Start Date
11-8-2016
Description
Bring your own device (BYOD) is no longer the exception, it is the norm. Almost every employee today brings his or her own devices to the work environment. This has introduced new challenges to the current efforts to understand the mechanisms that can influence employee’s compliance behavior with regard to information security rules and policies. The key challenges relate to the creation of gray areas by the phenomenon of BYOD through diminishment of the boundaries between work and life domains. In this article, we define a framework of BYOD contextual factors, and the impact of each contextual factor on employees’ compliance behaviors relating to information security policy is presented from a work/life perspective. Accordingly, we have reviewed current information security studies in order to illustrate the current gap in the literature. Finally, we put forward a set of propositions and recommendations for future research.
Recommended Citation
Alaskar, Mohamed and Shen, Kathy Ning, "Understanding Bring Your Own Device (BYOD) and Employee Information Security Behaviors from A Work-Life Domain Perspective" (2016). AMCIS 2016 Proceedings. 38.
https://aisel.aisnet.org/amcis2016/ISSec/Presentations/38
Understanding Bring Your Own Device (BYOD) and Employee Information Security Behaviors from A Work-Life Domain Perspective
Bring your own device (BYOD) is no longer the exception, it is the norm. Almost every employee today brings his or her own devices to the work environment. This has introduced new challenges to the current efforts to understand the mechanisms that can influence employee’s compliance behavior with regard to information security rules and policies. The key challenges relate to the creation of gray areas by the phenomenon of BYOD through diminishment of the boundaries between work and life domains. In this article, we define a framework of BYOD contextual factors, and the impact of each contextual factor on employees’ compliance behaviors relating to information security policy is presented from a work/life perspective. Accordingly, we have reviewed current information security studies in order to illustrate the current gap in the literature. Finally, we put forward a set of propositions and recommendations for future research.