Search results

1 – 10 of 285
Article
Publication date: 4 September 2020

Fenio Annansingh

Currently, one of the most significant challenges organizations face is that corporate data is being delivered to mobile devices that are not managed by the information technology…

881

Abstract

Purpose

Currently, one of the most significant challenges organizations face is that corporate data is being delivered to mobile devices that are not managed by the information technology department. This has security implications regarding knowledge leakage, data theft, and regulatory compliance. With these unmanaged devices, companies have less control and visibility, and fewer mitigation options when protecting against the risks of cyber-attacks. Therefore, the purpose of this study is to investigate how millennials' use of personal mobile devices for work contributes to increased exposure to cyber-attacks and, consequently, security and knowledge leakage risks.

Design/methodology/approach

This research used a mixed-method approach by using survey questionnaires to elicit the views of millennials regarding the cybersecurity risks associated with bring your own device policies and practices. Interviews were done with security personnel. Data analysis consisted of descriptive analysis and open coding.

Findings

The results indicate that millennials expect to have ready access to technology and social media at all times, irrespective of security and privacy concerns. Companies also need to improve and enforce bring your own device policies and practices to mitigate against knowledge leakage and security risks. Millennials increasingly see the use of personal devices as a right and not a convenience. They are expecting security measures to be more seamless within the full user experience.

Originality/value

This paper can help organizations and millennials to understand the security risks entering the workforce if the threats of using privately owned devices on the job are ignored and to improve organizational performance.

Details

Journal of Business Strategy, vol. 42 no. 6
Type: Research Article
ISSN: 0275-6668

Keywords

Article
Publication date: 11 January 2022

Khutsafalo Kadimo, Athulang Mutshewa and Masego B. Kebaetse

Seeking to leverage on benefits of personal mobile device use, medical schools and healthcare facilities are increasingly embracing the use of personal mobile devices for medical…

Abstract

Purpose

Seeking to leverage on benefits of personal mobile device use, medical schools and healthcare facilities are increasingly embracing the use of personal mobile devices for medical education and healthcare delivery through bring-your-own-device (BYOD) policies. However, empirical research findings that could guide the development of BYOD policies are scarce. Available research is dominated by studies that were guided by technocentric approaches, hence seemingly overlooking the complexities of the interactions of actors in mobile device technologies implementation. The purpose of this study was to use the actor–network theory to explore the potential role of a BYOD policy at the University of Botswana’s Faculty of Medicine.

Design/methodology/approach

Purposive sampling was used to select the participants and interviews, focus group discussions, observations and document analysis were used to collect data. Data were collected from 27 participants and analysed using grounded theory techniques. Emerging themes were continually compared and contrasted with incoming data to create broad themes and sub-themes and to establish relationships or patterns from the data.

Findings

The results suggest that the potential roles for BYOD policy include promoting appropriate mobile device use, promoting equitable access to mobile devices and content, and integrating mobile devices into medical education, healthcare delivery and other institutional processes.

Research limitations/implications

BYOD policy could be conceptualized and researched as a “script” that binds actors/actants into a “network” of constituents (with shared interests) such as medical schools and healthcare facilities, mobile devices, internet/WiFi, computers, software, computer systems, medical students, clinical teachers or doctors, nurses, information technology technicians, patients, curriculum, information sources or content, classrooms, computer labs and infections.

Practical implications

BYOD is a policy that seeks to represent the interests (presents as a solution to their problems) of the key stakeholders such as medical schools, healthcare facilities and mobile device users. BYOD is introduced in medical schools and healthcare facilities to promote equitable access to mobile devices and content, appropriate mobile device use and ensure distribution of liability between the mobile device users and the institution and address the implication of mobile device use in teaching and learning.

Originality/value

The BYOD policy is a comprehensive solution that transcends other institutional policies and regulations to fully integrate mobile devices in medical education and healthcare delivery.

Details

Information and Learning Sciences, vol. 123 no. 3/4
Type: Research Article
ISSN: 2398-5348

Keywords

Article
Publication date: 22 October 2019

Zoe Chao, Steve Borrelli, Bikalpa Neupane and Joseph Fennewald

The purpose of this paper is to triangulate qualitative and quantitative data with existing data to inform on the function and user experience of a newly created the “News…

Abstract

Purpose

The purpose of this paper is to triangulate qualitative and quantitative data with existing data to inform on the function and user experience of a newly created the “News Library,” and, further, to inform on the viability of “bring your own device spaces” (BYOD) in meeting the computing needs of Penn State University Park students through a multi-dimensional study.

Design/methodology/approach

This study leverages several methodologies for data collection, including observation, survey, flip chart prompts, interviews and focus groups.

Findings

Findings suggest that the News Library accommodates users’ social needs. However, it does not accommodate their communal needs well. The majority of students at the Penn State University Park campus, own laptops and bring them to the library when they intend to study. Personal device usage is preferable to library-provided computers per a familiarity with their personal device, access to personal files and independence of workspace.

Research limitations/implications

As this is a case study, the findings are not generalizable. This study was conducted in one library, on one campus at a 24-campus institution with over 30 libraries.

Originality/value

The mixed-methods study provides multiple views into user behaviors and expectations. The authors propose guidelines for informing the design of BYOD spaces.

Details

Performance Measurement and Metrics, vol. 20 no. 3
Type: Research Article
ISSN: 1467-8047

Keywords

Article
Publication date: 13 November 2017

William P. Smith

This paper aims to (a) summarize the legal and ethical foundations of privacy with connections to workplace emails and text messages, (b) describe trends and challenges related to…

Abstract

Purpose

This paper aims to (a) summarize the legal and ethical foundations of privacy with connections to workplace emails and text messages, (b) describe trends and challenges related to “Bring Your Own Device” (BYOD), and (c) propose legal and nonlegal questions these trends will raise in the foreseeable future.

Design/methodology/approach

Based on a review of legal cases and scholarship related to workplace privacy, implications for BYOD practices are proposed.

Findings

Primarily due to property rights, employers in the USA have heretofore been granted wide latitude in monitoring employee communications. The BYOD trend has the potential to challenge this status quo.

Originality value

BYOD programs present discernable threats to employee privacy. Attention is also directed toward contributing elements such as wearable technology, cloud computing and company cultures.

Details

Journal of Information, Communication and Ethics in Society, vol. 15 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 6 June 2020

Hao Chen, Ying Li, Lirong Chen and Jin Yin

While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide…

1674

Abstract

Purpose

While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide to adopt BYOD practices when they encounter information security–related conflict.

Design/methodology/approach

Using survey data from 235 employees of Chinese enterprises and applying partial least squares based structural equation modeling (PLS-SEM), we test a series of hypotheses.

Findings

The results suggest that information security–related conflict elicits information security fatigue among employees. As their information security fatigue increases, employees become less likely to adopt BYOD practices. In addition, information security–related conflict has an indirect effect on employee's BYOD adoption through the full mediation of information security fatigue.

Practical implications

This study provides practical implications to adopt BYOD in the workplace through conflict management measures and emotion management strategies. Conflict management measures focused on the reducing of four facets of information security–related conflict, such as improve organization's privacy policies and help employees to build security habits. Emotion management strategies highlighted the solutions to reduce fatigue through easing conflict, such as involving employees in the development or update of information security policies to voice their demands of privacy and other rights.

Originality/value

Our study extends knowledge by focusing on the barriers to employees' BYOD adoption when considering information security in the workplace. Specifically, this study takes a conflict perspective and builds a multi-faceted construct of information security–related conflict. Our study also extends information security behavior research by revealing an emotion-based mediation effect, that of information security fatigue, to explore the mechanism underlying the influence of information security–related conflict on employee behavior.

Details

Journal of Enterprise Information Management, vol. 34 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Abstract

Details

Ethical AI Surveillance in the Workplace
Type: Book
ISBN: 978-1-83753-772-3

Article
Publication date: 21 November 2016

Janak Adhikari, Anuradha Mathrani and Chris Scogings

Over the past few years, technology-mediated learning has established itself as a valuable pathway towards learners’ academic and social development. However, within the adoption…

2740

Abstract

Purpose

Over the past few years, technology-mediated learning has established itself as a valuable pathway towards learners’ academic and social development. However, within the adoption stages of information and communications technology-enabled education, further questions have been raised in terms of equity of information literacy and learning outcomes. For the past three years, the authors have been working with one of the earliest secondary schools in New Zealand to introduce a Bring Your Own Device (BYOD) policy. In this paper, the authors present the findings of a longitudinal investigation into the BYOD project, which offers new insights into the digital divide issues in the context of evolving teaching and learning practices across three levels, namely, digital access, digital capability and digital outcome.

Design/methodology/approach

This study is an empirically grounded longitudinal case research conducted over a three-year period in one secondary school in New Zealand. This research has included a number of methods, including surveys, interviews and classroom observations, to gather qualitative data from various stakeholders (teachers, students and parents).

Findings

The findings from the study of the BYOD project inform of digital divide issues in the context of evolving teaching and learning practices across formal and informal spaces. The authors explored how the BYOD policy has influenced existing divides in the learning process across three levels, namely, digital access, digital capability and digital outcome. The result sheds light on key issues affecting the learning process to contextualise factors in the three-level digital divide for the BYOD technology adoption process in classroom settings.

Research limitations/implications

The study presents findings from an ongoing investigation of one secondary school, an early adopter of the BYOD policy. While the authors have followed the school for three years, more in-depth studies on how teaching and learning practices are evolving across formal and informal spaces will be further qualified in the next stages of data collection.

Originality/value

The study contributes to new knowledge on how digital inclusion can be supported beyond mere access to meaningful use of technology to reinforce student learning and their overall skill development.

Details

Interactive Technology and Smart Education, vol. 13 no. 4
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 25 March 2022

Melina Seedoyal Doargajudhur and Zuberia Hosanoo

As employees’ adoption of Bring Your Own Device (BYOD) has increased, so has research interest into the impact of BYOD on human resources outcomes. The present study aims at…

Abstract

Purpose

As employees’ adoption of Bring Your Own Device (BYOD) has increased, so has research interest into the impact of BYOD on human resources outcomes. The present study aims at understanding the relationship between BYOD and human resources outcomes.

Design/methodology/approach

The study employs the inductive data-driven content analysis approach to analyze the data collected through qualitative semi-structured interviews with a sample of 28 knowledge workers from different occupational sectors in Mauritius.

Findings

The results show the double-edged sword brought about by BYOD implementation. This trend is associated with perceived job performance, job satisfaction, organizational commitment and work motivation while also having an effect on work-life conflict and stress.

Practical implications

This study has implications for organizations that are concerned about formulating guidelines and policies in relation to workers' adoption of BYOD in the workplace. This trend permits employees to continue to communicate and work irrespective of new working conditions and social distancing since the Covid-19 pandemic has changed the way organizations operate around the globe.

Originality/value

Driven by the JD-R theory, themes and sub-themes were linked by the emerging relationships to present a conceptual framework to understanding employees' well-being since this is a pertinent research area for scholars and practitioners, as well as a topic of growing prominence for modern organizations.

Details

Information Technology & People, vol. 36 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 March 2013

Brianna Bernadette Buljung and Karen Gale Cooper

This paper aims to describe the technology petting zoo developed and hosted by the National Defense University Library. It highlights the poster presentation given at the Special…

Abstract

Purpose

This paper aims to describe the technology petting zoo developed and hosted by the National Defense University Library. It highlights the poster presentation given at the Special Libraries Association Conference held in Chicago on July 17, 2012. The project was voted best poster by attendees to the session.

Design/methodology/approach

Faced with a bring‐your‐own‐device (BYOD) environment, NDU librarians implemented a technology petting zoo to inform patrons about the availability of the library's resources on personal computing devices. They overcame technology and security issues inherent in the NDU computing environment, and used the event to connect patrons directly with the library's downloadable electronic resources.

Findings

The event was successful, with more than 80 patrons in attendance. Through the experience, staff acquired knowledge and experience to better serve patrons with inquiries about online and downloadable materials. Patrons and library staff learned to use personal computers and devices to access library materials, especially downloadable ebooks, remotely.

Practical implications

The petting zoo model changed the way NDU staff and patrons interact with downloadable resources. Successfully hosting a zoo event is especially difficult in federal settings, but the NDU team established the means of supporting off‐site access while observing regulations.

Originality/value

This project has value for government libraries because it leverages the increasingly popular BYOD environment to connect patrons to important resources. The paper also has broad applications in the corporate sector because many corporate libraries are also working to facilitate increasing access to library resources within stringent security guidelines.

Details

Library Hi Tech News, vol. 30 no. 1
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 21 September 2015

Aurelie Leclercq-Vandelannoitte

The purpose of this paper is to provide useful insights on “bring your own device” (BYOD) and IT consumerization, to help organizations understand how to address their…

2237

Abstract

Purpose

The purpose of this paper is to provide useful insights on “bring your own device” (BYOD) and IT consumerization, to help organizations understand how to address their consequences. For young, tech-savvy workers, using their own devices at work represents a right, rather than a privilege, leading them to initiate a growing, yet under-researched, drive toward IT consumerization. Some companies already deploy BYOD programs, allowing employees to use personal devices for work-related activities, but other managers remain hesitant of the implications of such programs.

Design/methodology/approach

To provide an overview of this growing phenomenon, this paper presents an in-depth analysis of existing literature and identifies organizational changes induced by this reversed adoption logic. A case study of Volvo reveals how one organization has coped successfully with this phenomenon.

Findings

These analyses shed more light on the stakes involved in BYOD and IT consumerization, as well as the changes they imply for organizations and IT departments.

Practical implications

Both BYOD and IT consumerization have deep and broad consequences for organizations, some of which are very positive, as long as the trends are well-managed and carefully addressed.

Originality/value

This paper covers a topic that has attracted scant attention in prior academic research, despite widely acknowledged concerns about security and reliability in practitioner studies. By going beyond a classic discourse focused solely on the security threats of BYOD, this paper investigates both business challenges and implications associated with a reversed adoption logic.

Details

Journal of Business Strategy, vol. 36 no. 5
Type: Research Article
ISSN: 0275-6668

Keywords

1 – 10 of 285