This is my device! Why should I follow your rules? Employees' compliance with BYOD security policy
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hovav, Anat | - |
dc.contributor.author | Putri, Frida Ferdani | - |
dc.date.accessioned | 2021-09-03T19:44:49Z | - |
dc.date.available | 2021-09-03T19:44:49Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2016-10 | - |
dc.identifier.issn | 1574-1192 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/87438 | - |
dc.description.abstract | This study examines employees' intention to comply with organizational BYOD security policies (ISSP). We derived our research model from reactance, protection motivation and organizational justice theories. Our results demonstrate that employees perceived response efficacy and justice positively affect intention to comply with BYOD ISSP. Perceived freedom threat negatively affects compliance intention. Employees' perceived cost associated with compliance behavior increases perceptions of freedom threat. Security awareness programs have a dual effect: an increase in employee's response efficacy (positive) and response cost (negative). The availability of an IT support team for BYOD increases employees' response-efficacy and perceived justice. (C) 2016 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.subject | PERCEIVED ORGANIZATIONAL SUPPORT | - |
dc.subject | PROTECTION MOTIVATION | - |
dc.subject | FEAR APPEALS | - |
dc.subject | PSYCHOLOGICAL REACTANCE | - |
dc.subject | SELF-EFFICACY | - |
dc.subject | JUSTICE | - |
dc.subject | THREATS | - |
dc.subject | DETERRENCE | - |
dc.subject | COMMITMENT | - |
dc.subject | FRAMEWORK | - |
dc.title | This is my device! Why should I follow your rules? Employees' compliance with BYOD security policy | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hovav, Anat | - |
dc.identifier.doi | 10.1016/j.pmcj.2016.06.007 | - |
dc.identifier.scopusid | 2-s2.0-84992699668 | - |
dc.identifier.wosid | 000386789300005 | - |
dc.identifier.bibliographicCitation | PERVASIVE AND MOBILE COMPUTING, v.32, pp.35 - 49 | - |
dc.relation.isPartOf | PERVASIVE AND MOBILE COMPUTING | - |
dc.citation.title | PERVASIVE AND MOBILE COMPUTING | - |
dc.citation.volume | 32 | - |
dc.citation.startPage | 35 | - |
dc.citation.endPage | 49 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | PERCEIVED ORGANIZATIONAL SUPPORT | - |
dc.subject.keywordPlus | PROTECTION MOTIVATION | - |
dc.subject.keywordPlus | FEAR APPEALS | - |
dc.subject.keywordPlus | PSYCHOLOGICAL REACTANCE | - |
dc.subject.keywordPlus | SELF-EFFICACY | - |
dc.subject.keywordPlus | JUSTICE | - |
dc.subject.keywordPlus | THREATS | - |
dc.subject.keywordPlus | DETERRENCE | - |
dc.subject.keywordPlus | COMMITMENT | - |
dc.subject.keywordPlus | FRAMEWORK | - |
dc.subject.keywordAuthor | Information security policy | - |
dc.subject.keywordAuthor | BYOD | - |
dc.subject.keywordAuthor | Mobile virtualization | - |
dc.subject.keywordAuthor | Organizational justice | - |
dc.subject.keywordAuthor | Reactance theory | - |
dc.subject.keywordAuthor | Freedom threat | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.