Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

This is my device! Why should I follow your rules? Employees' compliance with BYOD security policy

Full metadata record
DC Field Value Language
dc.contributor.authorHovav, Anat-
dc.contributor.authorPutri, Frida Ferdani-
dc.date.accessioned2021-09-03T19:44:49Z-
dc.date.available2021-09-03T19:44:49Z-
dc.date.created2021-06-16-
dc.date.issued2016-10-
dc.identifier.issn1574-1192-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/87438-
dc.description.abstractThis study examines employees' intention to comply with organizational BYOD security policies (ISSP). We derived our research model from reactance, protection motivation and organizational justice theories. Our results demonstrate that employees perceived response efficacy and justice positively affect intention to comply with BYOD ISSP. Perceived freedom threat negatively affects compliance intention. Employees' perceived cost associated with compliance behavior increases perceptions of freedom threat. Security awareness programs have a dual effect: an increase in employee's response efficacy (positive) and response cost (negative). The availability of an IT support team for BYOD increases employees' response-efficacy and perceived justice. (C) 2016 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER-
dc.subjectPERCEIVED ORGANIZATIONAL SUPPORT-
dc.subjectPROTECTION MOTIVATION-
dc.subjectFEAR APPEALS-
dc.subjectPSYCHOLOGICAL REACTANCE-
dc.subjectSELF-EFFICACY-
dc.subjectJUSTICE-
dc.subjectTHREATS-
dc.subjectDETERRENCE-
dc.subjectCOMMITMENT-
dc.subjectFRAMEWORK-
dc.titleThis is my device! Why should I follow your rules? Employees' compliance with BYOD security policy-
dc.typeArticle-
dc.contributor.affiliatedAuthorHovav, Anat-
dc.identifier.doi10.1016/j.pmcj.2016.06.007-
dc.identifier.scopusid2-s2.0-84992699668-
dc.identifier.wosid000386789300005-
dc.identifier.bibliographicCitationPERVASIVE AND MOBILE COMPUTING, v.32, pp.35 - 49-
dc.relation.isPartOfPERVASIVE AND MOBILE COMPUTING-
dc.citation.titlePERVASIVE AND MOBILE COMPUTING-
dc.citation.volume32-
dc.citation.startPage35-
dc.citation.endPage49-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusPERCEIVED ORGANIZATIONAL SUPPORT-
dc.subject.keywordPlusPROTECTION MOTIVATION-
dc.subject.keywordPlusFEAR APPEALS-
dc.subject.keywordPlusPSYCHOLOGICAL REACTANCE-
dc.subject.keywordPlusSELF-EFFICACY-
dc.subject.keywordPlusJUSTICE-
dc.subject.keywordPlusTHREATS-
dc.subject.keywordPlusDETERRENCE-
dc.subject.keywordPlusCOMMITMENT-
dc.subject.keywordPlusFRAMEWORK-
dc.subject.keywordAuthorInformation security policy-
dc.subject.keywordAuthorBYOD-
dc.subject.keywordAuthorMobile virtualization-
dc.subject.keywordAuthorOrganizational justice-
dc.subject.keywordAuthorReactance theory-
dc.subject.keywordAuthorFreedom threat-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Business Administration > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE