Search results
1 – 10 of 152Hope Koch, Jie (Kevin) Yan and Patrick Curry
The purpose of this paper is to understand how the digital workplace, in particular employees using consumer tools at work (users), impacts how internal IT departments function…
Abstract
Purpose
The purpose of this paper is to understand how the digital workplace, in particular employees using consumer tools at work (users), impacts how internal IT departments function and their relationships with users they have historically supported.
Design/methodology/approach
An interpretive, longitudinal case study highlighting how one IT department coped with the conflicts using consumer tools at work creates a trend called IT consumerization.
Findings
Internal IT departments manage the conflicts IT consumerization poses through an ongoing process of conflict and conflict resolution. This impacts the IT department’s relationship with users along three dimensions: IT-control, user-self-sufficiency and IT-user partnerships.
Originality/value
While there is an ongoing debate about internal IT departments needing to change, the study shows how one IT department did change in response to IT consumerization. The authors develop a data-driven model grounded in theories that explains how IT departments cope with the conflicts IT consumerization poses.
Details
Keywords
Aurelie Leclercq-Vandelannoitte
The purpose of this paper is to provide useful insights on “bring your own device” (BYOD) and IT consumerization, to help organizations understand how to address their…
Abstract
Purpose
The purpose of this paper is to provide useful insights on “bring your own device” (BYOD) and IT consumerization, to help organizations understand how to address their consequences. For young, tech-savvy workers, using their own devices at work represents a right, rather than a privilege, leading them to initiate a growing, yet under-researched, drive toward IT consumerization. Some companies already deploy BYOD programs, allowing employees to use personal devices for work-related activities, but other managers remain hesitant of the implications of such programs.
Design/methodology/approach
To provide an overview of this growing phenomenon, this paper presents an in-depth analysis of existing literature and identifies organizational changes induced by this reversed adoption logic. A case study of Volvo reveals how one organization has coped successfully with this phenomenon.
Findings
These analyses shed more light on the stakes involved in BYOD and IT consumerization, as well as the changes they imply for organizations and IT departments.
Practical implications
Both BYOD and IT consumerization have deep and broad consequences for organizations, some of which are very positive, as long as the trends are well-managed and carefully addressed.
Originality/value
This paper covers a topic that has attracted scant attention in prior academic research, despite widely acknowledged concerns about security and reliability in practitioner studies. By going beyond a classic discourse focused solely on the security threats of BYOD, this paper investigates both business challenges and implications associated with a reversed adoption logic.
Details
Keywords
Aurélie Leclercq - Vandelannoitte
In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating…
Abstract
Purpose
In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating innovative, individual, IT-driven changes into their corporate practices. The paper aims to discuss these issues.
Design/methodology/approach
Four in-depth, longitudinal case studies, conducted between 2006 and 2010, feature 92 interviews and observations to ensure triangulation.
Findings
We identify three types of organizational reactions (induction, normalization, and regulation) that depend on specific dimensions and affect the nature of subsequent IT-based organizational change.
Research limitations/implications
Continued research into the consumerization of IT can explore how it affects organizations today and whether different effects might arise in other contexts and with different kinds of organizations.
Practical implications
Reversed IT adoption logics have deep consequences for organizations; companies could achieve great gains from them, if carefully considered and managed.
Originality/value
This article addresses a topic that has been analyzed only scarcely and rarely, namely, the consumerization of IT and the tactics organizations use to incorporate user-driven IT innovation. Although this article presents only a few cases, it constitutes an initial attempt to explore this research area theoretically and investigate the ways organizations can harness employees’ personal IT adoption logics to promote creative, IT-driven change in firms.
Details
Keywords
Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…
Abstract
Purpose
Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.
Design/methodology/approach
An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.
Findings
The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.
Originality/value
This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.
Details
Keywords
Praveen Choudhary, Monika Mital, Ashis Kumar Pani, Armando Papa and Francesca Vicentini
The purpose of this paper is to examine how organizational workers improve their perceived mobile user experience (UX) locus of control affected through organizational…
Abstract
Purpose
The purpose of this paper is to examine how organizational workers improve their perceived mobile user experience (UX) locus of control affected through organizational ambidexterity when using enterprise mobile systems (EMS). This study investigates the mediation role of business process customizability in the relationship between habitual use of EMS by individuals and organizational ambidexterity.
Design/methodology/approach
Over 150 possible respondent mobile phone users across 40 organizations in metropolitan National Capital Region (NCR) of Delhi with approximately were given the questionnaire. The data of a total of 121 NCR valid respondents aged between 22 and 49, after scrutinizing all collected questionnaires and removing those that had too many missing values or had the same answer to all questions, were used for analysis. The respondents were sampled from a research panel directory of a set of firms of the research firm hired for this survey.
Findings
The study finds complete mediation between the habitual use of EMS and organizational ambidexterity. Importantly, the empirical findings provide the research community with a deeper understanding of how EMS usage impacts organizational ambidexterity and individual’s UX locus of control.
Originality/value
It draws some newer areas of research with respect to interactions between enterprise mobile systems, business process customization due to enterprise mobile systems and organizational ambidexterity, which were hitherto unexplored.
Details
Keywords
Purpose – The technologies teams use in organizations have dramatically changed in the 11 years since the 2000 Volume, Research on Managing Groups and Teams: Technology. This is…
Abstract
Purpose – The technologies teams use in organizations have dramatically changed in the 11 years since the 2000 Volume, Research on Managing Groups and Teams: Technology. This is an update focusing on new research and perspectives.
Approach – I recall where we left off in 2000 and then present a plea for changing our research approach to one that focuses on actionable research more aligned on how teams design their work than the effects we see when they do. I review a variety of literatures relevant to teams and technology and then suggest what the next 10 years may bring.
Findings – The scholarship on teams, technology, and teams and technology has blossomed, though not evenly. We are only beginning to see actionable research related to teams and technology.
Practical implications – The pace of organizationally relevant technology change has outstripped our ability to provide high-quality research in a timely manner if we maintain our current practices of studying individual or even interactions of effects as they exist in organizations. Our research will be more helpful if we shift our focus to how team members design their work.
Originality – I make two direct and dramatic requests of my colleagues. First, that they become more precise in their presentation of or at least specify the technological settings used in their research. Second, that they shift to actionable research that explicitly considers team, technology, and the processes through which team members design their work.
Details
Keywords
This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting‐edge research and case studies.
Abstract
Purpose
This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting‐edge research and case studies.
Design/methodology/approach
This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context.
Findings
Science fiction writers like to paint dysfunctional worlds of the future, with dark forces coercing a weakened human race. Often these dark forces use computers, or are computers themselves. Think Hal in 2001, the internet itself in The Matrix, and the cyborgs in the Terminator films. It is obviously a stretch to imagine any of these scenarios becoming reality any time soon, if at all, however the increasing power and influence technology and technology companies have over corporate success and failure has led some to argue that a dystopian future is not too far away for those who fail to understand the extent of their power.
Practical implications
The paper provides strategic insights and practical thinking that have influenced some of the world's leading organizations.
Originality/value
The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy‐to digest format.
Details
Keywords
Hao Chen, Ying Li, Lirong Chen and Jin Yin
While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide…
Abstract
Purpose
While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide to adopt BYOD practices when they encounter information security–related conflict.
Design/methodology/approach
Using survey data from 235 employees of Chinese enterprises and applying partial least squares based structural equation modeling (PLS-SEM), we test a series of hypotheses.
Findings
The results suggest that information security–related conflict elicits information security fatigue among employees. As their information security fatigue increases, employees become less likely to adopt BYOD practices. In addition, information security–related conflict has an indirect effect on employee's BYOD adoption through the full mediation of information security fatigue.
Practical implications
This study provides practical implications to adopt BYOD in the workplace through conflict management measures and emotion management strategies. Conflict management measures focused on the reducing of four facets of information security–related conflict, such as improve organization's privacy policies and help employees to build security habits. Emotion management strategies highlighted the solutions to reduce fatigue through easing conflict, such as involving employees in the development or update of information security policies to voice their demands of privacy and other rights.
Originality/value
Our study extends knowledge by focusing on the barriers to employees' BYOD adoption when considering information security in the workplace. Specifically, this study takes a conflict perspective and builds a multi-faceted construct of information security–related conflict. Our study also extends information security behavior research by revealing an emotion-based mediation effect, that of information security fatigue, to explore the mechanism underlying the influence of information security–related conflict on employee behavior.
Details
Keywords
– The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.
Abstract
Purpose
The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.
Design/methodology/approach
The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences.
Findings
The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They also identified existing knowledge gaps and how the existing themes are studied in academia.
Research limitations/implications
The literature review did not include some dedicated security journals (i.e. Cryptography).
Practical implications
The study reveals future directions and trend that the academia should consider.
Originality/value
Information security is top concern for organizations, and this research analyzed how academia dealt with the topic since 1977. Also, the authors suggest future directions for research suggesting new research streams.
Details