Abstract
IT Consumerization, the use of privately-owned IT devices and applications in place of business IT, has become a significant trend in organizations today. We provide a review and interpretation of existing literature on IT Consumerization, incorporating research on boundary blurring, bring-your-own-device (BYOD) programs and Shadow IT. We then synthesize and extend the current body of knowledge by drawing on general deterrence theory, expectation-confirmation theory and neutralization theory to provide a model of private IT use within the enterprise. Our aim is to contribute to an understanding of the paths by which various categories of private IT use occur, and develop a testable research model to allow them to be explored in a coherent manner.
Recommended Citation
Pirani, Naqaash and Meister, Darren, "IT Consumerization: A Model of Private IT Use in Organizations" (2014). DIGIT 2014 Proceedings. 5.
https://aisel.aisnet.org/digit2014/5