A Theoretical Foundation for Explaining and Predicting the Effectiveness of a Bring Your Own Device Program in Organizations

被引:0
|
作者
Akande A.O. [1 ]
Tran V.N. [1 ]
机构
[1] School of Business and Technology, Capella University, 225 S 6th St., Minneapolis, 55402, MN
关键词
BYOD; Information security; Information security program effectiveness; Policy awareness; Policy enforcement; Policy maintenance;
D O I
10.1007/s42979-022-01272-0
中图分类号
学科分类号
摘要
Bring Your Own Device (BYOD) adoption in organizations continues to grow in recent years, with the aim to improve both organization cost-saving, employee job satisfaction, and employee productivity. A BYOD environment has its unique set of organizational security opportunities and challenges. As a result, BYOD program deployment requires organizations to develop and rollout new information security measures and policies unique to this environment. Successful adoption of BYOD thus requires an effective BYOD information security program deployment. Our study seeks to develop a theoretical foundation for explaining and predicting the effectiveness of a BYOD program deployment. Specifically, we evaluate the applicability of Knapp and Ferrante’s Information Security Policy and Effectiveness (ISPE) model to explain and predict BYOD program deployment effectiveness. The relationships between the fundamental causal factors in the model, namely awareness, enforcement, and maintenance, and the program effectiveness, were evaluated using a sample of 119 BYOD users working in the financial sector in the United States. Our study supports the use of the ISPE model to assess the effectiveness of a BYOD information security program deployment. Security policy awareness, enforcement, and maintenance together account for 72% of the change in the BYOD security program effectiveness. © 2022, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [21] Implications of Monitoring Mechanisms on Bring Your Own Device Adoption
    Lee, James, Jr.
    Warkentin, Merrill
    Crossler, Robert E.
    Otondo, Robert F.
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2017, 57 (04) : 309 - 318
  • [22] MOBILE LEARNING AND BRING YOUR OWN DEVICE IN CHEMISTRY TEACHING
    Nichele, Aline Grunewald
    Schlemmer, Eliane
    INTED2015: 9TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2015, : 3964 - 3969
  • [23] THE "BRING YOUR OWN DEVICE" CONUNDRUM FOR ORGANIZATIONS AND INVESTIGATORS: AN EXAMINATION OF THE POLICY AND LEGAL CONCERNS IN LIGHT OF INVESTIGATORY CHALLENGES
    Utter, Carla J.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2015, 10 (02) : 55 - 71
  • [24] Bring Your Own Device: Parental Guidance (PG) Suggested
    Kiger, Derick
    Herro, Dani
    TECHTRENDS, 2015, 59 (05) : 51 - 61
  • [25] Considerations for Conducting Bring Your Own "Device" (BYOD) Clinical Studies
    Demanuele C.
    Lokker C.
    Jhaveri K.
    Georgiev P.
    Sezgin E.
    Geoghegan C.
    Zou K.H.
    Izmailova E.
    McCarthy M.
    Digital Biomarkers, 2022, 6 (02) : 47 - 60
  • [26] Role of Perceived Value in Acceptance of "Bring Your Own Device" Policy
    Zhang, Lixuan Zhang
    Mouritsen, Matthew
    Miller, Jeffrey R.
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2019, 31 (02) : 65 - 82
  • [27] A Qualitative Study on the Adoption of Bring Your Own Device (BYOD) Practice
    Arpaci, Ibrahim
    INTERNATIONAL JOURNAL OF E-ADOPTION, 2015, 7 (02) : 1 - 14
  • [28] The Implementation of Bring Your Own Device (BYOD) in Primary [Elementary] Schools
    McLean, Karen J.
    FRONTIERS IN PSYCHOLOGY, 2016, 7
  • [29] Legal Issues in Secure Implementation of Bring Your Own Device (BYOD)
    Dhingra, Madhavi
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 179 - 184
  • [30] Current Status, Issues, and Future of Bring Your Own Device (BYOD)
    French, Aaron M.
    Guo, Chengqi
    Shim, J. P.
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 35 : 191 - 197