12 research outputs found

    Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise – an overview of considerations

    Get PDF
    A megatrend triad comprised of cloud computing, converged mobile devices, and consumerization presents complexchallenges to organizations trying to identify, assess, and mitigate risk. Cloud computing offers elastic just-in-time serviceswithout infrastructure overhead. However, visibility and control are compromised. Converged mobile devices offer integratedcomputing power and connectivity. However, end point control and security are compromised. Consumerization offersproductivity gains and reduction in support costs. However, end point control and the organization’s perimeter arecompromised. This paper presents an overview of considerations for organizations impacted by the megatrend triad and,subsequently, shows how threat modeling techniques can be used to identify, assess, and mitigate the attendant risks

    CONSUMERIZATION OF IT – WHERE IS THE THEORY?

    Get PDF
    Consumerization of IT (CoIT) is a key trend affecting society at large, including organizations of all kinds. A consensus about the defining aspects of CoIT has not yet been reached. Some refer to CoIT as employees bringing their own devices and technologies to work, while others highlight different aspects. While the debate about the nature and consequences of CoIT is still ongoing, many definitions have already been proposed. In this paper, we review these definitions and what is known about CoIT thus far. To guide future empirical research in this emerging area, we also review several established theories that have not yet been applied to CoIT but in our opinion have the potential to shed a deeper understanding on CoIT and its consequences. We discuss which elements of the reviewed theories are particularly relevant for understanding CoIT and thereby provide targeted guidance for future empirical research employing these theories. Overall, our paper may provide a useful starting point for addressing the lack of theorization in the emerging CoIT literature stream and stimulate discussion about theorizing CoIT

    A conceptual model of intention to adopt BYOD among HCP in Pakistan

    Get PDF
    Healthcare facilities and manpower in Pakistan are a generally acute shortage, incompetent. congested and overburden which cannot meet the requirements of the people visiting these facilities. Medical sectors are progressively looking for portable solutions to meet their Information Technology (IT) needs.To identify Healthcare Professionals (HCP) intention in both adopting the Bring Your Own Device (BYOD) and concerns related to security and privacy of their devices, the researchers propose a conceptual model by integrating the Consumer Acceptance and Use of Information Technology Extending the Unified Theory of Acceptance and Use of Technology (UTAUT2) and Protection Motivation Theory (PMT) which would impact their behavior intention in both using the device and provide the good understanding of concerns about security and privacy of their devices

    What Influences Technological Individualization? – An Analysis of Antecedents to IT Consumerization Behavior

    Get PDF
    IT consumerization refers to the adoption of consumer IT in the workplace and is regarded as one of the major future IT trends. However, little is yet understood with respects to the antecedents of the trend on an individual level, i.e. the IT consumerization behavior of individuals. We attempt to close this research gap by means of a quantitative analysis. First, we conceptualize IT consumerization and draw clear boundaries to existing concepts in the context of individual information systems. We then set out to derive possible antecedents from literature and quantitatively test their impact on IT consumerization intention. We are able to show that expected performance improvement as well as consumerization behavior of coworkers have a high significant impact, while personal innovativeness in IT does not significantly influence the intention to user technologies other than the ones provided by the enterprise

    Factors driving employee participation in corporate BYOD programs: A cross-national comparison from the perspective of future employees

    Get PDF
    As individuals all around the world increasingly use mobile devices in their daily life, their desire to use the same devices in the workplace continuously grows. In response, organizations are more and more allowing their employees to use their own devices for both business and private purposes and offer so called ‘Bring-your-own-Device’ (BYOD) programs. For organizations with global operations there is a need to examine the drivers of BYOD demand across different national cultures to assess how to develop a successful BYOD program. Based on recent literature on BYOD, we examine how different factors contribute to employees’ behavioural intention to participate in a BYOD program across different national cultures. The model was examined by surveying students from China, Germany and U.S. in their final term. The results show significant cross-cultural differences, particularly regarding the 'Perceived Threats'. Overall this study offers novel insights for cross cultural BYOD implementations

    Mobility and Security in the New Way of Working: Employee Satisfaction in a Choose Your Own Device(CYOD) Environment

    Get PDF
    The consumerization of IT, known as Bring Your Own Device (BYOD), is an inevitable component in the future IT infrastructure of organizations. It is not the question if employees will use consumer IT products for their work, but how and under which conditions. The use of personalized mobile devices may be beneficial for both the employee and organization, but the concern of IT executives, on corporate data residing on uncontrolled mobile devices, is often leading to a restrictive policy. Giving employees the ability to choose from a variety of secure devices, at the expense of the organization, Choose Your Own Device (CYOD), may well bring the best of two worlds. In this research 126 employees at four multinational organizations were surveyed on their perception of usability and satisfaction of devices for their knowledge tasks. The outcomes were matched against a Risk Assessment on seven identified IT threats. The results show that a majority (52%) believes their performance would improve, when given the ability to choose a device of their own. The Risk Assessment shows that IT security risks do not need to increase, provided that the proper security policies are in place. This implies that the performance and satisfaction of employee can improve in a secure CYOD environment

    The Business Perspective on Cloud Computing - A Literature Review of Research on Cloud Computing

    Get PDF
    This literature review synthesized the existing research on cloud computing from a business perspective by investigating 60 sources. It integrates their results in order to offer an overview about the existing body of knowledge. Using an established framework our results are structured according to the four dimensions following: cloud computing characteristics, adoption determinants, governance mechanisms, and business impact. This work reveals a shifting focus from technological aspects to a broader understanding of cloud computing as a new IT delivery model. There is a growing consensus about its characteristics and design principles. Unfortunately, research on factors driving or inhibiting the adoption of cloud services, as well as research investigating its business impact empirically, is still limited. This may be attributed to cloud computing being a rather recent research topic. Research on structures, processes and employee qualification to govern cloud services is at an early stage as well

    Does the Ability to Choose Matter? On the Relationship between Bring-your-own Behavior and IT Satisfaction

    Get PDF
    Employees increasingly complete organizational tasks using privately owned consumer technologies such as private devices (e.g., smartphones) or private Internet accounts (e.g., email accounts). Higher satisfaction constitutes a major reason for this bring-your-own behavior (BYOB). However, little research has theoretically explored and empirically tested this assumption. This study sheds light on this phenomenon by analyzing the effect of BYOB on IT satisfaction. Drawing from social cognitive theory, we propose choice self-efficacy as a new construct that intermediates the relationship between BYOB and IT satisfaction. Building on results from survey data (n = 400), we provide new evidence that BYOB has a positive effect on IT satisfaction whereby choice self-efficacy plays a vital element as it mediates this relationship. Since IT satisfaction shapes how people use technology and how they perform with it, we derive important implications for future research on IT consumerization. Furthermore, we provide several conclusions for practitioners and discuss how to enhance IT satisfaction and choice self-efficacy

    Bring Your Own Device (BYOD) adoption in South African SMEs

    Get PDF
    The advancement in technological development is now altering the conventional order in the diffusion of IT innovation from a top-down approach (organisation to employees) to a bottom-up approach (employees to organisation). This change is more notable in developed economies and has led to the Bring Your Own Device (BYOD) phenomenon which promises increased productivity for employees and their organisations. There have been several studies on the corporate adoption of BYOD but few have investigated the phenomenon from a small and medium enterprise (SME) perspective and from developing countries specifically. This study investigated the BYOD phenomenon in South African SMEs. The goal was to identify contextual factors influencing BYOD adoption with the purpose of understanding how these factors shaped and reshaped by SME actions. The Perceived EReadiness Model (PERM) was adopted to unearth contextual BYOD adoption factors, while the Structuration Theory was adopted as the theoretical lens from which the social construction of the BYOD phenomenon was understood. The study adopted an interpretive stance and was qualitative in nature. Data was collected from SMEs using semi-structured interviews, and analysed using a thematic analysis approach. The findings show that for BYOD to be adopted and institutionalized in an SME there needs to be organisational readiness in terms of awareness, management support, business resources, human resources, employees' pressure, formal governance, and technological readiness. Specifically, business resources, management support and technological readiness were perceived to be of the outmost importance to the success of BYOD. Environmental factors of market forces, support from industry, government readiness and the sociocultural factor are identified. Findings from the structuration analysis reports the presence of rules and resources (structures) which SMEs draw upon in their BYOD actions and interactions. It provides understanding on the guiding structures such as "no training" and "no formal governance" within which BYOD meanings are formed, and actions such as allowing employees to use their devices to access organisational resources without the fear of security breaches and data theft, are enacted. While it is true that the successive adoption of ICTs in organisation depends on the availability of a conducive formal policy, findings in the study show that SMEs used their business resources and management support as guiding structures of domination which were legitimized by internal informal verbal rules, lack of an institutional BYOD specific policy, minimal industry support; and the presences of social pressure
    corecore