Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/97051
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Management and Marketing | en_US |
| dc.contributor | Department of Industrial and Systems Engineering | en_US |
| dc.creator | Cho, V | en_US |
| dc.creator | Ip, WH | en_US |
| dc.date.accessioned | 2023-01-17T06:57:41Z | - |
| dc.date.available | 2023-01-17T06:57:41Z | - |
| dc.identifier.issn | 1751-7575 | en_US |
| dc.identifier.uri | http://hdl.handle.net/10397/97051 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Taylor & Francis | en_US |
| dc.rights | © 2017 Informa UK Limited, trading as Taylor & Francis Group | en_US |
| dc.rights | This is an Accepted Manuscript of an article published by Taylor & Francis in Enterprise Information Systems on 15 Nov 2017 (Published online), available at https://doi.org/10.1080/17517575.2017.1404132. | en_US |
| dc.subject | Adoption intention | en_US |
| dc.subject | Bring your own device | en_US |
| dc.subject | Job security | en_US |
| dc.subject | Organizational commitment | en_US |
| dc.subject | Security policy | en_US |
| dc.title | A study of BYOD adoption from the lens of threat and coping appraisal of its security policy | en_US |
| dc.type | Journal/Magazine Article | en_US |
| dc.identifier.spage | 659 | en_US |
| dc.identifier.epage | 673 | en_US |
| dc.identifier.volume | 12 | en_US |
| dc.identifier.issue | 6 | en_US |
| dc.identifier.doi | 10.1080/17517575.2017.1404132 | en_US |
| dcterms.abstract | Why would employees adopt bring your own device (BYOD)? Would employees feel risk-taking to perform their work by using their own devices? Would peer pressure and company policy help encourage their employees to BYOD and how? Using the Technology Threat Avoidance Theory (TTAT), we hypothesize the intention of adopting BYOD is due to the accessing of security policy by threat and coping appraisal. Moreover, we predict perceived usefulness, perceived ease of use, social influence, organizational commitment and job security are essential for formulating the adoption intention. In this study, 450 random employees were surveyed on their adoption perception of BYOD in their respective companies. The results support most of our hypotheses. We uncover perceived cost and privacy protection within the TTAT framework reflect no significance while organizational commitment and job security posit the strongest influences on employees’ BYOD adoption intention. This finding suggested that in order to roll out a successful and sustainable adoption intention on BYOD, organizations must consider measurements to build up employees’ job security as well as generate a strong sense of organization commitment. Specifically, our analyses show adoption intention is also affected by gender, age, and education level. | en_US |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | Enterprise information systems, 2018, v. 12, no. 6, p. 659-673 | en_US |
| dcterms.isPartOf | Enterprise information systems | en_US |
| dcterms.issued | 2018 | - |
| dc.identifier.scopus | 2-s2.0-85034075719 | - |
| dc.identifier.eissn | 1751-7583 | en_US |
| dc.description.validate | 202301 bckw | en_US |
| dc.description.oa | Accepted Manuscript | en_US |
| dc.identifier.FolderNumber | MM-0178 | - |
| dc.description.fundingSource | Others | en_US |
| dc.description.fundingText | The Hong Kong Polytechnic University | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.identifier.OPUS | 6797929 | - |
| dc.description.oaCategory | Green (AAM) | en_US |
| Appears in Collections: | Journal/Magazine Article | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Cho_Study_Byod_Adoption.pdf | Pre-Published version | 1.12 MB | Adobe PDF | View/Open |
Page views
65
Citations as of Apr 14, 2025
Downloads
118
Citations as of Apr 14, 2025
SCOPUSTM
Citations
34
Citations as of Dec 19, 2025
WEB OF SCIENCETM
Citations
16
Citations as of Oct 10, 2024
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



