Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users
作者:
Highlights:
• This conceptual paper explores the issues associated with BYOD-related practices.
• A twofold paradox related to BYOD and information security must be apprehended.
• BYOD-related practices provide opportunities but also high risks.
• Suggestions are offered to overcome the involved risks.
摘要
•This conceptual paper explores the issues associated with BYOD-related practices.•A twofold paradox related to BYOD and information security must be apprehended.•BYOD-related practices provide opportunities but also high risks.•Suggestions are offered to overcome the involved risks.
论文关键词:Reversed IT adoption logic,BYOD,CEOs,Security paradoxes,Personal Mobile tools
论文评审过程:Received 5 June 2018, Revised 16 July 2018, Accepted 16 July 2018, Available online 25 July 2018, Version of Record 25 July 2018.
论文官网地址:https://doi.org/10.1016/j.ijinfomgt.2018.07.007