Start Date
12-16-2013
Description
Bring Your Own Device (BYOD) policies permit employees to use personal devices to access organizational information. Users gain convenience from the ability to work in geographically diverse locations, while organizations gain the benefit of increased productivity and reduced information technology expense. However, these symbiotic benefits come at a cost. Organizations’ security boundaries are now extended to include personal devices, which must be controlled to mitigate data exfiltration. This control comes in the form of monitoring employees’ personal devices, which infringe on their privacy. The monitoring mechanisms employed by organizations play a critical role in employee participation in a BYOD program. This study investigates the impact of monitoring mechanisms, privacy concerns, and job performance when evaluating whether to participate in a BYOD program. A factorial survey design was developed to test the hypotheses. Initial testing was performed and was used to modify the instrument for the main study currently in progress.
Recommended Citation
Lee, James; Crossler, Robert; and Warkentin, Merrill, "Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption" (2013). ICIS 2013 Proceedings. 23.
https://aisel.aisnet.org/icis2013/proceedings/ResearchInProgress/23
Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption
Bring Your Own Device (BYOD) policies permit employees to use personal devices to access organizational information. Users gain convenience from the ability to work in geographically diverse locations, while organizations gain the benefit of increased productivity and reduced information technology expense. However, these symbiotic benefits come at a cost. Organizations’ security boundaries are now extended to include personal devices, which must be controlled to mitigate data exfiltration. This control comes in the form of monitoring employees’ personal devices, which infringe on their privacy. The monitoring mechanisms employed by organizations play a critical role in employee participation in a BYOD program. This study investigates the impact of monitoring mechanisms, privacy concerns, and job performance when evaluating whether to participate in a BYOD program. A factorial survey design was developed to test the hypotheses. Initial testing was performed and was used to modify the instrument for the main study currently in progress.