513
Views
38
CrossRef citations to date
0
Altmetric
Original Articles

It Consumerization: Byod-Program Acceptance and its Impact on Employer Attractiveness

, &

References

  • Amberg, M., Hirschmeier, M., and Wehrmann, J. “The Compass Acceptance Model for the analysis and evaluation of mobile services,” International Journal of Mobile Communications (2:3), 2004, p. 248–259.
  • Arruda-Filho, E.J.M., Cabusas, J.A., and Dholakia, N. “Social behavior and brand devotion among iPhone innovators,” International Journal of Information Management (30:6), 2010, p. 475–480.
  • Barclay, D., Higgins, C., and Thompson, R. “The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use as an illustration,” Technology studies (2:2), 1995, p. 285–309.
  • Baskerville, R. “Individual Information Systems as a Research Arena,” European Journal of Information Systems (20:3), 2011, p. 251–254.
  • Bauer, R.A. Consumer Behavior as Risk Taking, in Risk Taking and Information Handling in Consumer Behavior. D. R. Cox, Editor, 1967, Harvard University Press, Cambridge, USA, p. 23–33.
  • Beimborn, D. and Palitza, M. “Enterprise App Stores for Mobile Applications - Development of a Benefits Framework,” Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago: 2013.
  • Bhattacherjee, A. and Hikmet, N. “Physicians' Resistance toward Healthcare Information Technology: A Theoretical Model and Empirical Test,” European Journal of Information Systems (162007, p. 725–737.
  • Bocker, J. and Klein, M. ICT-Innovationen erfolgreich nutzen: Wie Sie Wettbewerbsvorteile für Ihr Unternehmen sichern, Springer Gabler, Wiesbaden, 2012.
  • Brown, T.A. Confirmatory factor analysis for applied research, Guilford Press, 2006.
  • BSI. “White Paper on Consumerisation and BYOD,” Federal Office for Information Security, Editor, 2013, Bonn.
  • Carlsson, C, Carlsson, J., Hyvonen, K., Puhakainen, J., and Waiden, P. “Adoption of Mobile Devices/Services - Searching for Answers with the UTAUT,” Proceedings of the 39th Hawaii International Conference on System Sciences, Hawaii: 2006.
  • Carter, M., Thatcher, J.B., Applefleld, C., and McAlpine, J. “What Cell Phones Mean in Young People's Daily Lives and Social Interactions,” Proceedings of the Southern Association for Information Systems Conference, Atlanta, GA: 2011, p. 29–33.
  • Cenfetelli, R. “Inhibitors and Enablers as Dual Factor Concepts in Technology Usage,” Journal of the Association for Information Systems (5:11), 2004, p. 472–492.
  • Chen, C.-D., Fan, Y.-W., and Farn, C.-K. “Predicting electronic toll collection service adoption: An integration of the technology acceptance model and the theory of planned behavior,” Transportation Research Part C: Emerging Technologies (15:5), 2007, p. 300–311.
  • Chin, W.W. “Commentary: Issues and opinion on structural equation modeling,” MIS Quarterly 1998, p. vii–xvi.
  • Chin, W.W. How to write up and report PLS analyses, in Handbook of partial least squares, 2010, Springer, Wiesbaden, p. 655–690.
  • Chin, W.W. The Partial Least Squares Approach for Structural Equation Modeling, in Modern Methods for Business Research. G.A. Marcoulides, Editor, 1998, Erlbaum, Hillsdale, NJ.
  • Cohen, J. Statistical Power Analysis for the Behavioral Sciences, Routledge Academic, 1988.
  • Compeau, D., Higgins, C.A., and Huff, S. “Social cognitive theory and individual reactions to computing technology: A longitudinal study,” MIS Quarterly (23:2), 1999, p. 145–158.
  • Compeau, D.R. and Higgins, C.A. “Application of Social Cognitive Theory to Training for Computer Skills,” Information Systems Research (6:2), 1995, p. 118–143.
  • Davis, F.D. “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology,” MIS Quarterly (13:3), 1989.
  • Dernbecher, S., Beck, R., and Weber, S. “Switch to Your Own to Work with the Known: An Empirical Study on Consumerization of IT,” Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago: 2013.
  • Eckhardt, A., Laumer, S., and Weitzel, T. “Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption,” Journal of Information Technology (24:1), 2009, p. 11–24.
  • Featherman, M. “Extending the technology acceptance model by inclusion of perceived risk,” Proceedings of the Seventh Americas Conference on Information Systems, Boston, MA: 2001.
  • Fenn, J. and LeHong, H. “Hype Cycle for Emerging Technologies,” 2011, Gartner.
  • Fishbein, M. and Ajzen, I. Belief, attitude, intention, and behavior: an introduction to theory and research, Addison-Wesley Pub. Co., Reading, Mass., 1975.
  • Friedman, J. and Hoffman, D.V. “Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses,” Information-Knowledge-Systems Management (7:1,2), 2008, p. 159–180.
  • Gajar, PK., Ghosh, A., and Rai, S. “Bring Your Own Device (BYOD): Security Risks and Mitigating Strategies,” Journal of Global Research in Computer Science (4:4), 2013, p. 62–70.
  • Gefen, D., Rigdon, E.E., and Straub, D. “An Update and Extension to SEM Guidelines for Administrative and Social Science Research,” MIS Quarterly (35:2), 2011, p. iii–xiv.
  • Gefen, D. and Straub, D. “A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example,” Communications of the Association for Information Systems (162005.
  • Gefen, D., Straub, D.W., and Boudreau, M.-C. “Structural equation modeling and regression: Guidelines for research practice,” Communications of the Association for Information Systems (16:5), 2000, p. 91–109.
  • Geisser, S. “The predictive sample reuse method with applications,” Journal of the American Statistical Association (70:350), 1975, p. 320–328.
  • Györy, A., Cleven, A., Falk, U., and Brenner, W. “Exploring the Shadows: IT Governance Approaches to User-Driven Innovation,” Proceedings of the 20th European Conference on Information Systems, Barcelona: 2012.
  • Harris, C. “Mobile Consumerization Trends & Perceptions - IT Executive and CEO Survey,” 2012, Decisive Analytics, LLC.
  • Harris, J., Ives, B., and Junglas, I. “IT Consumerization: When Gadgets Turn into Enterprise IT Tools,” MIS Quarterly Executive (11:3), 2013, p. 99–112.
  • Harris, J.G. and Junglas, I. “The Genie Is Out of the Bottle: Managing the Infiltration of Consumer IT Into the Workforce,” 2011, Accenture Institute for High Performance.
  • Harris, M.A., Patten, K., and Regan, E. “The Need for BYOD Mobile Device Security Awareness and Training,” Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago: 2013.
  • Holtsnider, B. and Jaffe, B.D. LT Manager's Handbook: Getting Your New Job Done, Morgan Kaufmann, Waltham, MA, 2012.
  • Hulland, J. “Use of Partial Least Squares (PLS) in Strategic Management Research: A Review of Four Recent Studies,” Strategic Management Journal (20:2), 1999, p. 195–204.
  • Hung, S.-Y and Chang, C.-M. “User Acceptance of WAP Services: Test of Competing Theories,” Computer Standards & Interfaces (27:4), 2005, p. 359–370.
  • Ingalsbe, J.A., Shoemaker, D., and Mead, N.R. “Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise – an overview of considerations,” Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit: 2011.
  • Johnson, N. and Joshi, K. “The Pathway to Enterprise Mobile Readiness: Analysis of Perceptions, Pressures, Preparedness, and Progression,” Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington: 2012.
  • Lang, M. CIO-Handbuch, Symposion Publishing GmbH, 2012.
  • Lebek, B., Degirmenci, K., and Breitner, M.H. “Investigating the Influence of Security, Privacy, and Legal Concerns on Employees' Intention to Use BYOD Mobile Devices,” Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago: 2013.
  • Lindell, M.K. and Whitney, D.J. “Accounting for common method variance in cross-sectional research designs,” Journal of Applied Psychology (86:1), 2001, p. 114–121.
  • Lohmöller, J.-B. Latent variable path modeling with partial least squares, Physica-Verlag, Heidelberg, 1989.
  • Loose, M., Weeger, A., and Gewald, H. “BYOD-The Next Big Thing in Recruiting? Examining the Determinants of BYOD Service Adoption Behavior from the Perspective of Future Employees,” Proceedings of the 18th Americas Conference on Information Systems, Chicago, Illinois: 2013.
  • Mallat, N., Rossi, M., Tuunainen, V.K., and Öörni, A. “An empirical investigation of mobile ticketing service adoption in public transportation,” Personal Ubiquitous Comput. (12:1), 2008, p. 57–65.
  • Moore, G.C. and Benbasat, I. “Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation,” Information Systems Research (2:3), 1991, p. 192–222.
  • Moreno, C., Tizon, N., and Preda, M. “Mobile cloud convergence in gaas: A business model proposition,” Proceedings of the 45th Hawaii International Conference on System Sciences: 2012, p. 1344–1352.
  • Murdoch, R., Harris, J.G., and Dvore, G. “Can Enterprise IT Survive the Meteor of Consumer Technology?,” 2010, Accenture Institute for High Performance.
  • Niehaves, B., Köffer, S., and Ortbach, K. “The Effect of Private IT Use on Work Performance - Towards an IT Consumerization Theory,” Proceedings of the International Conference on Wirtschaftsinformatik, Leipzig: 2013.
  • Niehaves, B., Köffer, S., and Ortbach, K. “IT Consumerization – A Theory and Practice Review,” Proceedings of the Eighteenth Americas Conference on Information Systems, Seatle, Washington: 2012, p. Paper 18.
  • Podsakoff, P.M., MacKenzie, S.B., Lee, J.-Y., and Podsakoff, N.P. “Common Method Biases in Behavioral Research: A Critical Review of The Literature and Recommended Remedies,” Journal of Applied Psychology (88:5), 2003, p. 879–903.
  • Prensky, M. “Digital Natives, Digital Immigrants,” On the Horizon (9:5), 2001, p. 1–6.
  • Ringle, CM., Sarstedt, M., and Straub, D.W. “A Critical Look at the Use of PLS-SEM in MIS Quarterly,” MIS Quarterly (36:1), 2012, p. iii–xiv.
  • Ringle, CM., Wende, S., and Will, S. “SmartPLS 2.0 (M3) Beta,” 2005, Hamburg, http://www.smartpls.de.
  • Stone, M. “Cross-validatory choice and assessment of statistical predictions,” Journal of the Royal Statistical Society. Series B (Methodological) (B:36), 1974, p. 111–147.
  • Straub, E.T. “Understanding technology adoption: Theory and future directions for informal learning,” Review of Educational Research (79:2), 2009, p. 625–649.
  • Tarique, I. and Schuler, R.S. “Global talent management: Literature review, integrative framework, and suggestions for further research,” Journal of World Business (45:2), 2010, p. 122–133.
  • Thompson, R.L., Higgins, CA., and Howell, J.M. “Personal Computing: Toward a Conceptual Model of Utilization,” MIS Quarterly (15:1), 1991, p. 125–143.
  • Venkatesh, V., Morris, M., Davis, G., and Davis, F. “User Acceptance of Information Technology: Toward a Unified View,” Management Information Systems Quarterly (27:3), 2003.
  • Vogel, R., Kocoglu, T., and Berger, T. Desktopvirtualisierung: Definitionen - Architekturen - Busines s-Nutzen, Vieweg Verlag, Friedr, & Sohn Verlagsgesellschaft mbH, Wiesbaden, 2010.
  • Weiß, F. and Leimeister, J. “Consumerization - IT Innovations from the Consumer Market as a Challenge for Corporate IT,” Business & Information Systems Engineering (54:6), 2012, p. 363–366.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.