Loading...

Media is loading
 

Paper Type

ERF

Abstract

The rapid development in information technology systems has brought about the emergence and application of mobile computing and “Bring Your Own Device (BYOD)”. There are many factors that have led to the growing popularity of BYOD such as work flexibility, increased productivity, enhanced IT value to business, employee retention, reduced operational costs and efficiency of employees. Although BYOD programs have naturally become a widely accepted practice in the current technological landscape, there have been many studies indicating how BYOD program could be a source of risk to an organization’s security. This study offers a glimpse into the determinants of users’ compliance with BYOD security policy. More specifically, this study will examine the behavioral challenge of acceptance of BYOD policies through the lens of employees’ moral beliefs, subjective norms and self-regulation, and propose theoretically based managerial and technical approaches to address said behavior.

Share

COinS
 
Aug 10th, 12:00 AM

BYOD Security Policy Compliance: Role of Policy Awareness, Organizational Culture and Social Controls

The rapid development in information technology systems has brought about the emergence and application of mobile computing and “Bring Your Own Device (BYOD)”. There are many factors that have led to the growing popularity of BYOD such as work flexibility, increased productivity, enhanced IT value to business, employee retention, reduced operational costs and efficiency of employees. Although BYOD programs have naturally become a widely accepted practice in the current technological landscape, there have been many studies indicating how BYOD program could be a source of risk to an organization’s security. This study offers a glimpse into the determinants of users’ compliance with BYOD security policy. More specifically, this study will examine the behavioral challenge of acceptance of BYOD policies through the lens of employees’ moral beliefs, subjective norms and self-regulation, and propose theoretically based managerial and technical approaches to address said behavior.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.