IDEAS home Printed from https://ideas.repec.org/p/hal/journl/hal-02102830.html
   My bibliography  Save this paper

Examining CEOs' behavior related to BYOD implementation through the CMUA

Author

Listed:
  • Paméla Baillette

    (MRM - Montpellier Research in Management - UPVM - Université Paul-Valéry - Montpellier 3 - UPVD - Université de Perpignan Via Domitia - Groupe Sup de Co Montpellier (GSCM) - Montpellier Business School - UM - Université de Montpellier)

  • Yves Barlette

    (Groupe Sup de Co Montpellier (GSCM) - Montpellier Business School)

Abstract

Despite prior research on the 'Bring Your Own Device' (BYOD) phenomenon, little attention has been paid to perceptions of opportunities/threats associated with the implementation of BYOD by CEOs. This quantitative study is based on the coping model of user adaptation (CMUA). We enriched this model with quantitative constructs for assessing the CEOs' beneficial and threatening perceptions of BYOD implementation. We also added CEOs' information security (ISS) concern, in order to identify potential security paradoxes, i.e., discrepancies between their concerns and the adopted coping strategies. Results indicate that perceived opportunities/threats and perceived behavioral control have an impact on the type of coping strategy adopted. This study clarifies the operationalization of an enriched CMUA and offers managerial contributions regarding improved protection of corporate information when implementing BYOD. These are the first results concerning 61 CEOs. The full results will be released during the AIM conference with 200+ responses in May 2018.

Suggested Citation

  • Paméla Baillette & Yves Barlette, 2018. "Examining CEOs' behavior related to BYOD implementation through the CMUA," Post-Print hal-02102830, HAL.
  • Handle: RePEc:hal:journl:hal-02102830
    Note: View the original document on HAL open archive server: https://hal.umontpellier.fr/hal-02102830
    as

    Download full text from publisher

    File URL: https://hal.umontpellier.fr/hal-02102830/document
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. repec:dau:papers:123456789/7048 is not listed on IDEAS
    2. Stephanie Moser & Susanne Elisabeth Bruppacher & Hans‐Joachim Mosler, 2011. "How People Perceive and Will Cope with Risks from the Diffusion of Ubiquitous Information and Communication Technologies," Risk Analysis, John Wiley & Sons, vol. 31(5), pages 832-846, May.
    3. Benlian, Alexander & Hess, Thomas, 2011. "Opportunities and risks of Software-as-a-Service: Findings from a survey of IT executives," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 58025, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    4. Aurelie Leclercq-Vandelannoitte, 2015. "Leaving employees to their own devices: new practices in the workplace," Post-Print hal-02998112, HAL.
    5. Gary C. Moore & Izak Benbasat, 1991. "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation," Information Systems Research, INFORMS, vol. 2(3), pages 192-222, September.
    6. Yves Barlette & Katherine Gundolf & Annabelle Jaouen, 2017. "CEOs’ information security behavior in SMEs: Does ownership matter?," Post-Print hal-02000435, HAL.
    7. Necmi K. Avkiran & Christian M. Ringle (ed.), 2018. "Partial Least Squares Structural Equation Modeling," International Series in Operations Research and Management Science, Springer, number 978-3-319-71691-6, April.
    8. Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
    9. Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Morosan, Cristian, 2016. "An empirical examination of U.S. travelers’ intentions to use biometric e-gates in airports," Journal of Air Transport Management, Elsevier, vol. 55(C), pages 120-128.
    2. Corey Angst, 2009. "Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges," Journal of Business Ethics, Springer, vol. 90(2), pages 169-178, November.
    3. Mario Silic & Andrea Back, 2016. "The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 15(01), pages 151-185, January.
    4. Zhenhui (Jack) Jiang & Cheng Suang Heng & Ben C. F. Choi, 2013. "Research Note —Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions," Information Systems Research, INFORMS, vol. 24(3), pages 579-595, September.
    5. David Harborth & Sebastian Pape, 2020. "Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias," Future Internet, MDPI, vol. 12(12), pages 1-16, December.
    6. Yi Sun & Shihui Li & Lingling Yu, 2022. "The dark sides of AI personal assistant: effects of service failure on user continuance intention," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 17-39, March.
    7. Baillette, Paméla & Barlette, Yves & Leclercq-Vandelannoitte, Aurélie, 2018. "Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users," International Journal of Information Management, Elsevier, vol. 43(C), pages 76-84.
    8. Faqih, Khaled M.S., 2016. "An empirical analysis of factors predicting the behavioral intention to adopt Internet shopping technology among non-shoppers in a developing country context: Does gender matter?," Journal of Retailing and Consumer Services, Elsevier, vol. 30(C), pages 140-164.
    9. Grace Fox & Lisa van der Werff & Pierangelo Rosati & Patricia Takako Endo & Theo Lynn, 2022. "Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: An extended privacy calculus perspective," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 944-967, July.
    10. Tajvidi, Mina & Richard, Marie-Odile & Wang, YiChuan & Hajli, Nick, 2020. "Brand co-creation through social commerce information sharing: The role of social media," Journal of Business Research, Elsevier, vol. 121(C), pages 476-486.
    11. Cheah, Jun-Hwa & Lim, Xin-Jean & Ting, Hiram & Liu, Yide & Quach, Sara, 2022. "Are privacy concerns still relevant? Revisiting consumer behaviour in omnichannel retailing," Journal of Retailing and Consumer Services, Elsevier, vol. 65(C).
    12. Kim, Yeolib & Kim, Seung Hyun & Peterson, Robert A. & Choi, Jeonghye, 2023. "Privacy concern and its consequences: A meta-analysis," Technological Forecasting and Social Change, Elsevier, vol. 196(C).
    13. Gao, Tao (Tony) & Rohm, Andrew J. & Sultan, Fareena & Pagani, Margherita, 2013. "Consumers un-tethered: A three-market empirical study of consumers' mobile marketing acceptance," Journal of Business Research, Elsevier, vol. 66(12), pages 2536-2544.
    14. Manish Mohan Baral & Amitabh Verma, 2021. "Cloud Computing Adoption for Healthcare: An Empirical Study Using SEM Approach," FIIB Business Review, , vol. 10(3), pages 255-275, September.
    15. Dah-Kwei Liou & Wen-Hai Chih & Li-Chun Hsu & Chia-Yi Huang, 2016. "Investigating information sharing behavior: the mediating roles of the desire to share information in virtual communities," Information Systems and e-Business Management, Springer, vol. 14(2), pages 187-216, May.
    16. Sumeet Gupta & Haejung Yun & Heng Xu & Hee-Woong Kim, 2017. "An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment," Information Technology for Development, Taylor & Francis Journals, vol. 23(1), pages 127-152, January.
    17. Tawfiq Alashoor & Mark Keil & H. Jeff Smith & Allen R. McConnell, 2023. "Too Tired and in Too Good of a Mood to Worry About Privacy: Explaining the Privacy Paradox Through the Lens of Effort Level in Information Processing," Information Systems Research, INFORMS, vol. 34(4), pages 1415-1436, December.
    18. Shugang Li & Kexin Peng & Boyi Zhu & Ziyi Li & Beiyan Zhang & Hui Chen & Ruoxuan Li, 2023. "Research on Users’ Privacy-Sharing Intentions in the Health Data Tracking System Providing Personalized Services and Public Services," Sustainability, MDPI, vol. 15(22), pages 1-21, November.
    19. Adilson Carlos Yoshikuni & Rajeev Dwivedi & Ronaldo Gomes Dultra-de-Lima & Claudio Parisi & José Carlos Tiomatsu Oyadomari, 2023. "Role of Emerging Technologies in Accounting Information Systems for Achieving Strategic Flexibility through Decision-Making Performance: An Exploratory Study Based on North American and South American," Global Journal of Flexible Systems Management, Springer;Global Institute of Flexible Systems Management, vol. 24(2), pages 199-218, June.
    20. Helia Marreiros & Mirco Tonin & Michael Vlassopoulos & M.C. Schraefel, 2016. "“Now that you mention it”: A Survey Experiment on Information, Salience and Online Privacy," BEMPS - Bozen Economics & Management Paper Series BEMPS34, Faculty of Economics and Management at the Free University of Bozen.

    More about this item

    Keywords

    BYOD; CMUA; CEO; Security paradox; Coping; Behavior 2;
    All these keywords.

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hal:journl:hal-02102830. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: CCSD (email available below). General contact details of provider: https://hal.archives-ouvertes.fr/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.