IDEAS home Printed from https://ideas.repec.org/p/hal/journl/hal-01914791.html
   My bibliography  Save this paper

Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users

Author

Listed:
  • Paméla Baillette

    (MRM - Montpellier Research in Management - UPVM - Université Paul-Valéry - Montpellier 3 - UPVD - Université de Perpignan Via Domitia - Groupe Sup de Co Montpellier (GSCM) - Montpellier Business School - UM - Université de Montpellier)

  • Yves Barlette

    (MRM - Montpellier Research in Management - UPVM - Université Paul-Valéry - Montpellier 3 - UPVD - Université de Perpignan Via Domitia - Groupe Sup de Co Montpellier (GSCM) - Montpellier Business School - UM - Université de Montpellier)

  • Aurélie Leclercq-Vandelannoitte

    (IESEG Business School - UCL - Université catholique de Lille - IESEG - UCL - Université catholique de Lille, LEM - Lille économie management - UMR 9221 - UA - Université d'Artois - UCL - Université catholique de Lille - Université de Lille - CNRS - Centre National de la Recherche Scientifique)

Abstract

This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, tablets and smartphones) to fulfil organizational tasks. BYOD provides opportunities, including the possibility of working differently, for both CEOs and end users. However, BYOD involves high organizational and end user security risks. What are the benefits and risks for CEOs and end users of the reversed adoption logic of BYOD, and how can BYOD-related security paradoxes be overcome? A theoretical analysis is conducted with regard to the concept of the "reversed IT adoption logic" vs. the traditional IT adoption logic. This analysis highlights the security paradoxes linked to this reversed IT adoption and proposes means to overcome these paradoxes. If BYOD entails many opportunities, then it requires information security management to balance the induced risks for CEOs and users.

Suggested Citation

  • Paméla Baillette & Yves Barlette & Aurélie Leclercq-Vandelannoitte, 2018. "Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users," Post-Print hal-01914791, HAL.
  • Handle: RePEc:hal:journl:hal-01914791
    DOI: 10.1016/j.ijinfomgt.2018.07.007
    as

    Download full text from publisher

    To our knowledge, this item is not available for download. To find whether it is available, there are three options:
    1. Check below whether another version of this item is available online.
    2. Check on the provider's web page whether it is in fact available.
    3. Perform a search for a similarly titled item that would be available.

    Other versions of this item:

    References listed on IDEAS

    as
    1. Michael Kyobe, 2008. "The Impact of Entrepreneur Behaviors on the Quality of e-Commerce Security: A Comparison of Urban and Rural Findings," Journal of Global Information Technology Management, Taylor & Francis Journals, vol. 11(2), pages 58-79, April.
    2. Jones, Beth H. & Chin, Amita Goyal, 2015. "On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time," International Journal of Information Management, Elsevier, vol. 35(5), pages 561-571.
    3. Gary Dushnitsky, 2010. "Entrepreneurial Optimism in the Market for Technological Inventions," Organization Science, INFORMS, vol. 21(1), pages 150-167, February.
    4. Anuragini Shirish & Imed Boughzala & Shirish C. Srivastava, 2016. "Adaptive use of social networking applications in contemporary organizations : examining the motivations of Gen Y cohorts," Grenoble Ecole de Management (Post-Print) hal-01370642, HAL.
    5. Aurélie Leclercq - Vandelannoitte, 2015. "Managing BYOD: how do organizations incorporate user-driven IT innovations?," Post-Print hal-01744721, HAL.
    6. Nripendra P. Rana & Yogesh K. Dwivedi & Banita Lal & Michael D. Williams & Marc Clement, 2017. "Citizens’ adoption of an electronic government system: towards a unified view," Information Systems Frontiers, Springer, vol. 19(3), pages 549-568, June.
    7. Dai, Na & Ivanov, Vladimir & Cole, Rebel A., 2017. "Entrepreneurial optimism, credit availability, and cost of financing: Evidence from U.S. small businesses," Journal of Corporate Finance, Elsevier, vol. 44(C), pages 289-307.
    8. E. Burton Swanson & Neil C. Ramiller, 1997. "The Organizing Vision in Information Systems Innovation," Organization Science, INFORMS, vol. 8(5), pages 458-474, October.
    9. Olivier Torres & Pierre-André Julien, 2005. "Specificity and denaturing of small business," Post-Print hal-02311807, HAL.
    10. Palich, Leslie E. & Ray Bagby, D., 1995. "Using cognitive theory to explain entrepreneurial risk-taking: Challenging conventional wisdom," Journal of Business Venturing, Elsevier, vol. 10(6), pages 425-438, November.
    11. Sebastian Köffer & Kevin Ortbach & Iris Junglas & Björn Niehaves & Jeanne Harris, 2015. "Innovation Through BYOD?," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 57(6), pages 363-375, December.
    12. Anuragini Shirish & Imed Boughzala & Shirish C. Srivastava, 2016. "Adaptive use of social networking applications in contemporary organizations : examining the motivations of Gen Y cohorts," Post-Print hal-01370642, HAL.
    13. Alain Fayolle & Saulo Dubard Barbosa & Jill Kickul, 2008. "Une nouvelle approche du risque en création d'entreprise," Revue française de gestion, Lavoisier, vol. 0(5), pages 141-159.
    14. Malmendier, Ulrike & Tate, Geoffrey, 2008. "Who makes acquisitions? CEO overconfidence and the market's reaction," Journal of Financial Economics, Elsevier, vol. 89(1), pages 20-43, July.
    15. Nilaykumar Kiran SANGANI & Balakrishnan VIJAYAKUMAR, 2012. "Cyber Security Scenarios and Control for Small and Medium Enterprises," Informatica Economica, Academy of Economic Studies - Bucharest, Romania, vol. 16(2), pages 58-71.
    16. Amélie Bohas & Julie Fabbri & Pierre Laniray & François-Xavier de Vaujany, 2018. "Hybridations salariat-entrepreneuriat et nouvelles pratiques de travail : des slashers à l’entrepreneuriat-alterné," Post-Print hal-02312105, HAL.
    17. Oliveira, Tiago & Faria, Miguel & Thomas, Manoj Abraham & Popovič, Aleš, 2014. "Extending the understanding of mobile banking adoption: When UTAUT meets TTF and ITM," International Journal of Information Management, Elsevier, vol. 34(5), pages 689-703.
    18. Paméla Baillette & Yves Barlette, 2018. "BYOD-related innovations and organizational change for entrepreneurs and their employees in SMEs," Post-Print hal-01992710, HAL.
    19. Jarrahi, Mohammad Hossein & Crowston, Kevin & Bondar, Kateryna & Katzy, Bernhard, 2017. "A pragmatic approach to managing enterprise IT infrastructures in the era of consumerization and individualization of IT," International Journal of Information Management, Elsevier, vol. 37(6), pages 566-575.
    20. Jörg Becker & Jan Brocke & Marcel Heddier & Stefan Seidel, 2015. "In Search of Information Systems (Grand) Challenges," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 57(6), pages 377-390, December.
    21. Soomro, Zahoor Ahmed & Shah, Mahmood Hussain & Ahmed, Javed, 2016. "Information security management needs more holistic approach: A literature review," International Journal of Information Management, Elsevier, vol. 36(2), pages 215-225.
    22. Silva, Maisa Mendonça & de Gusmão, Ana Paula Henriques & Poleto, Thiago & Silva, Lúcio Camara e & Costa, Ana Paula Cabral Seixas, 2014. "A multidimensional approach to information security risk management using FMEA and fuzzy theory," International Journal of Information Management, Elsevier, vol. 34(6), pages 733-740.
    23. Ding, Jiun-Hung & Chien, Roger & Hung, Shih-Hao & Lin, Yi-Lan & Kuo, Che-Yang & Hsu, Ching-Hsien & Chung, Yeh-Ching, 2014. "A framework of cloud-based virtual phones for secure intelligent information management," International Journal of Information Management, Elsevier, vol. 34(3), pages 329-335.
    24. Yeniman Yildirim, Ebru & Akalp, Gizem & Aytac, Serpil & Bayram, Nuran, 2011. "Factors influencing information security management in small- and medium-sized enterprises: A case study from Turkey," International Journal of Information Management, Elsevier, vol. 31(4), pages 360-365.
    25. Shirish, Anuragini & Boughzala, Imed & Srivastava, Shirish C., 2016. "Adaptive use of social networking applications in contemporary organizations: Examining the motivations of Gen Y cohorts," International Journal of Information Management, Elsevier, vol. 36(6), pages 1111-1123.
    26. Aurélie Leclercq-Vandelannoitte & Emmanuel Bertin, 2018. "From sovereign IT governance to liberal IT governmentality? A Foucauldian analogy," European Journal of Information Systems, Taylor & Francis Journals, vol. 27(3), pages 326-346, May.
    27. Martins, Carolina & Oliveira, Tiago & Popovič, Aleš, 2014. "Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application," International Journal of Information Management, Elsevier, vol. 34(1), pages 1-13.
    28. Mortenson, Michael J. & Vidgen, Richard, 2016. "A computational literature review of the technology acceptance model," International Journal of Information Management, Elsevier, vol. 36(6), pages 1248-1259.
    29. Aurélie Leclercq-Vandelannoitte, 2015. "Managing BYOD : how do organizations incorporate user-driven IT innovations ?," Post-Print hal-01563048, HAL.
    30. Aurelie Leclercq-Vandelannoitte, 2015. "Leaving employees to their own devices: new practices in the workplace," Post-Print hal-02998112, HAL.
    31. Alalwan, Ali Abdallah & Dwivedi, Yogesh K. & Rana, Nripendra P., 2017. "Factors influencing adoption of mobile banking by Jordanian bank customers: Extending UTAUT2 with trust," International Journal of Information Management, Elsevier, vol. 37(3), pages 99-110.
    32. Moon, Yun Ji & Choi, Myeonggil & Armstrong, Deborah J., 2018. "The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations," International Journal of Information Management, Elsevier, vol. 40(C), pages 54-66.
    33. Nripendra P. Rana & Yogesh K. Dwivedi & Banita Lal & Michael D. Williams & Marc Clement, 0. "Citizens’ adoption of an electronic government system: towards a unified view," Information Systems Frontiers, Springer, vol. 0, pages 1-20.
    34. Hüseyin Tanriverdi & Arun Rai & N. Venkatraman, 2010. "Research Commentary ---Reframing the Dominant Quests of Information Systems Strategy Research for Complex Adaptive Business Systems," Information Systems Research, INFORMS, vol. 21(4), pages 822-834, December.
    35. Yueh, Hsiu-Ping & Lu, Ming-Hsin & Lin, Weijane, 2016. "Employees' acceptance of mobile technology in a workplace: An empirical study using SEM and fsQCA," Journal of Business Research, Elsevier, vol. 69(6), pages 2318-2324.
    36. Gupta, Prashant & Seetharaman, A. & Raj, John Rudolph, 2013. "The usage and adoption of cloud computing by small and medium businesses," International Journal of Information Management, Elsevier, vol. 33(5), pages 861-874.
    37. Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
    38. Augustin Landier & David Thesmar, 2009. "Financial Contracting with Optimistic Entrepreneurs," The Review of Financial Studies, Society for Financial Studies, vol. 22(1), pages 117-150, January.
    39. A. Leclercq-Vandelanoitte, 2011. "Organizations as discursive constructions: a Foucauldian approach," Post-Print hal-00800179, HAL.
    40. Csaba Lábodi & Pál Michelberger, 2010. "Necessity Or Challenge - Information Security For Small And Medium Enterprises," Annals of the University of Petrosani, Economics, University of Petrosani, Romania, vol. 10(3), pages 207-216.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Queiroz, Maciel M. & Fosso Wamba, Samuel, 2019. "Blockchain adoption challenges in supply chain: An empirical investigation of the main drivers in India and the USA," International Journal of Information Management, Elsevier, vol. 46(C), pages 70-82.
    2. Shaw, Norman & Sergueeva, Ksenia, 2019. "The non-monetary benefits of mobile commerce: Extending UTAUT2 with perceived value," International Journal of Information Management, Elsevier, vol. 45(C), pages 44-55.
    3. Baabdullah, Abdullah M. & Alalwan, Ali Abdallah & Rana, Nripendra P. & Kizgin, Hatice & Patil, Pushp, 2019. "Consumer use of mobile banking (M-Banking) in Saudi Arabia: Towards an integrated model," International Journal of Information Management, Elsevier, vol. 44(C), pages 38-52.
    4. Hossain, Akram & Quaresma, Rui & Rahman, Habibur, 2019. "Investigating factors influencing the physicians’ adoption of electronic health record (EHR) in healthcare system of Bangladesh: An empirical study," International Journal of Information Management, Elsevier, vol. 44(C), pages 76-87.
    5. Sharma, Sujeet Kumar & Sharma, Manisha, 2019. "Examining the role of trust and quality dimensions in the actual usage of mobile banking services: An empirical investigation," International Journal of Information Management, Elsevier, vol. 44(C), pages 65-75.
    6. Malaquias, Rodrigo F. & Hwang, Yujong, 2019. "Mobile banking use: A comparative study with Brazilian and U.S. participants," International Journal of Information Management, Elsevier, vol. 44(C), pages 132-140.
    7. Zhang, Yun & Weng, Qingxiong & Zhu, Nan, 2018. "The relationships between electronic banking adoption and its antecedents: A meta-analytic study of the role of national culture," International Journal of Information Management, Elsevier, vol. 40(C), pages 76-87.
    8. Wang, Tien & Duong, Trong Danh & Chen, Charlie C., 2016. "Intention to disclose personal information via mobile applications: A privacy calculus perspective," International Journal of Information Management, Elsevier, vol. 36(4), pages 531-542.
    9. Joon Mahn Lee & Byoung‐Hyoun Hwang & Hailiang Chen, 2017. "Are founder CEOs more overconfident than professional CEOs? Evidence from S&P 1500 companies," Strategic Management Journal, Wiley Blackwell, vol. 38(3), pages 751-769, March.
    10. Camilleri, Mark Anthony & Camilleri, Adriana Caterina, 2022. "Remote learning via video conferencing technologies: Implications for research and practice," Technology in Society, Elsevier, vol. 68(C).
    11. Qingyu Zhang & Salman Khan & Safeer Ullah Khan & Ikram Ullah Khan, 2023. "Understanding Blockchain Technology Adoption in Operation and Supply Chain Management of Pakistan: Extending UTAUT Model With Technology Readiness, Technology Affinity and Trust," SAGE Open, , vol. 13(4), pages 21582440231, October.
    12. Cao, Guangming & Duan, Yanqing & Edwards, John S. & Dwivedi, Yogesh K., 2021. "Understanding managers’ attitudes and behavioral intentions towards using artificial intelligence for organizational decision-making," Technovation, Elsevier, vol. 106(C).
    13. Alimam, Mayla & Bertin, Emmanuel & Crespi, Noel, 2017. "ITIL perspective on enterprise social media," International Journal of Information Management, Elsevier, vol. 37(4), pages 317-326.
    14. Jarrahi, Mohammad Hossein & Crowston, Kevin & Bondar, Kateryna & Katzy, Bernhard, 2017. "A pragmatic approach to managing enterprise IT infrastructures in the era of consumerization and individualization of IT," International Journal of Information Management, Elsevier, vol. 37(6), pages 566-575.
    15. Ulrike Malmendier & Vincenzo Pezone & Hui Zheng, 2023. "Managerial Duties and Managerial Biases," Management Science, INFORMS, vol. 69(6), pages 3174-3201, June.
    16. Adam, Tim R. & Burg, Valentin & Scheinert, Tobias & Streitz, Daniel, 2014. "Managerial Optimism and Debt Contract Design: The Case of Syndicated Loans," Discussion Paper Series of SFB/TR 15 Governance and the Efficiency of Economic Systems 475, Free University of Berlin, Humboldt University of Berlin, University of Bonn, University of Mannheim, University of Munich.
    17. Huang, Ronghong & Tan, Kelvin Jui Keng & Faff, Robert W., 2016. "CEO overconfidence and corporate debt maturity," Journal of Corporate Finance, Elsevier, vol. 36(C), pages 93-110.
    18. Philipp Krüger & Augustin Landier & David Thesmar, 2015. "The WACC Fallacy: The Real Effects of Using a Unique Discount Rate," Journal of Finance, American Finance Association, vol. 70(3), pages 1253-1285, 06.
    19. Prabhsimran Singh & Yogesh K. Dwivedi & Karanjeet Singh Kahlon & Ravinder Singh Sawhney & Ali Abdallah Alalwan & Nripendra P. Rana, 0. "Smart Monitoring and Controlling of Government Policies Using Social Media and Cloud Computing," Information Systems Frontiers, Springer, vol. 0, pages 1-23.
    20. Bengtsson, Ola & Ekeblom, Daniel, 2014. "The Bright but Right View? A New Type of Evidence on Entrepreneurial Optimism," Working Paper Series 1008, Research Institute of Industrial Economics.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hal:journl:hal-01914791. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: CCSD (email available below). General contact details of provider: https://hal.archives-ouvertes.fr/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.