976
Views
33
CrossRef citations to date
0
Altmetric
Articles

Implications of Monitoring Mechanisms on Bring Your Own Device Adoption

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (7)

Rathika Palanisamy, Azah Anir Norman & Miss Laiha Mat Kiah. (2023) Employees’ BYOD Security Policy Compliance in the Public Sector. Journal of Computer Information Systems 0:0, pages 1-16.
Read now
Feng Xu, Carol Hsu, Xin (Robert) Luo & Merrill Warkentin. (2022) Reactions to Abusive Supervision: Neutralization and IS Misuse. Journal of Computer Information Systems 62:3, pages 632-641.
Read now
Rathika Palanisamy, Azah Anir Norman & Laiha Mat Kiah. (2021) BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts. Journal of Organizational Computing and Electronic Commerce 31:4, pages 320-342.
Read now
Saleh Alharthi, Yair Levy, Ling Wang & Inkyoung Hur. (2021) Employees’ Mobile Cyberslacking and Their Commitment to the Organization. Journal of Computer Information Systems 61:2, pages 141-153.
Read now
Xiang Guo & Brian Reithel. (2020) Information-Processing Support Index: A New Perspective on IT Usage. Journal of Computer Information Systems 60:6, pages 541-554.
Read now
Paul Benjamin Lowry, Gregory D. Moody & Sutirtha Chatterjee. (2017) Using IT Design to Prevent Cyberbullying. Journal of Management Information Systems 34:3, pages 863-901.
Read now

Articles from other publishers (26)

Rajarshi Majumder, Daria Plotkina & Landisoa Rabeson. (2023) Environmentally Responsible Values, Attitudes and Behaviours of Indian Consumers. Environmental Values 32:4, pages 433-468.
Crossref
Diane J. Janvrin & Tawei Wang. (2022) Linking Cybersecurity and Accounting: An Event, Impact, Response Framework. Accounting Horizons 36:4, pages 67-112.
Crossref
Rulyanti Susi Wardhani, Kamal Kant, Anusha Sreeram, Monica Gupta, Erwandy Erwandy & Pranjal Kumar Bora. (2022) Impact of Machine Learning on the Productivity of Employees in Workplace. Impact of Machine Learning on the Productivity of Employees in Workplace.
Zauwiyah Ahmad, Thian Song Ong, Yen Wen Gan, Tze Hui Liew & Mariati Norhashim. (2022) Predictors of Employees’ Mobile Security Practice: An Analysis of Personal and Work-Related Variables. Applied Sciences 12:9, pages 4198.
Crossref
Kelly M. Torres & Aubrey Statti. 2022. Research Anthology on Human Resource Practices for the Modern Workforce. Research Anthology on Human Resource Practices for the Modern Workforce 588 605 .
Botong Xue, Feng Xu, Xin Luo & Merrill Warkentin. (2021) Ethical leadership and employee information security policy (ISP) violation: exploring dual-mediation paths. Organizational Cybersecurity Journal: Practice, Process and People 1:1, pages 5-23.
Crossref
Arvid O. I. Hoffmann & Daria Plotkina. (2021) Let your past define your future? How recalling successful financial experiences can increase beliefs of self‐efficacy in financial planning. Journal of Consumer Affairs 55:3, pages 847-871.
Crossref
Hao Chen, Ying Li, Lirong Chen & Jin Yin. (2020) Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue. Journal of Enterprise Information Management 34:3, pages 770-792.
Crossref
Paméla Baillette & Yves Barlette. 2021. Research Anthology on Securing Mobile Technologies and Applications. Research Anthology on Securing Mobile Technologies and Applications 527 558 .
Kelly M. Torres & Aubrey Statti. 2021. Designing and Implementing HR Management Systems in Family Businesses. Designing and Implementing HR Management Systems in Family Businesses 83 100 .
Anam Nusrat, Yong He, Adeel Luqman, Abdul Waheed & Amandeep Dhir. (2021) Enterprise social media and cyber-slacking: A Kahn’s model perspective. Information & Management 58:1, pages 103405.
Crossref
Nirmalee I. Raddatz, Thomas Stafford, Craig Van Slyke & Merrill Warkentin. (2020) Grassroots Adoption of Cloud-Based Storage Solutions. Journal of Information Systems 34:3, pages 213-232.
Crossref
Thomas A. Dotter & Vess L. Johnson. (2020) Interactive visual aid adoption within pharmaceutical sales organizations. Computers in Human Behavior Reports 2, pages 100017.
Crossref
K.S. Nivedhitha & A.K. Sheik Manzoor. (2020) Get employees talking through enterprise social media! Reduce cyberslacking: a moderated mediation model. Internet Research 30:4, pages 1167-1202.
Crossref
Paméla Baillette & Yves Barlette. (2020) Coping Strategies and Paradoxes Related to BYOD Information Security Threats in France. Journal of Global Information Management 28:2, pages 1-28.
Crossref
Leigh A. Mutchler & Merrill Warkentin. (2020) Experience Matters. Journal of Database Management 31:2, pages 1-20.
Crossref
Mohmmad M. Dmour, Hanif S. Bakar & Mohammad R. Hamzah. (2020) Antecedent, Consequences, and Policies View of Cyberloafing among the Employees. Journal of Physics: Conference Series 1529:2, pages 022016.
Crossref
Savvas Papagiannidis & Davit Marikyan. (2020) Smart offices: A productivity and well-being perspective. International Journal of Information Management 51, pages 102027.
Crossref
Jeffrey D. Wall & Merrill Warkentin. (2019) Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics. Information & Management 56:8, pages 103157.
Crossref
Anthony Duke Giwah, Ling Wang, Yair Levy & Inkyoung Hur. (2019) Empirical assessment of mobile device users’ information security behavior towards data breach. Journal of Intellectual Capital 21:2, pages 215-233.
Crossref
Muriel Mignerat, Laurent Mirabeau & Karine Proulx. (2019) Comportements stratégiques autonomes et pressions institutionnelles : le cas du BYOD. Systèmes d'information & management Volume 24:2, pages 7-46.
Crossref
Pal Feher-Polgar & Pal Michelberger. (2019) The Information Security Risks of the BYOD, From Theoretical Point of View. The Information Security Risks of the BYOD, From Theoretical Point of View.
Hope Koch, Jie (Kevin) Yan & Patrick Curry. (2019) Consumerization-conflict resolution and changing IT-user relationships. Information Technology & People 33:1, pages 251-271.
Crossref
Azucena Quispe. (2018) Impact of Excessive Access Permissions and Insider Threat Opportunity in the Financial Industry. International Journal of Strategic Information Technology and Applications 9:3, pages 32-58.
Crossref
Anthony Duke Giwah. (2018) User Information Security Behavior Towards Data Breach in Bring Your Own Device (BYOD) Enabled Organizations - Leveraging Protection Motivation Theory. User Information Security Behavior Towards Data Breach in Bring Your Own Device (BYOD) Enabled Organizations - Leveraging Protection Motivation Theory.
Marco Marabelli, Sue Newell & Robert David Galliers. (2018) Social Media Affordances and Constraints: Design, Use and Implications for Enterprises. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.