Search results

1 – 10 of 152
Article
Publication date: 6 June 2019

Hope Koch, Jie (Kevin) Yan and Patrick Curry

The purpose of this paper is to understand how the digital workplace, in particular employees using consumer tools at work (users), impacts how internal IT departments function…

Abstract

Purpose

The purpose of this paper is to understand how the digital workplace, in particular employees using consumer tools at work (users), impacts how internal IT departments function and their relationships with users they have historically supported.

Design/methodology/approach

An interpretive, longitudinal case study highlighting how one IT department coped with the conflicts using consumer tools at work creates a trend called IT consumerization.

Findings

Internal IT departments manage the conflicts IT consumerization poses through an ongoing process of conflict and conflict resolution. This impacts the IT department’s relationship with users along three dimensions: IT-control, user-self-sufficiency and IT-user partnerships.

Originality/value

While there is an ongoing debate about internal IT departments needing to change, the study shows how one IT department did change in response to IT consumerization. The authors develop a data-driven model grounded in theories that explains how IT departments cope with the conflicts IT consumerization poses.

Details

Information Technology & People, vol. 33 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 21 September 2015

Aurelie Leclercq-Vandelannoitte

The purpose of this paper is to provide useful insights on “bring your own device” (BYOD) and IT consumerization, to help organizations understand how to address their…

2237

Abstract

Purpose

The purpose of this paper is to provide useful insights on “bring your own device” (BYOD) and IT consumerization, to help organizations understand how to address their consequences. For young, tech-savvy workers, using their own devices at work represents a right, rather than a privilege, leading them to initiate a growing, yet under-researched, drive toward IT consumerization. Some companies already deploy BYOD programs, allowing employees to use personal devices for work-related activities, but other managers remain hesitant of the implications of such programs.

Design/methodology/approach

To provide an overview of this growing phenomenon, this paper presents an in-depth analysis of existing literature and identifies organizational changes induced by this reversed adoption logic. A case study of Volvo reveals how one organization has coped successfully with this phenomenon.

Findings

These analyses shed more light on the stakes involved in BYOD and IT consumerization, as well as the changes they imply for organizations and IT departments.

Practical implications

Both BYOD and IT consumerization have deep and broad consequences for organizations, some of which are very positive, as long as the trends are well-managed and carefully addressed.

Originality/value

This paper covers a topic that has attracted scant attention in prior academic research, despite widely acknowledged concerns about security and reliability in practitioner studies. By going beyond a classic discourse focused solely on the security threats of BYOD, this paper investigates both business challenges and implications associated with a reversed adoption logic.

Details

Journal of Business Strategy, vol. 36 no. 5
Type: Research Article
ISSN: 0275-6668

Keywords

Article
Publication date: 2 March 2015

Aurélie Leclercq - Vandelannoitte

In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating…

2876

Abstract

Purpose

In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating innovative, individual, IT-driven changes into their corporate practices. The paper aims to discuss these issues.

Design/methodology/approach

Four in-depth, longitudinal case studies, conducted between 2006 and 2010, feature 92 interviews and observations to ensure triangulation.

Findings

We identify three types of organizational reactions (induction, normalization, and regulation) that depend on specific dimensions and affect the nature of subsequent IT-based organizational change.

Research limitations/implications

Continued research into the consumerization of IT can explore how it affects organizations today and whether different effects might arise in other contexts and with different kinds of organizations.

Practical implications

Reversed IT adoption logics have deep consequences for organizations; companies could achieve great gains from them, if carefully considered and managed.

Originality/value

This article addresses a topic that has been analyzed only scarcely and rarely, namely, the consumerization of IT and the tactics organizations use to incorporate user-driven IT innovation. Although this article presents only a few cases, it constitutes an initial attempt to explore this research area theoretically and investigate the ways organizations can harness employees’ personal IT adoption logics to promote creative, IT-driven change in firms.

Details

Information Technology & People, vol. 28 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Content available
Article
Publication date: 3 August 2012

Hannah Tufts

426

Abstract

Details

Strategic HR Review, vol. 11 no. 5
Type: Research Article
ISSN: 1475-4398

Article
Publication date: 25 September 2023

Trang Nguyen

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…

Abstract

Purpose

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.

Design/methodology/approach

An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.

Findings

The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.

Originality/value

This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 5 June 2018

Praveen Choudhary, Monika Mital, Ashis Kumar Pani, Armando Papa and Francesca Vicentini

The purpose of this paper is to examine how organizational workers improve their perceived mobile user experience (UX) locus of control affected through organizational…

Abstract

Purpose

The purpose of this paper is to examine how organizational workers improve their perceived mobile user experience (UX) locus of control affected through organizational ambidexterity when using enterprise mobile systems (EMS). This study investigates the mediation role of business process customizability in the relationship between habitual use of EMS by individuals and organizational ambidexterity.

Design/methodology/approach

Over 150 possible respondent mobile phone users across 40 organizations in metropolitan National Capital Region (NCR) of Delhi with approximately were given the questionnaire. The data of a total of 121 NCR valid respondents aged between 22 and 49, after scrutinizing all collected questionnaires and removing those that had too many missing values or had the same answer to all questions, were used for analysis. The respondents were sampled from a research panel directory of a set of firms of the research firm hired for this survey.

Findings

The study finds complete mediation between the habitual use of EMS and organizational ambidexterity. Importantly, the empirical findings provide the research community with a deeper understanding of how EMS usage impacts organizational ambidexterity and individual’s UX locus of control.

Originality/value

It draws some newer areas of research with respect to interactions between enterprise mobile systems, business process customization due to enterprise mobile systems and organizational ambidexterity, which were hitherto unexplored.

Details

Business Process Management Journal, vol. 24 no. 5
Type: Research Article
ISSN: 1463-7154

Keywords

Book part
Publication date: 19 September 2012

Terri L. Griffith

Purpose – The technologies teams use in organizations have dramatically changed in the 11 years since the 2000 Volume, Research on Managing Groups and Teams: Technology. This is…

Abstract

Purpose – The technologies teams use in organizations have dramatically changed in the 11 years since the 2000 Volume, Research on Managing Groups and Teams: Technology. This is an update focusing on new research and perspectives.

Approach – I recall where we left off in 2000 and then present a plea for changing our research approach to one that focuses on actionable research more aligned on how teams design their work than the effects we see when they do. I review a variety of literatures relevant to teams and technology and then suggest what the next 10 years may bring.

Findings – The scholarship on teams, technology, and teams and technology has blossomed, though not evenly. We are only beginning to see actionable research related to teams and technology.

Practical implications – The pace of organizationally relevant technology change has outstripped our ability to provide high-quality research in a timely manner if we maintain our current practices of studying individual or even interactions of effects as they exist in organizations. Our research will be more helpful if we shift our focus to how team members design their work.

Originality – I make two direct and dramatic requests of my colleagues. First, that they become more precise in their presentation of or at least specify the technological settings used in their research. Second, that they shift to actionable research that explicitly considers team, technology, and the processes through which team members design their work.

Details

Looking Back, Moving Forward: A Review of Group and Team-Based Research
Type: Book
ISBN: 978-1-78190-030-7

Keywords

Article
Publication date: 13 April 2012

This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting‐edge research and case studies.

1261

Abstract

Purpose

This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting‐edge research and case studies.

Design/methodology/approach

This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context.

Findings

Science fiction writers like to paint dysfunctional worlds of the future, with dark forces coercing a weakened human race. Often these dark forces use computers, or are computers themselves. Think Hal in 2001, the internet itself in The Matrix, and the cyborgs in the Terminator films. It is obviously a stretch to imagine any of these scenarios becoming reality any time soon, if at all, however the increasing power and influence technology and technology companies have over corporate success and failure has led some to argue that a dystopian future is not too far away for those who fail to understand the extent of their power.

Practical implications

The paper provides strategic insights and practical thinking that have influenced some of the world's leading organizations.

Originality/value

The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy‐to digest format.

Details

Strategic Direction, vol. 28 no. 6
Type: Research Article
ISSN: 0258-0543

Keywords

Article
Publication date: 6 June 2020

Hao Chen, Ying Li, Lirong Chen and Jin Yin

While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide…

1674

Abstract

Purpose

While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide to adopt BYOD practices when they encounter information security–related conflict.

Design/methodology/approach

Using survey data from 235 employees of Chinese enterprises and applying partial least squares based structural equation modeling (PLS-SEM), we test a series of hypotheses.

Findings

The results suggest that information security–related conflict elicits information security fatigue among employees. As their information security fatigue increases, employees become less likely to adopt BYOD practices. In addition, information security–related conflict has an indirect effect on employee's BYOD adoption through the full mediation of information security fatigue.

Practical implications

This study provides practical implications to adopt BYOD in the workplace through conflict management measures and emotion management strategies. Conflict management measures focused on the reducing of four facets of information security–related conflict, such as improve organization's privacy policies and help employees to build security habits. Emotion management strategies highlighted the solutions to reduce fatigue through easing conflict, such as involving employees in the development or update of information security policies to voice their demands of privacy and other rights.

Originality/value

Our study extends knowledge by focusing on the barriers to employees' BYOD adoption when considering information security in the workplace. Specifically, this study takes a conflict perspective and builds a multi-faceted construct of information security–related conflict. Our study also extends information security behavior research by revealing an emotion-based mediation effect, that of information security fatigue, to explore the mechanism underlying the influence of information security–related conflict on employee behavior.

Details

Journal of Enterprise Information Management, vol. 34 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 8 July 2014

Mario Silic and Andrea Back

– The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.

7797

Abstract

Purpose

The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.

Design/methodology/approach

The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences.

Findings

The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They also identified existing knowledge gaps and how the existing themes are studied in academia.

Research limitations/implications

The literature review did not include some dedicated security journals (i.e. Cryptography).

Practical implications

The study reveals future directions and trend that the academia should consider.

Originality/value

Information security is top concern for organizations, and this research analyzed how academia dealt with the topic since 1977. Also, the authors suggest future directions for research suggesting new research streams.

Details

Information Management & Computer Security, vol. 22 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of 152