Journal of the Midwest Association for Information Systems (JMWAIS)
Abstract
As security concerns have become critical to organizations’ Bring Your Own Device (BYOD) strategy, it is important for employees to comply with organization’s security measures and policies. Based on the protection motivation theory, this study develops a theoretical model to identify the key factors that affect an employee’s intention to comply with organization’s BYOD security policies. This model also enriches general Protection Motivation Theory (PMT) by investigating how unique BYOD features may play moderating roles on the relationships between employee’s security perceptions and compliance intention. A survey of organization employees who were using their own devices in their workplace was conducted. The research model was tested using the partial least squares (PLS) approach. The results suggest that employees’ threat appraisal and coping appraisal affect their intention to comply with BYOD security policies. Further, mixed usage of device and company surveillance visibility are verified moderators. This study contributes to both academics and management practice.
Recommended Citation
Tu, Cindy Zhiling; Adkins, Joni; and Zhao, Gary Yu
(2019)
"Complying with BYOD Security Policies: A Moderation Model Based on Protection Motivation Theory,"
Journal of the Midwest Association for Information Systems (JMWAIS): Vol. 2019:
Iss.
1, Article 2.
DOI: 10.17705/3jmwa.000045
Available at:
https://aisel.aisnet.org/jmwais/vol2019/iss1/2
DOI
10.17705/3jmwa.000045