EconPapers    
Economics at your fingertips  
 

Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users

Paméla Baillette, Yves Barlette () and Aurelie Leclercq-Vandelannoitte
Additional contact information
Paméla Baillette: MRM - Montpellier Research in Management - UPVM - Université Paul-Valéry - Montpellier 3 - UPVD - Université de Perpignan Via Domitia - Groupe Sup de Co Montpellier (GSCM) - Montpellier Business School - UM - Université de Montpellier
Yves Barlette: MRM - Montpellier Research in Management - UPVM - Université Paul-Valéry - Montpellier 3 - UPVD - Université de Perpignan Via Domitia - Groupe Sup de Co Montpellier (GSCM) - Montpellier Business School - UM - Université de Montpellier

Post-Print from HAL

Abstract: This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, tablets and smartphones) to fulfil organizational tasks. BYOD provides opportunities, including the possibility of working differently, for both CEOs and end users. However, BYOD involves high organizational and end user security risks. What are the benefits and risks for CEOs and end users of the reversed adoption logic of BYOD, and how can BYOD-related security paradoxes be overcome? A theoretical analysis is conducted with regard to the concept of the "reversed IT adoption logic" vs. the traditional IT adoption logic. This analysis highlights the security paradoxes linked to this reversed IT adoption and proposes means to overcome these paradoxes. If BYOD entails many opportunities, then it requires information security management to balance the induced risks for CEOs and users.

Keywords: Personal Mobile tools; Security paradoxes; BYOD; CEOs; Reversed IT adoption logic (search for similar items in EconPapers)
Date: 2018-12
References: Add references at CitEc
Citations:

Published in International Journal of Information Management, 2018, 43, pp.76 - 84. ⟨10.1016/j.ijinfomgt.2018.07.007⟩

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
Journal Article: Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users (2018) Downloads
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:hal:journl:hal-01914791

DOI: 10.1016/j.ijinfomgt.2018.07.007

Access Statistics for this paper

More papers in Post-Print from HAL
Bibliographic data for series maintained by CCSD ().

 
Page updated 2025-03-19
Handle: RePEc:hal:journl:hal-01914791