976
Views
33
CrossRef citations to date
0
Altmetric
Articles

Implications of Monitoring Mechanisms on Bring Your Own Device Adoption

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon

References

  • Abril PS, Levin A, Del Riego A. 2012. Blurred boundaries: Social media privacy and the twenty-first-century employee. Am Bus Law J. 49(1):63–124.
  • Ajzen I. 1991. The theory of planned behavior. Organ Behav Hum Decis Process. 50(2):179–211.
  • Alder GS, Ambrose ML, Noel TW. 2006. The effect of formal advance notice and justification on Internet monitoring fairness: Much about nothing?. J Leadersh Organ Stud. 13(1):93–107.
  • Alder GS, Noel TW, Ambrose ML. 2006. Clarifying the effects of Internet monitoring on job attitudes: The mediating role of employee trust. Inf Manage. 43(7):894–903.
  • Ariss SS. 2002. Computer monitoring: benefits and pitfalls facing management. Inf Manage. 39:553–558.
  • Bélanger F, Crossler RE. 2011. Privacy in the digital age: A review of information privacy research in information systems. MIS Q. 35(4):1017–1041.
  • Bélanger F, Hiller JS, Smith WJ. 2002. Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. J Strategic Inf Syst. 11(3/4):245.
  • Boss SR, Kirsch LJ, Angermeier I, Shingler RA. 2009. If someone is watching, I’ll do what I’m asked: Mandatoriness, control, and information security. Eur J Inf Syst. 18(2):151–164.
  • Bovens M. 2010. Two concepts of accountability: Accountability as a virtue and as a mechanism. West Eur Polit. 33(5): 946–967.
  • Bradley J, Loucks J, Macaulay J, Medcalf R, Buckalew L. 2012. BYOD: A Global Perspective Harnessing Employee-Led Innovation. Cisco Systems, San Jose, CA.
  • Bulgurcu B, Benbasat I. 2009. Analysis of consumers’ privacy breach consent: A resource dependency perspective. In: Workshop on Information Security & Privacy. Phoenix, AZ; 1–9.
  • Caldwell C, Zeltmann S, Griffin K. 2012. BYOD (Bring Your Own Device). Compet. Forum 10(2):117–121.
  • Canalys. 2012. Smartphones Overtake Client PCs in 2011. http://www.canalys.com/newsroom/smart-phones-overtake-client-pcs-2011
  • Churchill GA. 1979. A paradigm for developing better measures of marketing constructs. J Mark Res. 16(1):64–73.
  • Compeau DR, Higgins CA. 1995. Application of social cognitive theory to training for computer skills. Inf Syst Res. 6(2):118–143.
  • Davis FD, Bagozzi RP, Warshaw PR. 1992. Extrinsic and intrinsic motivation to use computers in the workplace. J Appl Soc Psychol. 22(14):1111–1132.
  • Davis FD. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3):319–340.
  • Deshmukh Balaji A. 2006. Performance analysis of filtering software using Signal Detection Theory. Decis Support Syst. 42(2):1015–1028.
  • Dinev T, Hart P. 2006 An extended privacy calculus model for e-commerce transactions. Inf Syst Res. 17(1): 61–80.
  • Douthitt EA, Aiello JR. 2001. The role of participation and control in the effects of computer monitoring on fairness perceptions, task satisfaction, and performance. J Appl Psychol. 86(5): 867–874.
  • Eivazi K. 2011. Computer use monitoring and privacy at work. Comput Law Secur Rev Int J Technol Pract. 27(5): 516–523.
  • Fiberlink. 2012. Mobile Device Management (MDM) Policies: Best Practices Guide. http://www.webtorials.com/main/resource/papers/fiberlink/paper2/MDM_Policies_Best_Practices_Guide.pdf
  • Gefen D, Straub DW, Boudreau M. 2000. Structural equation modeling and regression: Guidelines for research and practice. Commun Assoc Inf Syst. 4(7): 1–76.
  • George JF. 1996. Computer-based monitoring: Common perceptions and empirical results. MIS Q. 20(4): 459–480.
  • Gould D. 1996. Using vignettes to collect data for nursing research studies: How valid are the findings?. J Clin Nurs. 5(4): 207–212.
  • Grant RA, Higgins C. 1991. The impact of computerized performance monitoring on service work: Testing a causal model. Inf Syst Res. 2(2): 116–142.
  • Grant RA, Higgins CA. 1996. Computerized performance monitors as multidimensional systems: Derivation and application. ACM Trans Inf Syst. 14(2): 212–235.
  • Greenleaf EA. 1992. Measuring extreme response style. Public Opin Q. 56(3): 328–351.
  • Grodzinsky F, Gumbus A, Lilley S. 2010. Ethical implications of internet monitoring: A comparative study. Inf Syst Front. 12(4): 433–441.
  • Hair JF, Black WC, Babin BJ, Anderson RE. 2010. Multivariate Data Analysis: A Global Perspective, Vol 7th ed. Pearson Education, Upper Saddle River, NJ.
  • Hoover N. 2010. Stolen VA laptop contains personal data. http://www.darkreading.com/risk-management/stolen-va-laptop-contains-personal-data/d/d-id/1089135
  • Hox JJ, Kreft IGG, Hermkens PLJ. 1991. The analysis of factorial surveys. Sociol Methods Res. 19(4): 493–510.
  • Jasso G. 2006. Factorial survey methods for studying beliefs and judgments. Sociol Methods Res. 34(3): 334–423.
  • Ketchum Global Research & Analytics. 2012. 2012 IT Risk/reward Barometer: US Consumer Edition.
  • Kim EKJ. 2006. The new electronic discovery rules: a place for employee privacy?. Yale Law J. 115(6):1481–1490.
  • Krill P. 2012. BYOD: A world of pain awaits IT. http://www.infoworld.com/article/2619520/byod/byod--a-world-of-pain-awaits-it.html
  • Lee J, Crossler R, Warkentin M. 2013. Implications of monitoring mechanisms on bring your own device (BYOD) adoption. In: Proceedings of the 34th International Conference on Information Systems. Vol Milan, Italy; 1–12.
  • Liao Q, Gurung A, Luo X, Li L. (2009). Workplace management and employee misuse: Does punishment matter? J Comput Inf Syst. 50(2):49–59.
  • Lindell MK, Whitney DJ. 2001. Accounting for common method variance in cross-selectional research designs. J Appl Psychol. 86(1): 114–121.
  • Liu C, Marchewka JT, Lu J, Yu C-S. 2005. Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Inf Manag. 42: 289–304.
  • Loch KD, Conger S, Oz E. 1998. Ownership, privacy and monitoring in the workplace: A debate on technology and ethics. J Bus Ethics 17(6):653–663.
  • MacKenzie SB, Podsakoff PM, Podsakoff NP. 2011. Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Q. 35(2): 293–334.
  • Malhotra NK, Kim SS, Agarwal J. 2004. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Inf Syst Res. 15(4): 336–355.
  • Marx GT, Sherizen S. 1986. Social Aspects of Changes in Worker Monitoring and Computer/communications Privacy and Security Practices. Washington, D.C.: The Office.
  • McGrath JE. 1994. Methodology matters: Doing research in the behavioral and social sciences. In: Research Strategies. Vol Morgan Kaufmann Publishers, Inc.,San Francisco, CA; 152–169.
  • Messmer E. 2012. Government IT strains under BYOD challenge. Netw World 29(7): 10.
  • Miller S, Weckert J. 2000. Privacy, the workplace and the internet. J. Bus. Ethics 28(3): 255–265.
  • Moore GC, Benbasat I. 1991. Development of an instrument to measure the perceptions of adopting an information technology innovation. Inf Syst Res. 2(3): 192–223.
  • Pavlou PA. 2011. State of the information privacy literature: Where are we know and where should we go?. MIS Q. 35(4): 977–988.
  • Podsakoff PM, MacKenzie SB, Lee J-Y, Podsakoff NP. 2003. Common method biases in behavioral research: A critical review of the literature and recommended remedies. J Appl Psychol. 88(5): 879–903.
  • Podsakoff PM, MacKenzie SB, Podsakoff NP. 2012. Sources of method bias in social science research and recommendations on how to control it. Annu Rev Psychol. 63: 539–569.
  • Raudenbush SW, Bryk AS, Congdon R. 2013. HLM for Windows, In: Version 7.01. Vol Scientific Software International,Lincolnwood, IL.
  • Raudenbush SW, Bryk AS. 2002. Hierarchical Linear Models: Applications and Data Analysis Methods, Vol 1. Thousand Oaks, CA: Sage.
  • Research in Motion. 2013. BlackBerry 10: Setting New Standards in Mobile Security. http://www.bizreport.com/whitepapers/blackberry_10_setting_new_standards.html
  • Richardson HA, Simmering MJ, Sturman MC. 2009.A Tale of three perspectives: Examining post hoc statistical techniques for detection and correction of common method variance. Organ Res Methods 12 (4): 762–800.
  • Rossi PH, Anderson AB. 1982. The factorial survey approach: An introduction. In: Measuring Social Judgments: The Factorial Survey Approach. Vol SAGE Publications, Inc
  • Smith A. 2012. 46% of American Adults Are Smartphone Owners. http://www.pewinternet.org/2012/03/01/nearly-half-of-american-adults-are-smartphone-owners/
  • Smith HJ, Dinev T, Xu H. 2011. Information privacy research: An interdisciplinary review. MIS Q. 35(4): 989–1015.
  • Stanton JM. 2000. Traditional and electronic monitoring from an organizational justice perspective. J Bus Psychol. 15(1): 129–147.
  • Steelman ZR, Hammer BI, Limayem M. 2014. Data collection in the digital age: Innovative. alternatives to student samples. MIS Q. 38(2): 355–378.
  • Straub DW, Boudreau M, Gefen D. 2004. Validation guidelines for IS positivist research. Commun Assoc Inf Syst. 13(24):380–427.
  • Straub DW, Limayem M, Karahanna-Evaristo E. 1995. Measuring system usage: Implications for IS theory testing. Manage Sci. 41(8):85–92.
  • Tabak F, Smith W. 2005. Privacy and electronic monitoring in the workplace: A model of managerial cognition and relational trust development. Empl Responsib Rights J. 17(3): 173–189.
  • Tang ZL, Hu Y, Smith MD. 2008. Gaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptor. J Manag Inf Syst. 24(4): 153–173.
  • Thompson RL, Higgins CA, Howell JM. 1991. Personal computing: Toward a conceptual model of utilization. MIS Q. 15(1): 125–142.
  • Van Toorn C, Shu AY. 2010. Assessing the impact of organizational Internet and email monitoring policy on Australian employees. In: AMCIS 2010 Proceedings. Vol Lima, Peru; 1–12.
  • Trevino LK. 1992. Experimental approaches to studying ethical-unethical behavior in organizations. Bus. Ethics Q. 2(2): 121–136.
  • Vance A, Lowry PB, Eggett D. 2013. Using accountability to reduce access policy violations in information systems. J Manage Inf Syst. 29(4): 263–290.
  • Vegosen J. 2010. Employee monitoring and pre-employment screening. Risk Manage 57(8): 29.
  • Venkatesh V, Morris MG, Hall M, Davis GB, Davis FD. 2003. User acceptance of information technology: Toward a unified view. MIS Q. 27(3): 425–478.
  • Venkatesh V, Thong JYL, Xu X. 2012. Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technolgoy. MIS Q. 36(1): 157–178.
  • Vijayan J. 2012. NASA breach update: Stolen laptop had data on 10,000 users. http://www.computerworld.com/article/2493084/security0/nasa-breach-update--stolen-laptop-had-data-on-10-000-users.html
  • Wallander L. 2009. 25 years of factorial surveys in sociology: A review. Soc Sci Res. 38(3): 505–520.
  • Weeger A, Wang X, Gewald H. 2015. IT consumerization: BYOD-Program acceptance and its impact on employer attractiveness. J Comput Inf Syst. 56(1): 1–9.
  • Whitten D, Hightower R, Lutfus S. 2014. Mobile device adaptation efforts: The impact of hedonic and utilitarian value. J Comp Inf Syst. 55(1): 48–58.
  • Williams K, Harkins S, Latané B. 1981. Identifiability as a deterrent to social loafing: Two cheering experiments. J Personal Soc Psychol. 40(2): 303–311.
  • Workman M. 2009. A field study of corporate employee monitoring: Attitudes, absenteeism, and the moderating influences of procedural justice perceptions. Inf Organ. 19(4): 218–232

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.