Examining CEOs' behavior related to BYOD implementation through the CMUA
Author
Abstract
Suggested Citation
Note: View the original document on HAL open archive server: https://hal.umontpellier.fr/hal-02102830
Download full text from publisher
References listed on IDEAS
- repec:dau:papers:123456789/7048 is not listed on IDEAS
- Stephanie Moser & Susanne Elisabeth Bruppacher & Hans‐Joachim Mosler, 2011. "How People Perceive and Will Cope with Risks from the Diffusion of Ubiquitous Information and Communication Technologies," Risk Analysis, John Wiley & Sons, vol. 31(5), pages 832-846, May.
- Benlian, Alexander & Hess, Thomas, 2011. "Opportunities and risks of Software-as-a-Service: Findings from a survey of IT executives," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 58025, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
- Aurelie Leclercq-Vandelannoitte, 2015. "Leaving employees to their own devices: new practices in the workplace," Post-Print hal-02998112, HAL.
- Gary C. Moore & Izak Benbasat, 1991. "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation," Information Systems Research, INFORMS, vol. 2(3), pages 192-222, September.
- Yves Barlette & Katherine Gundolf & Annabelle Jaouen, 2017. "CEOs’ information security behavior in SMEs: Does ownership matter?," Post-Print hal-02000435, HAL.
- Necmi K. Avkiran & Christian M. Ringle (ed.), 2018. "Partial Least Squares Structural Equation Modeling," International Series in Operations Research and Management Science, Springer, number 978-3-319-71691-6, April.
- Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
- Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Morosan, Cristian, 2016. "An empirical examination of U.S. travelers’ intentions to use biometric e-gates in airports," Journal of Air Transport Management, Elsevier, vol. 55(C), pages 120-128.
- Corey Angst, 2009. "Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges," Journal of Business Ethics, Springer, vol. 90(2), pages 169-178, November.
- Mario Silic & Andrea Back, 2016. "The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 15(01), pages 151-185, January.
- Zhenhui (Jack) Jiang & Cheng Suang Heng & Ben C. F. Choi, 2013. "Research Note —Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions," Information Systems Research, INFORMS, vol. 24(3), pages 579-595, September.
- David Harborth & Sebastian Pape, 2020. "Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias," Future Internet, MDPI, vol. 12(12), pages 1-16, December.
- Yi Sun & Shihui Li & Lingling Yu, 2022. "The dark sides of AI personal assistant: effects of service failure on user continuance intention," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 17-39, March.
- Baillette, Paméla & Barlette, Yves & Leclercq-Vandelannoitte, Aurélie, 2018.
"Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users,"
International Journal of Information Management, Elsevier, vol. 43(C), pages 76-84.
- Paméla Baillette & Yves Barlette & Aurélie Leclercq-Vandelannoitte, 2018. "Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users," Post-Print hal-01914791, HAL.
- Faqih, Khaled M.S., 2016. "An empirical analysis of factors predicting the behavioral intention to adopt Internet shopping technology among non-shoppers in a developing country context: Does gender matter?," Journal of Retailing and Consumer Services, Elsevier, vol. 30(C), pages 140-164.
- Grace Fox & Lisa van der Werff & Pierangelo Rosati & Patricia Takako Endo & Theo Lynn, 2022. "Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: An extended privacy calculus perspective," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 944-967, July.
- Tajvidi, Mina & Richard, Marie-Odile & Wang, YiChuan & Hajli, Nick, 2020. "Brand co-creation through social commerce information sharing: The role of social media," Journal of Business Research, Elsevier, vol. 121(C), pages 476-486.
- Cheah, Jun-Hwa & Lim, Xin-Jean & Ting, Hiram & Liu, Yide & Quach, Sara, 2022. "Are privacy concerns still relevant? Revisiting consumer behaviour in omnichannel retailing," Journal of Retailing and Consumer Services, Elsevier, vol. 65(C).
- Kim, Yeolib & Kim, Seung Hyun & Peterson, Robert A. & Choi, Jeonghye, 2023. "Privacy concern and its consequences: A meta-analysis," Technological Forecasting and Social Change, Elsevier, vol. 196(C).
- Gao, Tao (Tony) & Rohm, Andrew J. & Sultan, Fareena & Pagani, Margherita, 2013. "Consumers un-tethered: A three-market empirical study of consumers' mobile marketing acceptance," Journal of Business Research, Elsevier, vol. 66(12), pages 2536-2544.
- Manish Mohan Baral & Amitabh Verma, 2021. "Cloud Computing Adoption for Healthcare: An Empirical Study Using SEM Approach," FIIB Business Review, , vol. 10(3), pages 255-275, September.
- Dah-Kwei Liou & Wen-Hai Chih & Li-Chun Hsu & Chia-Yi Huang, 2016. "Investigating information sharing behavior: the mediating roles of the desire to share information in virtual communities," Information Systems and e-Business Management, Springer, vol. 14(2), pages 187-216, May.
- Sumeet Gupta & Haejung Yun & Heng Xu & Hee-Woong Kim, 2017. "An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment," Information Technology for Development, Taylor & Francis Journals, vol. 23(1), pages 127-152, January.
- Tawfiq Alashoor & Mark Keil & H. Jeff Smith & Allen R. McConnell, 2023. "Too Tired and in Too Good of a Mood to Worry About Privacy: Explaining the Privacy Paradox Through the Lens of Effort Level in Information Processing," Information Systems Research, INFORMS, vol. 34(4), pages 1415-1436, December.
- Shugang Li & Kexin Peng & Boyi Zhu & Ziyi Li & Beiyan Zhang & Hui Chen & Ruoxuan Li, 2023. "Research on Users’ Privacy-Sharing Intentions in the Health Data Tracking System Providing Personalized Services and Public Services," Sustainability, MDPI, vol. 15(22), pages 1-21, November.
- Adilson Carlos Yoshikuni & Rajeev Dwivedi & Ronaldo Gomes Dultra-de-Lima & Claudio Parisi & José Carlos Tiomatsu Oyadomari, 2023. "Role of Emerging Technologies in Accounting Information Systems for Achieving Strategic Flexibility through Decision-Making Performance: An Exploratory Study Based on North American and South American," Global Journal of Flexible Systems Management, Springer;Global Institute of Flexible Systems Management, vol. 24(2), pages 199-218, June.
- Helia Marreiros & Mirco Tonin & Michael Vlassopoulos & M.C. Schraefel, 2016.
"“Now that you mention it”: A Survey Experiment on Information, Salience and Online Privacy,"
BEMPS - Bozen Economics & Management Paper Series
BEMPS34, Faculty of Economics and Management at the Free University of Bozen.
- Helia Marreiros & Mirco Tonin & Michael Vlassopoulos & m.c. schraefel, 2016. ""Now that you mention it": A Survey Experiment on Information, Salience and Online Privacy," CESifo Working Paper Series 5756, CESifo.
More about this item
Keywords
BYOD; CMUA; CEO; Security paradox; Coping; Behavior 2;All these keywords.
NEP fields
This paper has been announced in the following NEP Reports:- NEP-BEC-2019-05-20 (Business Economics)
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hal:journl:hal-02102830. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: CCSD (email available below). General contact details of provider: https://hal.archives-ouvertes.fr/ .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.