Bring your own device in organizations: ...
Document type :
Compte-rendu et recension critique d'ouvrage
Title :
Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users
Author(s) :
Baillette, Paméla [Auteur]
Montpellier Research in Management [MRM]
Barlette, Yves [Auteur]
Montpellier Research in Management [MRM]
Leclercq, Aurelie [Auteur]
Lille économie management - UMR 9221 [LEM]
Montpellier Research in Management [MRM]
Barlette, Yves [Auteur]
Montpellier Research in Management [MRM]
Leclercq, Aurelie [Auteur]
Lille économie management - UMR 9221 [LEM]
Journal title :
International Journal of Information Management
Pages :
76 - 84
Publisher :
Elsevier
Publication date :
2018-12
ISSN :
0143-6236
English keyword(s) :
Personal Mobile tools
Security paradoxes
BYOD
CEOs
Reversed IT adoption logic
Security paradoxes
BYOD
CEOs
Reversed IT adoption logic
HAL domain(s) :
Sciences de l'Homme et Société/Gestion et management
English abstract : [en]
This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, tablets and smartphones) to fulfil organizational tasks. BYOD provides opportunities, including the possibility of working ...
Show more >This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, tablets and smartphones) to fulfil organizational tasks. BYOD provides opportunities, including the possibility of working differently, for both CEOs and end users. However, BYOD involves high organizational and end user security risks. What are the benefits and risks for CEOs and end users of the reversed adoption logic of BYOD, and how can BYOD-related security paradoxes be overcome? A theoretical analysis is conducted with regard to the concept of the “reversed IT adoption logic” vs. the traditional IT adoption logic. This analysis highlights the security paradoxes linked to this reversed IT adoption and proposes means to overcome these paradoxes. If BYOD entails many opportunities, then it requires information security management to balance the induced risks for CEOs and users.Show less >
Show more >This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, tablets and smartphones) to fulfil organizational tasks. BYOD provides opportunities, including the possibility of working differently, for both CEOs and end users. However, BYOD involves high organizational and end user security risks. What are the benefits and risks for CEOs and end users of the reversed adoption logic of BYOD, and how can BYOD-related security paradoxes be overcome? A theoretical analysis is conducted with regard to the concept of the “reversed IT adoption logic” vs. the traditional IT adoption logic. This analysis highlights the security paradoxes linked to this reversed IT adoption and proposes means to overcome these paradoxes. If BYOD entails many opportunities, then it requires information security management to balance the induced risks for CEOs and users.Show less >
Language :
Anglais
Popular science :
Non
Collections :
Source :