Search results
1 – 10 of 234Abubakar Garba Bello, David Murray and Jocelyn Armarego
This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by…
Abstract
Purpose
This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by organisations that use mobile devices as part of their business strategy. While BYOD deployment can provide work flexibility, boost employees’ productivity and be cost cutting for organisations, there are also many information security and privacy issues, with some widely recognised, and others less understood. This paper focuses on BYOD adoption, and its associated risks and mitigation strategies, investigating how both information security and privacy can be effectively achieved in BYOD environments.
Design/methodology/approach
This research paper used a qualitative research methodology, applying the case study approach to understand both organisational and employee views, thoughts, opinions and actions in BYOD environments.
Findings
This paper identifies and understands BYOD risks, threats and influences, and determines effective controls and procedures for managing organisational and personal information resources in BYOD.
Research limitations/implications
The scope of this paper is limited to the inquiry and findings from organisations operating in Australia. This paper also suggests key implications that lie within the ability of organisations to adequately develop and deploy successful BYOD management and practices.
Originality/value
This paper expands previous research investigating BYOD practices, and also provides a current best practice approach that can be used by organisations to systematically investigate and understand how to manage security and privacy risks in BYOD environments.
Details
Keywords
Aurélie Leclercq - Vandelannoitte
In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating…
Abstract
Purpose
In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating innovative, individual, IT-driven changes into their corporate practices. The paper aims to discuss these issues.
Design/methodology/approach
Four in-depth, longitudinal case studies, conducted between 2006 and 2010, feature 92 interviews and observations to ensure triangulation.
Findings
We identify three types of organizational reactions (induction, normalization, and regulation) that depend on specific dimensions and affect the nature of subsequent IT-based organizational change.
Research limitations/implications
Continued research into the consumerization of IT can explore how it affects organizations today and whether different effects might arise in other contexts and with different kinds of organizations.
Practical implications
Reversed IT adoption logics have deep consequences for organizations; companies could achieve great gains from them, if carefully considered and managed.
Originality/value
This article addresses a topic that has been analyzed only scarcely and rarely, namely, the consumerization of IT and the tactics organizations use to incorporate user-driven IT innovation. Although this article presents only a few cases, it constitutes an initial attempt to explore this research area theoretically and investigate the ways organizations can harness employees’ personal IT adoption logics to promote creative, IT-driven change in firms.
Details
Keywords
Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi and Jonathan Guislain
The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the…
Abstract
Purpose
The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the traditional security and risk management systems. In this dynamic and heterogeneous setting, the purpose of this paper is to present a methodology called opportunity-enabled risk management (OPPRIM), which supports the decision-making process in access control to remote corporate assets.
Design/methodology/approach
OPPRIM relies on a logic-based risk policy model combining estimations of trust, threats and opportunities. Moreover, it is based on a mobile client – server architecture, where the OPPRIM application running on the user device interacts with the company IT security server to manage every access request to corporate assets.
Findings
As a mandatory requirement in the highly flexible BYOD setting, in the OPPRIM approach, mobile device security risks are identified automatically and dynamically depending on the specific environment in which the access request is issued and on the previous history of events.
Originality/value
The main novelty of the OPPRIM approach is the combined treatment of threats (resp., opportunities) and costs (resp., benefits) in a trust-based setting. The OPPRIM system is validated with respect to an economic perspective: cost-benefit sensitivity analysis is conducted through formal methods using the PRISM model checker and through agent-based simulations using the Anylogic framework.
Details
Keywords
Hope Koch, Jie (Kevin) Yan and Patrick Curry
The purpose of this paper is to understand how the digital workplace, in particular employees using consumer tools at work (users), impacts how internal IT departments function…
Abstract
Purpose
The purpose of this paper is to understand how the digital workplace, in particular employees using consumer tools at work (users), impacts how internal IT departments function and their relationships with users they have historically supported.
Design/methodology/approach
An interpretive, longitudinal case study highlighting how one IT department coped with the conflicts using consumer tools at work creates a trend called IT consumerization.
Findings
Internal IT departments manage the conflicts IT consumerization poses through an ongoing process of conflict and conflict resolution. This impacts the IT department’s relationship with users along three dimensions: IT-control, user-self-sufficiency and IT-user partnerships.
Originality/value
While there is an ongoing debate about internal IT departments needing to change, the study shows how one IT department did change in response to IT consumerization. The authors develop a data-driven model grounded in theories that explains how IT departments cope with the conflicts IT consumerization poses.
Details
Keywords
Danielle Fowler, Dennis Pitta and Richard C. Leventhal
– The purpose of this paper is to investigate the effects of advancements in technology on the practice of one to one marketing.
Abstract
Purpose
The purpose of this paper is to investigate the effects of advancements in technology on the practice of one to one marketing.
Design/methodology/approach
The paper presents the results of analysis of reported advancements in information technology, social media, and their effects in identifying consumer preferences and consumer identity.
Findings
The proliferation of social media, online communities and mobile communication have generated amounts of consumer data of interest to marketers. Simultaneously, technology to collect and analyze the data have improved greatly. The result is insight into the preferences of individual consumers and the ability to implement one-to-one marketing with unprecedented effectiveness. However, countervailing forces exist that attempt to limit the use of that consumer data.
Research limitations/implications
One limitation is the reliance on published sources of technological advances. While the information seems representative of state of the art practiced in industry, unpublished, proprietary technology may exist that might re-characterize the potential for information exploitation.
Practical implications
Marketers now have many information sources and analytical tools to implement the one-to-one marketing concept and can do so with a higher degree of effectiveness than previously.
Originality/value
To date, few, if any, academic studies have been done that link technology, one-to-one marketing and the resistance to incursions on consumer privacy.
Details
Keywords
Hao Chen, Ying Li, Lirong Chen and Jin Yin
While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide…
Abstract
Purpose
While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide to adopt BYOD practices when they encounter information security–related conflict.
Design/methodology/approach
Using survey data from 235 employees of Chinese enterprises and applying partial least squares based structural equation modeling (PLS-SEM), we test a series of hypotheses.
Findings
The results suggest that information security–related conflict elicits information security fatigue among employees. As their information security fatigue increases, employees become less likely to adopt BYOD practices. In addition, information security–related conflict has an indirect effect on employee's BYOD adoption through the full mediation of information security fatigue.
Practical implications
This study provides practical implications to adopt BYOD in the workplace through conflict management measures and emotion management strategies. Conflict management measures focused on the reducing of four facets of information security–related conflict, such as improve organization's privacy policies and help employees to build security habits. Emotion management strategies highlighted the solutions to reduce fatigue through easing conflict, such as involving employees in the development or update of information security policies to voice their demands of privacy and other rights.
Originality/value
Our study extends knowledge by focusing on the barriers to employees' BYOD adoption when considering information security in the workplace. Specifically, this study takes a conflict perspective and builds a multi-faceted construct of information security–related conflict. Our study also extends information security behavior research by revealing an emotion-based mediation effect, that of information security fatigue, to explore the mechanism underlying the influence of information security–related conflict on employee behavior.
Details
Keywords
Melina Seedoyal Doargajudhur and Zuberia Hosanoo
As employees’ adoption of Bring Your Own Device (BYOD) has increased, so has research interest into the impact of BYOD on human resources outcomes. The present study aims at…
Abstract
Purpose
As employees’ adoption of Bring Your Own Device (BYOD) has increased, so has research interest into the impact of BYOD on human resources outcomes. The present study aims at understanding the relationship between BYOD and human resources outcomes.
Design/methodology/approach
The study employs the inductive data-driven content analysis approach to analyze the data collected through qualitative semi-structured interviews with a sample of 28 knowledge workers from different occupational sectors in Mauritius.
Findings
The results show the double-edged sword brought about by BYOD implementation. This trend is associated with perceived job performance, job satisfaction, organizational commitment and work motivation while also having an effect on work-life conflict and stress.
Practical implications
This study has implications for organizations that are concerned about formulating guidelines and policies in relation to workers' adoption of BYOD in the workplace. This trend permits employees to continue to communicate and work irrespective of new working conditions and social distancing since the Covid-19 pandemic has changed the way organizations operate around the globe.
Originality/value
Driven by the JD-R theory, themes and sub-themes were linked by the emerging relationships to present a conceptual framework to understanding employees' well-being since this is a pertinent research area for scholars and practitioners, as well as a topic of growing prominence for modern organizations.
Details
Keywords
Paméla Baillette and Yves Barlette
The purpose of this paper is to present the benefits and potential dangers of “bring your own device” (BYOD)-related practices. The paper aims to highlight new risks stemming from…
Abstract
Purpose
The purpose of this paper is to present the benefits and potential dangers of “bring your own device” (BYOD)-related practices. The paper aims to highlight new risks stemming from BYOD adoption and identifies different security paradoxes arising for entrepreneurs and their employees in the context of small- and medium-sized enterprises (SMEs).
Design/methodology/approach
A theoretical approach is proposed in this paper. As technology is an important driver of organizational change, technological innovations entail new work practices and in turn lead to a twofold “security paradox.”
Findings
This paper introduces the stakes and issues associated with BYOD-related mobile technologies. Evidence is provided that this phenomenon must be cautiously addressed to not only seize related benefits but also reduce related risks. Avenues for future research are offered to complement this work.
Practical implications
The main practical interest is to make entrepreneurs of SMEs and their employees aware of the BYOD phenomenon and its related risks and benefits.
Originality/value
From a theoretical perspective, very little work has been published in the field of management sciences about the benefits and dangers associated with the introduction of BYOD among entrepreneurs and employees in SMEs. Moreover, this study identifies a twofold “security paradox” related to information security that has never been studied in work settings.
Details
Keywords
Melina Seedoyal Doargajudhur and Peter Dell
Bring your own device (BYOD) refers to employees utilizing their personal mobile devices to perform work tasks. Drawing on the job demands-resources (JD-R) model and the…
Abstract
Purpose
Bring your own device (BYOD) refers to employees utilizing their personal mobile devices to perform work tasks. Drawing on the job demands-resources (JD-R) model and the task-technology fit (TTF) model, the purpose of this paper is to develop a model that explains how BYOD affects employee well-being (through job satisfaction), job performance self-assessment, and organizational commitment through perceived job autonomy, perceived workload and TTF.
Design/methodology/approach
Survey data from 400 full-time employees in different industry sectors in Mauritius were used to test a model containing 13 hypotheses using confirmatory factor analysis and structural equation modeling.
Findings
The SEM results support the hypothesized model. Findings indicate that BYOD indirectly affects job satisfaction, job performance and organizational commitment via job demands (perceived workload), job resources (perceived job autonomy) and TTF. Further, job resources influences job demands while TTF predicted job performance. Finally, job satisfaction and job performance self-assessment appear to be significant determinants of organizational commitment.
Practical implications
The findings are congruent with the JD-R and TTF models, and confirm that BYOD has an impact on job satisfaction, job performance self-assessment and organizational commitment. This could inform organizations’ policies and practices relating to BYOD, leading to improved employee well-being, performance and higher commitment.
Originality/value
The expanded model developed in this study explains how employee well-being, performance and organizational commitment are affected by BYOD, and is one of the first studies to investigate these relationships.
Details
Keywords
Janak Adhikari, Chris Scogings, Anuradha Mathrani and Indu Sofat
The purpose of this paper is to seek answers to questions on how equity of information literacy and learning outcomes have evolved with the ongoing advances in technologies in…
Abstract
Purpose
The purpose of this paper is to seek answers to questions on how equity of information literacy and learning outcomes have evolved with the ongoing advances in technologies in teaching and learning across schools. The authors’ report on a five-year long bring your own device (BYOD) journey of one school, which was one of the earliest adopters of one-to-one learning devices in New Zealand.
Design/methodology/approach
Using a socio-cultural ecological lens for analysis, a longitudinal study has investigated aspects of how digital/information literacy, computer self-efficacy, and nature of technology usage are transforming school and classroom curriculum practices.
Findings
Findings of this study reveal a significant shift in social and academic boundaries between formal and informal learning spaces. One-to-one learning devices provide the link between school and home, as students take more ownership of their learning, and teachers become facilitators. Curricula changes and proper technological support systems introduced in the school structures have given agency to students resulting in greater acceptance of the BYOD policy and extensions to learning beyond formal classroom spaces. Digital divide amongst learners has evolved beyond equity in access and equity in capabilities to become more inclusive, thereby paving the way for equity in learning outcomes.
Research limitations/implications
This study has been conducted in a school which is located in a relatively high socio-economic region. To achieve a more holistic view, there is a need for further studies to be conducted in schools from low socio-economic communities.
Originality/value
This paper adds to the existing literature by sharing teacher reflections on their use of innovative pedagogies to bring changes to classroom curricular practice.
Details