References
- Gaff BM. Byod? Omg! Computer (Long Beach Calif). 2015;48:10–11.
- Bullock L. The future of BYOD: statistics, predictions and best practices to prep for the future. Forbes. [accessed 2019 Sept 4]. https://www.forbes.com/sites/lilachbullock/2019/01/21/the-future-of-byod-statistics-predictions-and-best-practices-to-prep-for-the-future/#1c6a1fa91f30.
- Ingram Micro. Seven stats about the future of BYOD. 2017 [accessed 2019 Sept 18]. https://imaginenext.ingrammicro.com/networking-and-security/seven-stats-about-the-future-of-byod.
- TechJury. 41 eye-opening BYOD stats and facts to know in 2019. TechJury. 2019. https://techjury.net/stats-about/byod/.
- Mueller M, Klesel M, Heger O, Niehaves B. Empirical insights on individual innovation behaviour: a qualitative study on it- consumerization. PACIS Proc; 2016. p. 201. Chiayi, Taiwan.
- Rivera AD, George G, Peter P, Muralidharan S, Khanum S. Analysis of security controls for BYOD (bring your own device); 2013. p. 1–10.
- Grover V. BYOD trends in 2019: its influence in the next five years. 2019. https://blog.scalefusion.com/top-8-trends-that-will-influence-byod-in-next-five-years/.
- Harris J, Ives B, Junglas I. IT consumerization: when gadgets turn into enterprise IT tools Q uarterly e xecutive challenges of the rise of IT consumerization. MIS Q Exec. 2012;11:(September):99–112.
- Koohang A, Riggio MT, Paliszkiewicz J, Nord JH. Security policies and data protection of mobile devices in the workplace. Issues Inf Syst. 2017;18:11–21.
- Hamblen M. One-fifth of IT pros say their companies had mobile data breach. 2016. https://www.computerworld.com/article/3048799/one-fifth-of-it-pros-say-their-companies-had-mobile-data-breach.html.
- Bulgurcu B, Cavusoglu H, Benbasat I. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. Mis Q. 2010;34(3):523–48. doi:https://doi.org/10.2307/25750690.
- Yan Z, Robertson T, Yan R, Park SY, Bordoff S, Chen Q, Sprissler E. Finding the weakest links in the weakest link: how well do undergraduate students make cybersecurity judgment? Comput Human Behav. 2018;84:375–82. doi:https://doi.org/10.1016/j.chb.2018.02.019.
- Moyer JE. Managing mobile devices in hospitals: a literature review of BYOD policies and usage. J Hosp Librariansh. 2013;13(3):197–208. doi:https://doi.org/10.1080/15323269.2013.798768.
- Eslahi M, Var Naseri M, Hashim H, Tahir NM, Saad EHM. BYOD: the current state and security challenges. IEEE Symp Comput Appl Ind Electron. 2014:189 –192.
- French AM, Guo C, Shim JP. Current status, issues, and future of Bring Your Own Device (BYOD). Commun Assoc Inf Syst. 2014;35:191–97.
- Wang Y, Wei J, Vangury K. Bring your own device security issues and challenges. 2014 IEEE 11th Consum Commun Netw Conf; 2014. p. 80–85. Las Vegas, NV.
- Olalere M, Abdullah MT, Mahmod R, Abdullah A. A review of bring your own device on security issues. SAGE Open. 2015:5. doi:https://doi.org/10.1177/2158244015580372.
- Downer K, Bhattacharya M. BYOD security: a new business challenge. Proc - 2015 IEEE Int Conf Smart City, SmartCity 2015, Held Jointly with 8th IEEE Int Conf Soc Comput Networking, Soc 2015, 5th IEEE Int Conf Sustain Comput Communic; 2015. p. 1128–33. Chengdu, China.
- Garba AB, Armarego J, Murray D, Kenworthy W. Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments. J Inf Priv Secur. 2015;11:38–54.
- Kadimo K, Kebaetse MB, Ketshogileng D, Seru LE, Sebina KB, Kovarik C, Balotlegi K. Bring-your-own-device in medical schools and healthcare facilities: a review of the literature. Int J Med Inform. 2018;119(October):94–102. doi:https://doi.org/10.1016/j.ijmedinf.2018.09.013.
- Wani TA, Mendoza A, Gray K. BYOD in hospitals-security issues and mitigation strategies. Proc Australas Comput Sci Week Multiconference Proc. 2019. doi:https://doi.org/10.1145/3290688.3290729.
- Aguboshim FC, Udobi JI. Security issues with mobile IT: a narrative review of Bring Your Own Device (BYOD). J Inf Eng Appl. 2019;8:56–66.
- Kitchenham B, Charters S. Source: “guidelines for performing systematic literature reviews in SE”, Kitchenham et al Guidelines for performing systematic literature reviews in software engineering source: “ Guidelines for performing systematic literature reviews I; 2007. p. 1–44.
- Crossler RE, Long JH, Loraas TM, Trinkle BS. Understanding compliance with bring your own device policies utilizing protection motivation theory: bridging the intention-behavior gap. J Inf Syst. 2014;28:209–26.
- Zahadat N, Blessner P, Blackburn T, Olson BA. BYOD security engineering: a framework and its analysis. Comput Secur. 2015;55:81–99. doi:https://doi.org/10.1016/j.cose.2015.06.011.
- Sebescen N, Vitak J. Securing the human: employee security vulnerability risk in organizational settings. J Assoc Inf Sci Technol. 2017;68:2237–47. doi:https://doi.org/10.1002/asi.
- Tu CZ, Adkins J, Zhao GY. Complying with BYOD security policies : a moderation model based on protection motivation theory. J Midwest Assoc Inf Syst. 2019;2019:11–28.
- Belanger F, Crossler RE. Dealing with digital traces: understanding protective behaviors on mobile devices. J Strateg Inf Syst. 2018;28(1):34–49. doi:https://doi.org/10.1016/j.jsis.2018.11.002.
- Stephens KK, Ford JL. Unintended consequences of a strategically ambiguous organizational policy selectively restricting mobile device use at work. Mob Media Commun. 2016;4(2):186–204. doi:https://doi.org/10.1177/2050157915619211.
- Imgraben J, Engelbrecht A, Choo KKR. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav Inf Technol. 2014;33:1347–60.
- Mani D, Choo K, Mubarak S. Information security in the South Australian real estate industry A study of 40 real estate organisations. Inf Manage Comput Secur. 2014. doi:https://doi.org/10.1108/IMCS-10-2012-0060.
- Dang-Pham D, Pittayachawan S. Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: a protection motivation theory approach. Comput Secur. 2015;48:281–97. doi:https://doi.org/10.1016/j.cose.2014.11.002.
- Bello AG, Murray D, Armarego J. A systematic approach to investigating how information security and privacy can be achieved in BYOD environments. Inf Comput Secur. 2017;25:475–92.
- Tu Z, Turel O, Yuan Y, Archer N. Learning to cope with information security risks regarding mobile device loss or theft: an empirical examination. Inf Manag. 2015;52(4):506–17. doi:https://doi.org/10.1016/j.im.2015.03.002.
- Mallmann GL, Maçada ACG, Oliveira M. The influence of shadow IT usage on knowledge sharing: an exploratory study with IT users. Bus Inf Rev. 2018;35:17–28.
- Hovav A, Putri FF. This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy. Pervasive Mob Comput. 2016;32:35–49. doi:https://doi.org/10.1016/j.pmcj.2016.06.007.
- Verkijika SF. Understanding smartphone security behaviors: an extension of the protection motivation theory with anticipated regret. Comput Secur. 2018;77:860–70. doi:https://doi.org/10.1016/j.cose.2018.03.008.
- Chen H, Li W. Mobile device users’ privacy security assurance behavior A technology threat avoidance perspective. Inf Comput Secur. 2017;25(3):330–44. doi:https://doi.org/10.1108/ICS-04-2016-0027.
- Mylonas A, Kastania A, Gritzalis D. Delegate the smartphone user? Security awareness in smartphone platforms. Comput Secur. 2013;34:47–66. doi:https://doi.org/10.1016/j.cose.2012.11.004.
- Vrhovec S, Markelj B. Relating mobile device use and adherence to information security policy with data breach consequences in hospitals. J Univers Comput Sci. 2018;24:634–45.
- McGill T, Thompson N. Old risks, new challenges: exploring differences in security between home computer and mobile device use. Behav Inf Technol. 2017;36:1111–24.
- Chatterjee D, Grewal R, Sambamurthy V. Shaping up for E-Commerce: institutional enablers of the organizational assimilation of web technologies. MIS Quart. 2002;26(2):65–89. doi:https://doi.org/10.2307/4132321.
- Hsia TL, Chiang AJ, Wu JH, Teng NNH, Rubin AD. What drives E-Health usage? Integrated institutional forces and top management perspectives. Comput Human Behav. 2019 [December 2018];97:260–70. doi:https://doi.org/10.1016/j.chb.2019.01.010.
- Chen X, Wu D, Chen L, Teng JKL. Sanction severity and employees’ information security policy compliance: investigating mediating, moderating, and control variables. Inf Manag. 2018;(February 2016);55(8):1049–1060.
- Ifinedo P. Critical times for organizations: what should be done to curb workers’ noncompliance with IS security policy guidelines? Inf Syst Manag. 2016;33(1):30–41. doi:https://doi.org/10.1080/10580530.2015.1117868.
- Hina S, Dominic PDD. Information security policies ’ compliance : a perspective for higher education institutions. J Comput Inf Syst. 2018:1–11.
- Allam S, Flowerday SV, Flowerday E. Smartphone information security awareness: a victim of operational pressures. Comput Secur. 2014;42(May):56–65. doi:https://doi.org/10.1016/j.cose.2014.01.005.
- Hwang I, Cha O. Examining technostress creators and role stress as potential threats to employees’ information security compliance. Comput Human Behav. 2018;81:282–93. doi:https://doi.org/10.1016/j.chb.2017.12.022.
- Chen H, Chau PYK, Li W. The effects of moral disengagement and organizational ethical climate on insiders’ information security policy violation behavior. Inf Technol People. 2018. doi:https://doi.org/10.1108/ITP-12-2017-0421.
- Hysa B, Spalek S. Opportunities and threats presented by social media in project management. Heliyon. 2019;5(4):e01488. doi:https://doi.org/10.1016/j.heliyon.2019.e01488.