32 research outputs found

    Consumerization of IT

    Get PDF
    The consumerization of information technology is one of the biggest trends occurring in the information technology (IT) industry. More organizations are allowing their employees to use their own mobile devices to share data both inside and outside the workplace. This new trend is fundamentally changing the way companies do business. The “Bring Your Own Device” (BYOD) trend is also driving a need for management of such mobile devices and greater security on the devices and for the employees. The consumerization of IT is well underway and it is more than just bringing an iPad into the office. Many IT managers and top level executives are in the process of figuring out how to integrate these consumer products and services into their environments rather than limiting them. System architects are being asked what the organization needs to purchase in order to support this growing trend. Do we need to implement a Mobile Device Management (MDM) platform? If so, who will administer and maintain that? The support and manageability of the consumerization of IT goes far beyond just the physical implementation of a platform. IT managers need to figure out what protocols to follow and to what extent are they expected to support them. Is the organization’s Service Desk expected to support these devices? Organizations need corporate policies and guidelines, such as Internet usage, that will be applied to these mobile devices. More importantly, the company needs to determine what sort of support it is willing to provide for user owned devices. Now that the pendulum is swinging toward allowing these devices in the enterprise, IT needs to be able to react quickly to ensure that they do not compromise the health and security of the given infrastructure of the organization. Updating formal policies and operating procedures must also be taken into consideration Regulatory concerns also arise when a type of technology is introduced. Any regulatory controls that are in place for existing technologies would also more than likely apply to new or emerging technologies as they are introduced to an organization. Sarbanes Oxley (SOX), HIPAA, and PCI are some of the common regulatory acts that standardize organizations. There is a good possibility that supporting consumer based technology products could actually lower costs for organizations. Launching such programs not only assists in reducing expenses, but it should also drive employees to be more productive and very satisfied with their performance due to the fact that they will be able to utilize devices they are currently familiar with and will also allow them to keep up to update with new technologies. Such a program will allow the employees to use a single device for all work functions and personal related activities like web surfing, personal communication, and playing games which normally would not be permitted as part of a corporate policy. Employees can move at their own pace to keep up with emerging technologies in the mobile industry. The consumerization of IT will allow corporate IT departments the ability to create a program with very limited rules to overcomplicate the work life of their employees and allowing those employees to have a freedom of choice to decide what consumer device they use for corporate use. Implementing the correct MDM tool will prevent the loss of sensitive company data on these devices while at the same time, providing a positive user experience for the employee and protecting their privacy. In conclusion, the consumerization of IT is moving at such a pace that it is reinventing the philosophy of IT and corporations need to start preparing sooner rather than later. Corporations today should seize this transition as an opportunity to be competitive instead of a threat to their structure and the quicker these policies and practices are implemented, the more productive corporations will become in their given marketplace. This analysis will propose solutions and best practices for companies to follow to take full advantage of the BYOD philosophy that is emerging in the workplace today to assure full compliance and protection of data

    Top-Ten IT Issues, 2014: Be the Change You See

    Get PDF

    Managing and Securing Business Networks in the Smartphone Era

    Get PDF
    This paper discusses the impact of user owned mobile computing devices (smartphones, tablets, and future devices like Google Glass) on management and security of the corporate network. Personally owned portable computing devices are widely used at work and create a porous network perimeter for the enterprise network. The paper reviews corporate policies posted on websites along with research papers and corporate whitepapers to develop a comprehensive user owned mobile computing device policy. This is a rapidly evolving topic that has not been researched in the business academic literature. We survey trade journals and corporate websites for information regarding this policy and make recommendations that can be applied by business managers

    Managing and Securing Business Networks in the Smartphone Era

    Get PDF
    This paper discusses the impact of user owned mobile computing devices (smartphones, tablets, and future devices like Google Glass) on management and security of the corporate network. Personally owned portable computing devices are widely used at work and create a porous network perimeter for the enterprise network. The paper reviews corporate policies posted on websites along with research papers and corporate whitepapers to develop a comprehensive user owned mobile computing device policy. This is a rapidly evolving topic that has not been researched in the business academic literature. We survey trade journals and corporate websites for information regarding this policy and make recommendations that can be applied by business managers

    The Shift to Mobility in the BI Industry

    Get PDF
    There is an ongoing shift to mobility in business IT, as well as in the consumer space. Users do not demand mobile availability anymore, they simply expect the ability to access business IT with consumer devices. Stemming from this demand, mobile business intelligence (BI) has emerged as a response from the BI industry. Thus, mobile BI is an extension of traditional BI into mobile devices. In line with this, the purpose of the thesis is to explore how the BI industry is approaching the shift to mobility and how this shift shapes mobile BI. Starting in the litera-ture, we constructed a theoretical framework. This was then used for collecting data through interviews with a total of six vendors and consultants in the BI industry. We conclude that the BI industry has a reactive rather than proactive approach to the shift to mobility. BI consultants and vendors follow and adapt to consumer patterns and solutions in the consumer space. Like-wise, mobile BI is being shaped by well-established, proven design and technological solutions in the consumer space

    Individual information systems : design, use, and a negative outcome in the business and private domain

    Get PDF
    Digitalization increasingly changes individuals business and private lives. Today, individuals build and use ever more complex individual information systems (IIS) composed of privately-owned and business-owned components. The COVID-19 pandemic has accelerated this development since individuals were forced to work from home due to the social distancing measures associated with the pandemic. The ongoing digitalization comes with great opportunities for individuals, such as higher mobility and flexibility, as well as for organizations, such as lower costs and increased productivity. However, the increased use of IIS at the workplace also bears risks for individuals. Such risks include technostress, which refers to stress that is caused by digital technologies. Technostress, in turn, can lead to health-related issues, reduced productivity, and higher turnover intentions. Thus, to leverage the positive opportunities of digitalization while reducing its associated risk of technostress, a better understanding of IIS, their use, and its effect on technostress, and of individual resources that may affect this relationship is needed. The aim of this dissertation is threefold: First, to contribute to a better understanding of layers of IIS and their different components. Second, since a negative outcome of IIS use can be technostress, this dissertation seeks to advance knowledge on technostress creators and how they can be influenced by IIS use and by various IIS characteristics. Third, this dissertation aims to reveal which resources of individuals may help mitigate technostress. This dissertation uses quantitative methods, such as online surveys and structural equation modeling, and qualitative methods, such as literature analyses and semi-structured interviews. Thereby, the methodological focus lies on quantitative data collection and analysis, while some papers use a mixed-methods approach as a combination of quantitative and qualitative methods. Chapter 2 of this dissertation aims at providing a better understanding of IIS by investigating its various components. Therefore, Chapter 2.1 conceptualizes four layers of IIS: devices, digital identities, relationships, and information. It also considers that IIS have two more or less integrated subsystems: the business information systems with business-owned components and the private information systems with privately-owned components. An empirical validation supports this conceptualization as well as the definition of integration between the two sub-systems on each of the four layers. Chapter 2.2 studies IT consumerization, which refers to the use of private IIS components in the business domain and applies a risk-benefit consideration. The results imply that benefits of consumerization of IT services, such as better functionalities of a private IT service outweigh risks, such as the threat of sanctions for the use of private IT services. Chapter 3 focuses on technostress as a negative outcome of the increased IIS use. Chapter 3.1 analyzes how IT consumerization is related to the technostress creator unreliability of digital technologies. The results reveal a positive relationship between IT consumerization and unreliability and show that unreliability is perceived higher when the IT portfolio integration and the individuals computer self-efficacy are low. Chapter 3.2 proceeds with studying characteristics of digital technologies and how these are related to technostress. It presents ten characteristics that are associated with at least one technostress creator. Chapter 3.3 extends the concept of technostress and introduces a framework of twelve different technostress creators, reveals four second-order factors underlying the twelve technostress creators, and brings them into relation with work- and health-related effects. Chapter 4 also deals with technostress and investigates resources to mitigate technostress. Chapter 4.1 focuses on organizational measures and finds different relationships of the investigated measures with different technostress creators. While some of the technostress creators can be inhibited by the implementation of organizational measures, others are found to be even intensified by the organizational measures. Chapter 4.2 focuses on social mechanisms that function as technostress inhibitors. Findings differ between technostress creators and the investigated social support dimensions. Furthermore, the results highlight the fact that some of the social support dimensions gain even greater importance in light of increasing telework. In summary, this dissertation provides new insights into IIS and their use, the emergence of technostress in digitalized workplaces, and organizational as well as social mechanisms that help mitigate technostress. Hence, this dissertation supports current efforts in both research and practice to reduce technostress while leveraging the positive opportunities of workplace digitalization.Die Digitalisierung verändert unser berufliches und privates Leben zunehmend und hat dazu geführt, dass Individuen heute immer komplexere individuelle Informationssysteme (IIS) nutzen. Die COVID-19-Pandemie hat diese Entwicklung noch beschleunigt, da Beschäftigte durch Social-Distancing-Maßnahmen gezwungen waren, von zu Hause aus zu arbeiten. Die fortschreitende Digitalisierung der Arbeitswelt bringt sowohl für Individuen als auch für Organisationen große Chancen mit sich, wie höhere Mobilität und Flexibilität sowie geringere Kosten und eine gesteigerte Produktivität. Allerdings birgt die verstärkte Nutzung von IIS am Arbeitsplatz auch Risiken. Dazu gehört Technostress, also Stress, der durch digitale Technologien verursacht wird. Technostress wiederum kann zu gesundheitlichen Problemen, verringerter Produktivität sowie einer höheren Fluktuationsrate führen. Um die Chancen der Digitalisierung nutzen und gleichzeitig die Risiken des Technostresses reduzieren zu können, ist ein besseres Verständnis über IIS, deren Nutzung und deren Auswirkung auf Technostress erforderlich sowie darüber, welche individuellen Ressourcen diesen Zusammenhang beeinflussen. Die vorliegende Dissertation verfolgt drei Ziele: Erstens soll zu einem besseren Verständnis über IIS und deren Komponenten beigetragen werden. Zweitens soll das Wissen über Auslöser von Technostress erweitert werden sowie darüber, wie Technostress durch die Nutzung von IIS und durch verschiedene IIS-Charakteristika beeinflusst werden kann. Drittens strebt die Dissertation an, aufzuzeigen, welche Ressourcen helfen, Technostress zu verringern. Zu diesem Zweck werden quantitative Methoden (z.B. Online-Befragungen und Strukturgleichungsmodellierung) und qualitative Methoden (Literaturanalysen und semi-strukturierte Interviews) eingesetzt. Der methodische Schwerpunkt liegt dabei auf der quantitativen Datenerhebung und -analyse, wobei teilweise ein Mixed-Methods-Ansatz als Kombination quantitativer und qualitativer Methoden verwendet wird. Kapitel 2 zielt auf ein besseres Verständnis über IIS und deren verschiedene Komponenten ab. Dafür werden in Kapitel 2.1 vier Ebenen eines IIS konzeptualisiert: Devices, Digital Identities, Beziehungen und Informationen. Zudem berücksichtigt die Konzeptualisierung, dass ein IIS aus zwei mehr oder weniger integrierten Subsystemen besteht: dem beruflichen und dem privaten Informationssystem. Eine empirische Validierung unterstützt die Konzeptualisierung sowie die Definition der Integration zwischen den Subsystemen auf jeder der vier Ebenen. Kapitel 2.2 analysiert IT-Consumerization also die Nutzung privater IIS-Komponenten im beruflichen Kontext. Die Ergebnisse zeigen, dass der relative Nutzen, wie z.B. bessere Funktionalitäten des privaten IT-Services, die wahrgenommenen Risiken, wie z.B. die Androhung von Sanktionen für die Nutzung privater IT-Services, überwiegt. Kapitel 3 beschäftigt sich mit Technostress als negativer Folge der verstärkten IIS-Nutzung. In Kapitel 3.1 wird analysiert, wie IT-Consumerization mit dem Belastungsfaktor Unzuverlässigkeit digitaler Technologien zusammenhängt. Die Ergebnisse zeigen einen positiven Zusammenhang, der noch stärker wahrgenommen wird, wenn die IT-Portfolio-Integration und die Computer-Selbstwirksamkeit des Individuums niedrig sind. Kapitel 3.2 untersucht Charakteristika digitaler Technologien und deren Zusammenhang mit Technostress. Es werden zehn Charakteristika gesammelt, die mit mindestens einem digitalen Belastungsfaktor zusammenhängen. Kapitel 3.3 erweitert das Technostress-Konzept und präsentiert zwölf digitale Belastungsfaktoren. Zudem werden vier Faktoren aufgedeckt, die den zwölf Belastungsfaktoren zugrunde liegen, und mit arbeits- und gesundheitsbezogenen Folgen in Zusammenhang gebracht. Kapitel 4 untersucht Ressourcen, die helfen können, Technostress zu mindern. Kapitel 4.1 untersucht organisatorische Maßnahmen und findet unterschiedliche Zusammenhänge der untersuchten Maßnahmen mit verschiedenen digitalen Belastungsfaktoren. Während einige der Belastungsfaktoren durch die organisatorischen Maßnahmen gehemmt werden, werden andere sogar verstärkt. Kapitel 4.2 untersucht soziale Mechanismen, die Technostress verringern können. Die Ergebnisse zeigen unterschiedliche Auswirkungen der untersuchten Dimensionen sozialer Unterstützung auf die digitalen Belastungsfaktoren. Darüber hinaus wird deutlich, dass einige der Dimensionen sozialer Unterstützung angesichts der zunehmenden Arbeit von zuhause eine noch größere Bedeutung erlangen. Zusammenfassend liefert die vorliegende Dissertation neue Erkenntnisse über IIS und deren Nutzung, die Entstehung von Technostress und über organisatorische sowie soziale Mechanismen, die helfen, Technostress zu mindern. Damit leistet die Dissertation einen Beitrag zu den aktuellen Initiativen in Forschung und Praxis, Technostress zu reduzieren und gleichzeitig die Chancen der Digitalisierung der Arbeit zu realisieren

    Information security concerns around enterprise bring your own device adoption in South African higher education institutions

    Get PDF
    The research carried out in this thesis is an investigation into the information security concerns around the use of personally-owned mobile devices within South African universities. This concept, which is more commonly known as Bring Your Own Device or BYOD has raised many data loss concerns for organizational IT Departments across various industries worldwide. Universities as institutions are designed to facilitate research and learning and as such, have a strong culture toward the sharing of information which complicates management of these data loss concerns even further. As such, the objectives of the research were to determine the acceptance levels of BYOD within South African universities in relation to the perceived security risks. Thereafter, an investigation into which security practices, if any, that South African universities are using to minimize the information security concerns was carried out by means of a targeted online questionnaire. An extensive literature review was first carried out to evaluate the motivation for the research and to assess advantages of using Smartphone and Tablet PC’s for work related purposes. Thereafter, to determine security concerns, other surveys and related work was consulted to determine the relevant questions needed by the online questionnaire. The quantity of comprehensive academic studies concerning the security aspects of BYOD within organizations was very limited and because of this reason, the research took on a highly exploratory design. Finally, the research deliberated on the results of the online questionnaire and concluded with a strategy for the implementation of a mobile device security strategy for using personally-owned devices in a work-related environment

    Role of Middle Managers in Mitigating Employee Cyberloafing in the Workplace

    Get PDF
    Companies in the United States are concerned about the indeterminate effectiveness of corporate cyberloafing mitigation efforts leading to the persistence of employee cyberloafing behavior. Although middle managers are the driving force behind the transformational influences that guide employee productivity and could proffer practical solutions, a lack of clarity surrounds the middle manager\u27s role in the overall cyberloafing mitigation efforts within organizations. The central research question for this transcendental phenomenological research study explored the lived experiences of middle managers regarding their roles in mitigating employee cyberloafing at higher education institutions in Florida. This study used a social constructivist-interpretive framework that draws from the multiple realities constructed through social interactions and lived experiences. Participants included 7 middle managers with experience mitigating cyberloafing at higher education institutions in Florida. Four major themes emerged from an inductive analysis of the data, including managing employee performance, proximity matters, cyberloafing interventions, and understanding employee online technology use. The results and recommendations of this study provide implications for social change. Business organizations may modify cyberloafing mitigation strategies and policies from a better understanding of manager/employee interactions, transformational managerial influences used to mitigate employee cyberloafing, and managerial knowledge of employee appropriation of online technology
    corecore