Bring Your Own Device (byod) Adoption

نویسندگان

  • James Lee
  • Robert E. Crossler
چکیده

Bring Your Own Device (BYOD) policies permit employees to use personal devices to access organizational information. Users gain convenience from the ability to work in geographically diverse locations, while organizations gain the benefit of increased productivity and reduced information technology expense. However, these symbiotic benefits come at a cost. Organizations’ security boundaries are now extended to include personal devices, which must be controlled to mitigate data exfiltration. This control comes in the form of monitoring employees’ personal devices, which infringe on their privacy. The monitoring mechanisms employed by organizations play a critical role in employee participation in a BYOD program. This study investigates the impact of monitoring mechanisms, privacy concerns, and job performance when evaluating whether to participate in a BYOD program. A factorial survey design was developed to test the hypotheses. Initial testing was performed and was used to modify the instrument for the main study currently in progress.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bring Your Own Device (BYOD): Current Status, Issues, and Future Directions

This panel discussion covers the current status, issues, and future direction of the use and adoption of Bring Your Own Device (BYOD). BYOD is widely used around the world. The invited panelists are five faculty members from the United States and Korea specializing in Information Systems. The covered topics include current use, real world cases, and adoption, pros and cons of BYOD adoption, iss...

متن کامل

Current Status, Issues, and Future of Bring Your Own Device (BYOD)

This paper summarizes the panel discussion that occurred on the 2013 Americas Conference on Information Systems to discuss the current status, issues, and future direction of the use and adoption of bring your own device (BYOD). BYOD is widely used around the world. The invited panelists comprised five faculty members from the United States and Korea specializing in information systems. The cov...

متن کامل

Barrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure

The adoption of Bring Your Own Device (BYOD) – also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC) – is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009,...

متن کامل

Exploring the Antecedents of Work-to-life Conflict under the Context of Bring Your Own Device

Recently, the rapid adoption of smartphones and tablets among employees has forced organizations to proactively embrace the concept of Bring Your Own Device (BYOD). Allowing employees to bring their own mobile devices to the workplace has blurred the boundary between work and personal life and therefore created a stressful environment for employees when they are performing both work role and fa...

متن کامل

A framework towards governing "Bring Your Own Device in SMMEs"

Information is a critically important asset that has been used for decades within organizations. Like any asset, there are threats to the information that impact processes such as; email retrieval and access to organizational system services. As a consequence of the threats, attention to the security of the information is important. Technology is utilized to secure information and the cost affi...

متن کامل

Bring-Your-Own-Device (BYOD): An Evaluation of Associated Risks to Corporate Information Security

This study evaluates the cyber-risks to Business Information Assets posed by the adoption of Bring-YourOwn-Device (BYOD) to the workplace. BYOD is an emerging trend where employees bring and use personal computing devices on the company’s network to access applications and sensitive data like emails, calendar and scheduling applications, documents, etc. Employees are captivated by BYOD because ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013