Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users

作者:

Highlights:

• This conceptual paper explores the issues associated with BYOD-related practices.

• A twofold paradox related to BYOD and information security must be apprehended.

• BYOD-related practices provide opportunities but also high risks.

• Suggestions are offered to overcome the involved risks.

摘要

•This conceptual paper explores the issues associated with BYOD-related practices.•A twofold paradox related to BYOD and information security must be apprehended.•BYOD-related practices provide opportunities but also high risks.•Suggestions are offered to overcome the involved risks.

论文关键词:Reversed IT adoption logic,BYOD,CEOs,Security paradoxes,Personal Mobile tools

论文评审过程:Received 5 June 2018, Revised 16 July 2018, Accepted 16 July 2018, Available online 25 July 2018, Version of Record 25 July 2018.

论文官网地址:https://doi.org/10.1016/j.ijinfomgt.2018.07.007