Abstract

IT Consumerization, the use of privately-owned IT devices and applications in place of business IT, has become a significant trend in organizations today. We provide a review and interpretation of existing literature on IT Consumerization, incorporating research on boundary blurring, bring-your-own-device (BYOD) programs and Shadow IT. We then synthesize and extend the current body of knowledge by drawing on general deterrence theory, expectation-confirmation theory and neutralization theory to provide a model of private IT use within the enterprise. Our aim is to contribute to an understanding of the paths by which various categories of private IT use occur, and develop a testable research model to allow them to be explored in a coherent manner.

Share

COinS