Chountalas, Panos and Karagiorgos, Athanasios (2015): Bring your own device philosophy from the user's perspective: an empirical investigation. Published in: Proceedings of the 2nd HOBA International Conference , Vol. 1, (2015): pp. 1-12.
This is the latest version of this item.
Preview |
PDF
MPRA_paper_81800.pdf Download (140kB) | Preview |
Abstract
Bring Your Own Device (BYOD) is a new trend topic, the IT management has to deal with. It enables the employees to use their own smart phones, tablets or other IT devices for business purposes (i.e. to access corporate applications or manage corporate data). Today, there is a considerable increase in organizations adopting the BYOD philosophy and consequently the debate about the costs, gains and risks is in full swing. The purpose of this study is to provide insights into the use of the BYOD philosophy, in terms of its perceived benefits and threats. To attain our goal, an empirical investigation was conducted of 156 BYOD’s users. The results of this study indicate that BYOD is considered as a fairly innovative philosophy that brings some substantial benefits, such as an increase on both the mobility and flexibility at work. On the other hand, upon the use of BYOD, employees seem to be highly concerned about the privacy of their data. They are also afraid that they will be forced to work beyond their normal working hours. Since BYOD's use was typically perceived as non-complex, most employees stated that they were attracted by organizations that adopt the BYOD philosophy. This indicates that, as far as the employees are concerned, the BYOD's benefits outperform the threats.
Item Type: | MPRA Paper |
---|---|
Original Title: | Bring your own device philosophy from the user's perspective: an empirical investigation |
English Title: | Bring your own device philosophy from the user's perspective: an empirical investigation |
Language: | English |
Keywords: | Bring Your Own Device (BYOD); IT management; mobile marketing; innovativeness; flexibility at work; privacy of data. |
Subjects: | M - Business Administration and Business Economics ; Marketing ; Accounting ; Personnel Economics > M1 - Business Administration > M15 - IT Management |
Item ID: | 81800 |
Depositing User: | Dr Panos Chountalas |
Date Deposited: | 18 Oct 2017 13:16 |
Last Modified: | 26 Sep 2019 19:20 |
References: | Astani, M., Ready, K. and Tessema, M. (2013). BYOD issues and strategies in organizations. Issues in Information Systems 14(2): 195-201. Bell, M. (2013). Considerations When Implementing a BYOD Strategy. IS Practices for SME Success Series: 19-22. Citrix Systems Inc. (2012). Best practices to make BYOD simple and secure. White Paper, viewed 20 February 2015, <http://www.citrix.com/content/dam/citrix/en_us/documents/oth/byod-best-practices.pdf> Cognizant (2012). Making BYOD Work for Your Organization. White Paper, viewed 20 February 2015, <http://www.cognizant.com/InsightsWhitepapers/Making-BYOD-Work-for-Your-Organization.pdf> Crossler, R.E., Long, J.H., Loraas, T.M. and Trinkle, B.S. (2014). Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap. Journal of Information Systems 28(1): 209-226. de Waard, I.I. (2014). Using BYOD, mobile social media, apps, and sensors for meaningful mobile learning. Increasing Access: 113. French, A.M., Guo, C. and Shim, J.P. (2014). Current Status, Issues, and Future of Bring Your Own Device (BYOD). Communications of the Association for Information Systems 35(1): 10. Gali, M.A., Barayuga, V.J. and Yu, W.E. (2014). BYOD: Connectivity Option for Alaminos City Hall. International Conference on challenges in IT, Engineering and Technology (ICCIET’2014) July 17-18, 2014 Phuket (Thailand): 31-38. Gartner Inc. (2013). Gartner Says Worldwide PC, Tablet and Mobile Phone Combined Shipments to Reach 2.4 Billion Units in 2013. Press Release, viewed 20 February 2015, <http://www.gartner.com/newsroom/id/2408515> Ghosh, A., Gajar, P.K. and Rai, S. (2013). Bring your own device (BYOD): Security risks and mitigating strategies. Journal of Global Research in Computer Science 4(4): 62-70. Imazeki, J. (2014). Bring-Your-Own-Device: Turning Cell Phones into Forces for Good. The Journal of Economic Education 45(3): 240-250. Koh, E.B., Oh, J. and Im, C. (2014). A Study on Security Threats and Dynamic Access Control Technology for BYOD, Smart-work Environment. Proceedings of the International MultiConference of Engineers and Computer Scientists 2014: 12-14. Loose, M., Gewald, H. and Weeger, A. (2013). Determinants of Bring-Your-Own-Device (BYOD) Adoption from the Perspective of future Employees. HNU Working Paper Nr. 25, University of Applied Sciences, Neu-Ulm, Germany, viewed 20 February 2015, < http://publikationen2.hs-neu-ulm.de/HNU_WP25_Gewald_BYOD.pdf> Miller, K.W., Voas, J. and Hurlburt, G.F. (2012). BYOD: Security and privacy considerations. It Professional 5: 53-55. Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security 2012(12): 5-8. Oliver, R. (2012). Why the BYOD boom is changing how we think about business it. Engineering & Technology 7(10): 28. Osterman Research Inc. (2013). Putting IT Back in Control of BYOD. White Paper, viewed 20 February 2015, < http://www.slideshare.net/HyperOffice/byod-research-by-osterman> Romer, H. (2014). Best practices for BYOD security. Computer Fraud & Security 2014(1): 13-15. Scarfo, A. (2012). New security perspectives around BYOD. Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, IEEE Computer Society: 446-451. Seigneur, J. M., Kölndorfer, P., Busch, M. and Hochleitner, C. (2013). A survey of trust and risk metrics for a BYOD mobile worker world. SOTICS 2013, The Third International Conference on Social Eco-Informatics: 82-91. Singh, N. (2012). BYOD Genie Is Out Of the Bottle–“Devil Or Angel”. Journal Of Business Management & Social Sciences Research 1(3): 1-12. Song, M. and Lee, K. (2014). Proposal of MDM Management Framework for BYOD use of Large Companies. International Journal of Smart Home 8(1): 123-128. Thielens, J. (2013). Why APIs are central to a BYOD security strategy. Network Security 2013(8): 5-6. Thomson, G. (2012). BYOD: enabling the chaos. Network Security 2012(2): 5-8. Tokuyoshi, B. (2013). The security implications of BYOD. Network Security 2013(4): 12-13. Yang, T.A., Vlas, R., Yang, A. and Vlas, C. (2013). Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User Behavior. International Conference on Social Computing (SocialCom): 411-416. |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/81800 |
Available Versions of this Item
-
Bring your own device philosophy from the user's perspective: an empirical investigation. (deposited 06 Nov 2016 07:36)
- Bring your own device philosophy from the user's perspective: an empirical investigation. (deposited 18 Oct 2017 13:16) [Currently Displayed]