Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective

نویسندگان

  • Carlos Andres Agudelo
  • Rachelle Bosua
  • Atif Ahmad
  • Sean B. Maynard
چکیده

Knowledge sharing drives innovation and the opportunity to develop a sustainable competitive advantage. However, in the extant knowledge management and information security literature, leakage from sharing activities is neglected. The risk of knowledge leakage is exacerbated with the pervasive use of mobile devices and the adoption of BYOD (Bring Your Own Device). Thus, this research-in-progress paper examines the role of the behaviour of mobile workers that engage in accidental knowledge leakage through the use of BYOD. We use the Decomposed Theory of Planned Behaviour (DTPB) to explain the causes behind this phenomenon and how it negatively impacts organization’s competitive advantage. The contributions of this study are the following. First, it posits that the reasons of knowledge leakage by mobile workers through BYOD can be explained using DTPB. Second, the paper proposes a conceptual framework for research based on DTPB constructs whilst adding other variables such as BYOD and mobile device usage context. Finally, the conceptual study outlines the potential contributions and implications of this research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exploring the Antecedents of Work-to-life Conflict under the Context of Bring Your Own Device

Recently, the rapid adoption of smartphones and tablets among employees has forced organizations to proactively embrace the concept of Bring Your Own Device (BYOD). Allowing employees to bring their own mobile devices to the workplace has blurred the boundary between work and personal life and therefore created a stressful environment for employees when they are performing both work role and fa...

متن کامل

Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm

The growing trend of BYOD in the higher education institutions creates a new form of student learning pedagogy in which students are able to use the mobile devices for their academic purposes in anywhere and anytime. Security threat in the paradigm of BYOD creates a great opportunity for hackers or attackers to find new attacks or vulnerabilities that could possibly exploit the students’ mobile...

متن کامل

Understanding Bring Your Own Device (BYOD) and Employee Information Security Behaviors from A Work-Life Domain Perspective

Bring your own device (BYOD) is no longer the exception, it is the norm. Almost every employee today brings his or her own devices to the work environment. This has introduced new challenges to the current efforts to understand the mechanisms that can influence employee’s compliance behavior with regard to information security rules and policies. The key challenges relate to the creation of gra...

متن کامل

Towards a User-Friendly Security-Enhancing BYOD Solution

Bring Your Own Device (BYOD) is attracting considerable attention nowadays. In BYOD scenarios, enterprises wish to integrate their employees’ mobile devices in enterprise operations (e.g., reading emails, editing documents). This clearly raises serious security concerns since the mobile device in question is not under the control of the enterprise and is vulnerable to a wide range of security t...

متن کامل

Byod Implementation: Understanding Organizational Performance through a Gift Perspective

BYOD, which allows employees to bring their own mobile devices to work and connect into the corporation network, has been increasingly implemented by numerous organizations and corporations. Companies expect to save cost as well as increase productivity and employees’ morale through BYOD implementation. Hence, it is critical for companies to understand how BYOD affects organizational performanc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1606.01450  شماره 

صفحات  -

تاریخ انتشار 2016