A Theoretical Foundation for Explaining and Predicting the Effectiveness of a Bring Your Own Device Program in Organizations

被引:0
|
作者
Akande A.O. [1 ]
Tran V.N. [1 ]
机构
[1] School of Business and Technology, Capella University, 225 S 6th St., Minneapolis, 55402, MN
关键词
BYOD; Information security; Information security program effectiveness; Policy awareness; Policy enforcement; Policy maintenance;
D O I
10.1007/s42979-022-01272-0
中图分类号
学科分类号
摘要
Bring Your Own Device (BYOD) adoption in organizations continues to grow in recent years, with the aim to improve both organization cost-saving, employee job satisfaction, and employee productivity. A BYOD environment has its unique set of organizational security opportunities and challenges. As a result, BYOD program deployment requires organizations to develop and rollout new information security measures and policies unique to this environment. Successful adoption of BYOD thus requires an effective BYOD information security program deployment. Our study seeks to develop a theoretical foundation for explaining and predicting the effectiveness of a BYOD program deployment. Specifically, we evaluate the applicability of Knapp and Ferrante’s Information Security Policy and Effectiveness (ISPE) model to explain and predict BYOD program deployment effectiveness. The relationships between the fundamental causal factors in the model, namely awareness, enforcement, and maintenance, and the program effectiveness, were evaluated using a sample of 119 BYOD users working in the financial sector in the United States. Our study supports the use of the ISPE model to assess the effectiveness of a BYOD information security program deployment. Security policy awareness, enforcement, and maintenance together account for 72% of the change in the BYOD security program effectiveness. © 2022, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [1] Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations
    Akande, Alexander O.
    Tran, Vu N.
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 55 - 65
  • [2] "Bring your own device" policies: Perspectives of both employees and organizations
    Gokce, Kevser Gulnur
    Dogerlioglu, Ozgur
    KNOWLEDGE MANAGEMENT & E-LEARNING-AN INTERNATIONAL JOURNAL, 2019, 11 (02) : 233 - 246
  • [3] Compliance with bring your own device security policies in organizations: A systematic literature review
    Palanisamy, Rathika
    Norman, Azah Anir
    Kiah, Miss Laiha Mat
    COMPUTERS & SECURITY, 2020, 98 (98)
  • [4] Bring Your Own Device: Security Technologies
    Ketel, Mohammed
    Shumate, Thomas
    IEEE SOUTHEASTCON 2015, 2015,
  • [5] Securing the "Bring Your Own Device" Paradigm
    Armando, Alessandro
    Costa, Gabriele
    Verderame, Luca
    Merlo, Alessio
    COMPUTER, 2014, 47 (06) : 48 - 56
  • [6] A framework towards governing "Bring Your Own Device in SMMEs"
    Fani, Noluvuyo
    von Solms, Rossouw
    Gerber, Mariana
    2016 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE 2016 ISSA CONFERENCE, 2016, : 1 - 8
  • [7] Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users
    Baillette, Pamela
    Barlette, Yves
    Leclercq-Vandelannoitte, Aurelie
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2018, 43 : 76 - 84
  • [8] Bring Your Own Device Security Issues and Challenges
    Wang, Yong
    Wei, Jinpeng
    Vangury, Karthik
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [9] Risk Assessment of BYOD: Bring Your Own Device
    Tanimoto, Shigeaki
    Yamada, Susumu
    Iwashita, Motoi
    Kobayashi, Toru
    Sato, Hiroyuki
    Kanai, Atsushi
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [10] BANDWIDTH MANAGEMENT IN THE ERA OF BRING YOUR OWN DEVICE
    Chitanana, Lockias
    Govender, Desmond W.
    ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES, 2015, 68 (01):