope of this paper is limited to the inquiry and findings from organisations operating in Australia. This paper also suggests key implications that lie within the ability of organisations to adequately develop and deploy successful BYOD management and practices.

Originality/value

This paper expands previous research investigating BYOD practices, and also provides a current best practice approach that can be used by organisations to systematically investigate and understand how to manage security and privacy risks in BYOD environments.

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 March 2015

Aurélie Leclercq - Vandelannoitte

In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating…

2884

Abstract

Purpose

In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating innovative, individual, IT-driven changes into their corporate practices. The paper aims to discuss these issues.

Design/methodology/approach

Four in-depth, longitudinal case studies, conducted between 2006 and 2010, feature 92 interviews and observations to ensure triangulation.

Findings

We identify three types of organizational reactions (induction, normalization, and regulation) that depend on specific dimensions and affect the nature of subsequent IT-based organizational change.

Research limitations/implications

Continued research into the consumerization of IT can explore how it affects organizations today and whether different effects might arise in other contexts and with different kinds of organizations.

Practical implications

Reversed IT adoption logics have deep consequences for organizations; companies could achieve great gains from them, if carefully considered and managed.

Originality/value

This article addresses a topic that has been analyzed only scarcely and rarely, namely, the consumerization of IT and the tactics organizations use to incorporate user-driven IT innovation. Although this article presents only a few cases, it constitutes an initial attempt to explore this research area theoretically and investigate the ways organizations can harness employees’ personal IT adoption logics to promote creative, IT-driven change in firms.

Details

Information Technology & People, vol. 28 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 13 March 2017

Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi and Jonathan Guislain

The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the…

Abstract

Purpose

The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the traditional security and risk management systems. In this dynamic and heterogeneous setting, the purpose of this paper is to present a methodology called opportunity-enabled risk management (OPPRIM), which supports the decision-making process in access control to remote corporate assets.

Design/methodology/approach

OPPRIM relies on a logic-based risk policy model combining estimations of trust, threats and opportunities. Moreover, it is based on a mobile client – server architecture, where the OPPRIM application running on the user device interacts with the company IT security server to manage every access request to corporate assets.

Findings

As a mandatory requirement in the highly flexible BYOD setting, in the OPPRIM approach, mobile device security risks are identified automatically and dynamically depending on the specific environment in which the access request is issued and on the previous history of events.

Originality/value

The main novelty of the OPPRIM approach is the combined treatment of threats (resp., opportunities) and costs (resp., benefits) in a trust-based setting. The OPPRIM system is validated with respect to an economic perspective: cost-benefit sensitivity analysis is conducted through formal methods using the PRISM model checker and through agent-based simulations using the Anylogic framework.

Details

Information & Computer Security, vol. 25 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 6 June 2019

Hope Koch, Jie (Kevin) Yan and Patrick Curry

The purpose of this paper is to understand how the digital workplace, in particular employees using consumer tools at work (users), impacts how internal IT departments function…

Abstract

Purpose

The purpose of this paper is to understand how the digital workplace, in particular employees using consumer tools at work (users), impacts how internal IT departments function and their relationships with users they have historically supported.

Design/methodology/approach

An interpretive, longitudinal case study highlighting how one IT department coped with the conflicts using consumer tools at work creates a trend called IT consumerization.

Findings

Internal IT departments manage the conflicts IT consumerization poses through an ongoing process of conflict and conflict resolution. This impacts the IT department’s relationship with users along three dimensions: IT-control, user-self-sufficiency and IT-user partnerships.

Originality/value

While there is an ongoing debate about internal IT departments needing to change, the study shows how one IT department did change in response to IT consumerization. The authors develop a data-driven model grounded in theories that explains how IT departments cope with the conflicts IT consumerization poses.

Details

Information Technology & People, vol. 33 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 October 2013

Danielle Fowler, Dennis Pitta and Richard C. Leventhal

– The purpose of this paper is to investigate the effects of advancements in technology on the practice of one to one marketing.

5969

Abstract

Purpose

The purpose of this paper is to investigate the effects of advancements in technology on the practice of one to one marketing.

Design/methodology/approach

The paper presents the results of analysis of reported advancements in information technology, social media, and their effects in identifying consumer preferences and consumer identity.

Findings

The proliferation of social media, online communities and mobile communication have generated amounts of consumer data of interest to marketers. Simultaneously, technology to collect and analyze the data have improved greatly. The result is insight into the preferences of individual consumers and the ability to implement one-to-one marketing with unprecedented effectiveness. However, countervailing forces exist that attempt to limit the use of that consumer data.

Research limitations/implications

One limitation is the reliance on published sources of technological advances. While the information seems representative of state of the art practiced in industry, unpublished, proprietary technology may exist that might re-characterize the potential for information exploitation.

Practical implications

Marketers now have many information sources and analytical tools to implement the one-to-one marketing concept and can do so with a higher degree of effectiveness than previously.

Originality/value

To date, few, if any, academic studies have been done that link technology, one-to-one marketing and the resistance to incursions on consumer privacy.

Details

Journal of Consumer Marketing, vol. 30 no. 6
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 6 June 2020

Hao Chen, Ying Li, Lirong Chen and Jin Yin

While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide…

1677

Abstract

Purpose

While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide to adopt BYOD practices when they encounter information security–related conflict.

Design/methodology/approach

Using survey data from 235 employees of Chinese enterprises and applying partial least squares based structural equation modeling (PLS-SEM), we test a series of hypotheses.

Findings

The results suggest that information security–related conflict elicits information security fatigue among employees. As their information security fatigue increases, employees become less likely to adopt BYOD practices. In addition, information security–related conflict has an indirect effect on employee's BYOD adoption through the full mediation of information security fatigue.

Practical implications

This study provides practical implications to adopt BYOD in the workplace through conflict management measures and emotion management strategies. Conflict management measures focused on the reducing of four facets of information security–related conflict, such as improve organization's privacy policies and help employees to build security habits. Emotion management strategies highlighted the solutions to reduce fatigue through easing conflict, such as involving employees in the development or update of information security policies to voice their demands of privacy and other rights.

Originality/value

Our study extends knowledge by focusing on the barriers to employees' BYOD adoption when considering information security in the workplace. Specifically, this study takes a conflict perspective and builds a multi-faceted construct of information security–related conflict. Our study also extends information security behavior research by revealing an emotion-based mediation effect, that of information security fatigue, to explore the mechanism underlying the influence of information security–related conflict on employee behavior.

Details

Journal of Enterprise Information Management, vol. 34 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 25 March 2022

Melina Seedoyal Doargajudhur and Zuberia Hosanoo

As employees’ adoption of Bring Your Own Device (BYOD) has increased, so has research interest into the impact of BYOD on human resources outcomes. The present study aims at…

Abstract

Purpose

As employees’ adoption of Bring Your Own Device (BYOD) has increased, so has research interest into the impact of BYOD on human resources outcomes. The present study aims at understanding the relationship between BYOD and human resources outcomes.

Design/methodology/approach

The study employs the inductive data-driven content analysis approach to analyze the data collected through qualitative semi-structured interviews with a sample of 28 knowledge workers from different occupational sectors in Mauritius.

Findings

The results show the double-edged sword brought about by BYOD implementation. This trend is associated with perceived job performance, job satisfaction, organizational commitment and work motivation while also having an effect on work-life conflict and stress.

Practical implications

This study has implications for organizations that are concerned about formulating guidelines and policies in relation to workers' adoption of BYOD in the workplace. This trend permits employees to continue to communicate and work irrespective of new working conditions and social distancing since the Covid-19 pandemic has changed the way organizations operate around the globe.

Originality/value

Driven by the JD-R theory, themes and sub-themes were linked by the emerging relationships to present a conceptual framework to understanding employees' well-being since this is a pertinent research area for scholars and practitioners, as well as a topic of growing prominence for modern organizations.

Details

Information Technology & People, vol. 36 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 29 June 2018

Paméla Baillette and Yves Barlette

The purpose of this paper is to present the benefits and potential dangers of “bring your own device” (BYOD)-related practices. The paper aims to highlight new risks stemming from…

1107

Abstract

Purpose

The purpose of this paper is to present the benefits and potential dangers of “bring your own device” (BYOD)-related practices. The paper aims to highlight new risks stemming from BYOD adoption and identifies different security paradoxes arising for entrepreneurs and their employees in the context of small- and medium-sized enterprises (SMEs).

Design/methodology/approach

A theoretical approach is proposed in this paper. As technology is an important driver of organizational change, technological innovations entail new work practices and in turn lead to a twofold “security paradox.”

Findings

This paper introduces the stakes and issues associated with BYOD-related mobile technologies. Evidence is provided that this phenomenon must be cautiously addressed to not only seize related benefits but also reduce related risks. Avenues for future research are offered to complement this work.

Practical implications

The main practical interest is to make entrepreneurs of SMEs and their employees aware of the BYOD phenomenon and its related risks and benefits.

Originality/value

From a theoretical perspective, very little work has been published in the field of management sciences about the benefits and dangers associated with the introduction of BYOD among entrepreneurs and employees in SMEs. Moreover, this study identifies a twofold “security paradox” related to information security that has never been studied in work settings.

Details

Journal of Organizational Change Management, vol. 31 no. 4
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 12 July 2018

Melina Seedoyal Doargajudhur and Peter Dell

Bring your own device (BYOD) refers to employees utilizing their personal mobile devices to perform work tasks. Drawing on the job demands-resources (JD-R) model and the…

1774

Abstract

Purpose

Bring your own device (BYOD) refers to employees utilizing their personal mobile devices to perform work tasks. Drawing on the job demands-resources (JD-R) model and the task-technology fit (TTF) model, the purpose of this paper is to develop a model that explains how BYOD affects employee well-being (through job satisfaction), job performance self-assessment, and organizational commitment through perceived job autonomy, perceived workload and TTF.

Design/methodology/approach

Survey data from 400 full-time employees in different industry sectors in Mauritius were used to test a model containing 13 hypotheses using confirmatory factor analysis and structural equation modeling.

Findings

The SEM results support the hypothesized model. Findings indicate that BYOD indirectly affects job satisfaction, job performance and organizational commitment via job demands (perceived workload), job resources (perceived job autonomy) and TTF. Further, job resources influences job demands while TTF predicted job performance. Finally, job satisfaction and job performance self-assessment appear to be significant determinants of organizational commitment.

Practical implications

The findings are congruent with the JD-R and TTF models, and confirm that BYOD has an impact on job satisfaction, job performance self-assessment and organizational commitment. This could inform organizations’ policies and practices relating to BYOD, leading to improved employee well-being, performance and higher commitment.

Originality/value

The expanded model developed in this study explains how employee well-being, performance and organizational commitment are affected by BYOD, and is one of the first studies to investigate these relationships.

Details

Information Technology & People, vol. 32 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 7 August 2017

Janak Adhikari, Chris Scogings, Anuradha Mathrani and Indu Sofat

The purpose of this paper is to seek answers to questions on how equity of information literacy and learning outcomes have evolved with the ongoing advances in technologies in…

1893

Abstract

Purpose

The purpose of this paper is to seek answers to questions on how equity of information literacy and learning outcomes have evolved with the ongoing advances in technologies in teaching and learning across schools. The authors’ report on a five-year long bring your own device (BYOD) journey of one school, which was one of the earliest adopters of one-to-one learning devices in New Zealand.

Design/methodology/approach

Using a socio-cultural ecological lens for analysis, a longitudinal study has investigated aspects of how digital/information literacy, computer self-efficacy, and nature of technology usage are transforming school and classroom curriculum practices.

Findings

Findings of this study reveal a significant shift in social and academic boundaries between formal and informal learning spaces. One-to-one learning devices provide the link between school and home, as students take more ownership of their learning, and teachers become facilitators. Curricula changes and proper technological support systems introduced in the school structures have given agency to students resulting in greater acceptance of the BYOD policy and extensions to learning beyond formal classroom spaces. Digital divide amongst learners has evolved beyond equity in access and equity in capabilities to become more inclusive, thereby paving the way for equity in learning outcomes.

Research limitations/implications

This study has been conducted in a school which is located in a relatively high socio-economic region. To achieve a more holistic view, there is a need for further studies to be conducted in schools from low socio-economic communities.

Originality/value

This paper adds to the existing literature by sharing teacher reflections on their use of innovative pedagogies to bring changes to classroom curricular practice.

Details

The International Journal of Information and Learning Technology, vol. 34 no. 4
Type: Research Article
ISSN: 2056-4880

Keywords

1 – 10 of 234