Skip to main content
Log in

Security compliance and work-issued mobile devices: Out of sight, out of mind?

  • Original Article
  • Published:
Information Systems and e-Business Management Aims and scope Submit manuscript

Abstract

For security, economic, and efficiency reasons, many businesses supply mobile devices to employees to use both in the workplace and remotely, accompanied by policies governing their appropriate use. Extant research has shown that work-issued mobile devices can disrupt employees’ perceptions of work-life balance (WLB) and, indeed, WLB can impact employees’ job satisfaction and performance. The global COVID-19 pandemic meant that more employees than usual performed their work remotely, but this situation may have not fit the preferred WLB for some. Did this encroachment mean that appropriate use policies were forgotten? We conducted two rounds of surveys, one pre-pandemic and the other mid-pandemic, to determine whether those workplace changes led some employees astray. In other words, which type of WLB perceptions are more likely to lead to policy violations and how does the WLB mismatch cause deviant behaviors before and during the pandemic? The results from cluster analysis and the comparison between the pre and mid-pandemic suggest that policy violators were present in both time periods, but before the pandemic violators were in more compartmentalized work settings and mid-pandemic violators dominated all work settings.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Adisa TA, Gbadamosi G, Osabutey E (2017) What happened to the border? The role of mobile information technology devices on employees’ work-life balance. Pers Rev 46(8):1651–1671

    Article  Google Scholar 

  • Ahuja M, Chudoba K, Kacmar C, McKnight DH, George J (2007) IT road warriors: balancing work-family conflict, job autonomy, and work overload to mitigate turnover intentions. MIS Q 31(1):1–17

    Article  Google Scholar 

  • Alahmari S, Renaud K, Omoronyia I (2023) Moving beyond cyber security awareness and training to engendering security knowledge sharing. Inf Syst e-Bus Manag 21(1):123–158

    Article  Google Scholar 

  • Althammer SE, Reis D, van der Beek S, Beck L, Michel A (2021) A mindfulness intervention promoting work–life balance: how segmentation preference affects changes in detachment, well-being, and work–life balance. J Occup Organ Psychol 94(2):282–308

    Article  Google Scholar 

  • Armstrong D, Riemenschneider C, Giddens L (2018) The advancement and persistence of women in the information technology profession: an extension of Ahuja’s gendered theory of IT career stages. Inf Syst J 28(6):1082–1124

    Article  Google Scholar 

  • Barlow J, Warkentin M, Ormond D, Dennis A (2013) Don’t make excuses! Discouraging neutralization to reduce it policy violation. Comput Secur 39(B):145–159

    Article  Google Scholar 

  • Beauregard A (2014) Fairness perceptions of work−life balance initiatives: effects on counterproductive work behaviour. Br J Manag 25(4):772–789

    Article  Google Scholar 

  • Blumstein P, Weinstein E (1969) The redress of distributive injustice. Am J Sociol 74(4):408–418

    Article  Google Scholar 

  • Brown WS, Palvia PC (2020) Differing perceptions of mobile devices: company-issued devices and bring your own device (BYOD). Int J Mob Comput Multimed Commun 11(3):38–47

    Google Scholar 

  • Butts M, Becker W, Boswell W (2015) Hot buttons and time sinks: the effects of electronic communication during nonwork time on emotions and work-nonwork conflict. Acad Manag J 58(3):763–788

    Article  Google Scholar 

  • Cappelli P (2000) A market-driven approach to retaining talent. Harv Bus Rev 78(1):103–111

    Google Scholar 

  • Carlson D, Thompson M, Crawford W, Boswell W, Whitten D (2018) Your job is messing with mine! The impact of mobile device use for work during family time on the spouse’s work life. J Occup Health Psychol 23(4):471–482

    Article  Google Scholar 

  • Chaudhury A, Mallick D (2018) Can an ego defense mechanism model help explain dysfunctional is security behavior? Paper presented at the Twenty-fourth Americas Conference on Information Systems, New Orleans, LA

  • Chen L, Nath R (2008) A socio-technical perspective of mobile work. Inf Knowl Syst Manag 7(1):41–60

    Google Scholar 

  • Chen Y, Xia W, Cousins K (2022) Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Comput Secur 113:102568

    Article  Google Scholar 

  • Clark SC (2000) Work/family border theory: a new theory of work/family balance. Hum Relat 53(6):747–770

    Article  Google Scholar 

  • Colbert A, Yee N, George G (2016) The digital workforce and the workplace of the future. Acad Manag J 59(3):731–739

    Article  Google Scholar 

  • Colquitt JA, Scott BA, Rodell JB, Long DM, Zapata CP, Conlon DE, Wesson MJ (2013) Justice at the millennium, a decade later: a meta-analytic test of social exchange and affect-based perspectives. J Appl Psychol 98(2):199–236

    Article  Google Scholar 

  • Cooper JT, Kidwell RE, Eddleston KA (2013) Boss and parent, employee and child: work-family roles and deviant behavior in the family firm. Fam Relat 62(3):457–471

    Article  Google Scholar 

  • Cresswell JW (1994) Research design: qualitative and quantitative approaches. Sage Publications, Thousand Oaks

    Google Scholar 

  • Crossler R, Long J, Loraas T, Trinkle B (2014) Understanding compliance with bring your own device policies utilizing protection motivation theory: bridging the intentionbehavior gap. J Inf Syst 28(1):209–226

    Google Scholar 

  • D’Arcy J, Herath T, Shoss M (2014) Understanding employee responses to stressful information security requirements: a coping perspective. J Manag Inf Syst 31(2):285–318

    Article  Google Scholar 

  • D’Arcy J, Lowry PB (2019) Cognitive-affective drivers of employees’ daily compliance with information security policies: a multilevel, longitudinal study. Inf Syst J 29(1):43–69

    Article  Google Scholar 

  • Deery M, Jago L (2015) Revisiting talent management, work-life balance and retention strategies. Int J Contemp Hosp 27(3):453–472

    Article  Google Scholar 

  • Deloitte (2022) Women at Work 2022: A Global Outlook. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/global/Documents/deloitte-women-at-work-2022-a-global-outlook.pdf

  • Dén-Nagy I (2014) A double-edged sword?: A critical evaluation of the mobile phone in creating work–life balance. N Technol Work Employ 29(2):193–211

    Article  Google Scholar 

  • Fan W, Moen P (2022) Working more, less or the same during COVID-19? A mixed method, intersectional analysis of remote workers. Work Occup 49(2):143–186

    Article  Google Scholar 

  • Field JC, Chan XW (2018) Contemporary knowledge workers and the boundaryless work–life interface: implications for the human resource management of the knowledge workforce. Front Psychol 9:2414

    Article  Google Scholar 

  • Fischer LH, Baskerville R (2022) Explaining sociotechnical change: an unstable equilibrium perspective. Eur J Inf Syst 32(2023):634–652

    Google Scholar 

  • Gersick C (1991) Revolutionary change theories: a multilevel exploration of the punctuated equilibrium paradigm. Acad Manag Rev 16(1):10–36

    Article  Google Scholar 

  • Goel D, Jain AK (2018) Mobile phishing attacks and defence mechanisms: state of art and open research challenges. Comput Secur 73:519–544

    Article  Google Scholar 

  • Golden A (2009) Employee families and organizations as mutually enacted environments: a sensemaking approach to work–life interrelationships. Manag Commun Q 22(3):385–415

    Article  Google Scholar 

  • Grand Canyon University (2020) Work-Life Balance Stats Among Business Professionals. Retrieved from https://www.gcu.edu/blog/business-management/work-life-balance-stats-among-business-professionals. Accessed Dec 13, 2022

  • Greenberg J (1990) Looking fair versus being fair: managing impressions of organizational justice. In: Staw BM, Cummings LL (eds) Research in organizational behavior, vol 12. JAI Press, Greenwich, pp 111–157

    Google Scholar 

  • Gregor S (2006) The nature of theory in information systems. MIS Q 30(3):611–642

    Article  Google Scholar 

  • Gregor S, Klein G (2014) Eight obstacles to overcome in the theory testing genre. J Assoc Inf Syst 15(11):5

    Google Scholar 

  • Griffeth R, Gaertner S, Sager J (1999) Taxonomic model of withdrawal behaviors: the adaptive response model. Hum Resour Manag Rev 9(4):577–590

    Google Scholar 

  • Han CH, Tyagi S, Kim N, Choi B (2016) Understanding Internet service switching behaviour based on the stage model. IseB 14(3):665–689

    Article  Google Scholar 

  • Harris KJ, Marett K, Harris RB (2011) Technology-related pressure and work–family conflict: main effects and an examination of moderating variables. J Appl Soc Psychol 41(9):2077–2103

    Article  Google Scholar 

  • Henle C, Kohut G, Booth R (2009) Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: an empirical test of justice theory. Comput Hum Behav 25:902–910

    Article  Google Scholar 

  • Hill E, Hawkins A, Ferris M, Weitzman M (2001) Finding an extra day a week: the positive influence of perceived job flexibility on work and family life balance. Fam Relat 50(1):49–58

    Article  Google Scholar 

  • Hu Q, Xu Z, Dinev T, Ling H (2011) Does deterrence work in reducing information security policy abuse by employees? Commun ACM 54(6):54–60

    Article  Google Scholar 

  • Igbaria M, Greenhaus JH, Parasuraman S (1991) Career orientations of MIS employees: an empirical analysis. MIS Q 15(2):151–169

    Article  Google Scholar 

  • Kim S, Christensen A (2017) The dark and bright sides of personal use of technology at work: a job demands–resources model. Hum Resour Dev Rev 16(4):425–447

    Article  Google Scholar 

  • Koch H, Gonzalez E, Leidner D (2012) Bridging the work/social divide: the emotional response to organizational social networking sites. Eur J Inf Syst 21(6):699–717

    Article  Google Scholar 

  • König C, Caner de la Guardia M (2014) Exploring the positive side of personal Internet use at work: Does it help in managing the border between work and nonwork? Comput Hum Behav 30:355–360

    Article  Google Scholar 

  • Kwak D, Holtkamp P, Kim S (2019) Measuring and controlling social desirability Bias: applications in information systems research. J Assoc Inf Syst 20(4):317–345

    Google Scholar 

  • Lee J, Warkentin M, Crossler R, Otondo R (2017) Implications of monitoring mechanisms on bring your own device adoption. J Comput Inf Syst 57(4):309–318

    Google Scholar 

  • Li H, Sarathy R, Zhang J, Luo X (2014) Exploring the effects of organizational justice, personal ethics and sanction on Internet use policy compliance. Inf Syst J 24(6):479–502

    Article  Google Scholar 

  • MacKenzie S, Podsakoff P (2012) Common method bias in marketing: causes, mechanisms, and procedural remedies. J Retail 88(4):542–555

    Article  Google Scholar 

  • Martinko M, Gundlach M, Douglas S (2002) Toward an integrative theory of counterproductive workplace behavior: a causal reasoning perspective. Int J Sel Assess 10(1/2):36–50

    Article  Google Scholar 

  • Matusik S, Mickel A (2011) Embracing or embattled by converged mobile devices? Users’ experiences with a contemporary connectivity technology. Hum Relat 64(8):1001–1030

    Article  Google Scholar 

  • McGrath J (1995) Methodology matters: doing research in the behavioral and social sciences. In: Baecker RM, Grudin J, Buxton W, Greenberg S (eds) Readings in human-computer interaction. Morgan Kaufmann, San Francisco, pp 152–169

    Google Scholar 

  • Middleton C (2008) Do mobile technologies enable work–life balance? In: Hislop D (ed) Mobility and technology in the workplace. Routledge, Abingdon, pp 209–224

    Chapter  Google Scholar 

  • Palvia P, Mao E, Salam A, Soliman K (2003) Management information systems research: What’s there in a methodology? Commun Assoc Inf Syst 11(16):289–309

    Google Scholar 

  • Pinsonneault A, Kraemer K (1993) Survey research methodology in management information systems: an assessment. J Manag Inf Syst 10(2):75–105

    Article  Google Scholar 

  • Pitt J, Busquets D, Macbeth S (2014) Distributive justice for self-organised common-pool resource management. ACM Trans Auton Adapt Syst 9(3):14

    Article  Google Scholar 

  • Polites G, Serrano C, Thatcher J, Matthews K (2018) Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use. Eur J Inf Syst 27(5):600–621

    Article  Google Scholar 

  • Posey C, Bennett B, Roberts T, Lowry PB (2011) When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse. J Inf Syst Secur 7(1):24–47

    Google Scholar 

  • Prasopoulou E, Pouloudi A, Panteli N (2006) Enacting new temporal boundaries: the role of mobile phones. Eur J Inf Syst 15(3):277–284

    Article  Google Scholar 

  • Ramlall SJ (2008) Enhancing employee performance through positive organizational behavior. J Appl Soc Psychol 38(6):1580–1600

    Article  Google Scholar 

  • Reisinger PP (2022) Through the spying-glass: Data privacy concerns regarding mobile spyware apps. In: Proceedings of the Boston College Intellectual Property and Technology Forum, vol 2022. pp 1–18

  • Roemer J (1998) Theories of distributive justice. Harvard University Press, Cambridge

    Google Scholar 

  • Rousseau D, Fried Y (2001) Location, location, location: contextualizing organizational research. J Organ Behav 22(1):1–13

    Article  Google Scholar 

  • Sarker S, Ahuja M, Sarker S (2018) Work–life conflict of globally distributed software development personnel: an empirical investigation using border theory. Inf Syst Res 29(1):103–126

    Article  Google Scholar 

  • Sarker S, Sarker S, Xiao X, Ahuja M (2012) Managing employees’ use of mobile technologies to minimize work-life balance impacts. MIS Q Exec 11(4):143–157

    Google Scholar 

  • Saunders C, Kim J (2007) Editor’s comments: Perspectives on time. MIS Q 31(4):iii–xi

    Article  Google Scholar 

  • Schieman S, Narisada A (2021) A less objectionable greed? Work-life conflict and unjust pay during a pandemic. Res Soc Stratif Mobil 71:100564

    Google Scholar 

  • Scholarios D, Marks A (2004) Work-life balance and the software worker. Hum Resour Manag J 14(2):54–74

    Article  Google Scholar 

  • Stanko T, Beckman C (2015) Watching you watching me: Boundary control and capturing attention in the context of ubiquitous technology use. Acad Manag J 58(3):712–738

    Article  Google Scholar 

  • Stephens K (2018) Negotiating control: organizations and mobile communication. Oxford University Press, New York

    Book  Google Scholar 

  • Tams S, Grover V, Thatcher J, Ahuja M (2022) Grappling with modern technology: interruptions mediated by mobile devices impact older workers disproportionately. Inf Syst e-Bus Manag 20(4):635–655

    Article  Google Scholar 

  • Thakur SJ, Bhatnagar J (2017) Mediator analysis of job embeddedness: relationship between work-life balance practices and turnover intentions. Empl Relat 39(5):718–731

    Article  Google Scholar 

  • Tu YT, Sulistiawan J, Ekowati D, Rizaldy H (2022) Work-family conflict and salespeople deviant behavior: the mediating role of job stress. Heliyon 8(10):e10881

    Article  Google Scholar 

  • Vance A, Lowry PB, Eggett D (2013) Using accountability to reduce access policy violations in information systems. J Manag Inf Syst 29(4):263–289

    Article  Google Scholar 

  • Vance A, Siponen MT, Straub DW (2020) Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Inf Manag 57(4):103212

    Article  Google Scholar 

  • Vearrier L, Rosenberger K, Weber V (2018) Use of personal devices in healthcare: guidelines from a roundtable discussion. J Mob Technol Med 7(2):27–34

    Article  Google Scholar 

  • Von Bergen C, Bressler M (2019) Work, non-work boundaries and the right to disconnect. J Appl Bus Econ 21(2):51–69

    Google Scholar 

  • Whitten D, Hightower R, Sayeed L (2014) Mobile device adaptation efforts: the impact of hedonic and utilitarian value. J Comput Inf Syst 55(1):48–58

    Google Scholar 

  • Willison R, Warkentin M, Johnston AC (2018) Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Inf Syst J 28(2):266–293

    Article  Google Scholar 

  • Zedeck S (1992) Work, families, and organizations. Jossey-Bass, San Francisco

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kent Marett.

Ethics declarations

Competing interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix: Survey Items

Appendix: Survey Items

(responses range from 1: strongly disagree to 5: strongly agree)

Instructions: In this survey, we would like to know about your use of a mobile device that goes to work with you and comes home with you. A mobile device could include cell phones, tablets, or laptops. You may use more than one mobile device, in which case we would like you to think about your primary/main mobile device (the one you use most).

My company has a policy discouraging watching streaming video on this mobile device

My company has a policy that discourages me from accessing social media on this mobile device

My company has a policy that discourages me from shopping online for personal reasons on this mobile device

My company has a policy that discourages me from playing video games on this mobile device

My company has a policy that discourages me from browsing websites for personal reasons on this mobile device

My company has a policy that prevents my family members from using this mobile device

Please answer whether you perform the following activities with your primary work-issued mobile device.

I watch streaming video (YouTube, Netflix, etc.) on this mobile device

I access my social media (Facebook, Instagram, etc.) on this mobile device

I shop online for personal reasons (not business) with this mobile device

I play video games on this mobile device

I browse websites for personal reasons (not business) on this mobile device

My family members use this mobile device

Please rate the importance you place on each of the following.

Compensation that fairly rewards the amount of work spillover into my personal life

Internal satisfaction that I can accomplish both my work requirements and my personal life requirements

The ability to move seamlessly between my work and personal lives

Protection from supervisors/managers who may wish to impose their desired work-life balance on others who feel differently

How did your employer adjust your work-life balance during the COVID-19 outbreak last spring and summer?

(more time working from home / more time in the workplace / no change).

How often is security training provided?

(never / once a year / twice a year / several times a year / other).

figure a

Which of the graphics above best represents your current balance between your personal life and your work life?

Open-Ended Questions

Please describe your after-hours work at home, including checking email, completing reports, etc.

What is your job title?

How long have you worked with your current company (please answer with number of years)?

Table 3 Descriptive statistics for the importance of managerial strategy by WLB class, pre-pandemic sample
Table 4 Descriptive statistics for the importance of managerial strategy by WLB class, mid-pandemic sample
Table 5 Group means for the perceived policy strength and behavior by WLB class, pre-pandemic sample
Table 6 Group Means for the perceived policy strength and behavior by WLB class, mid-pandemic sample
Table 7 Cluster representation by WLB category, pre-pandemic sample
Table 8 Cluster representation by WLB category, mid-pandemic sample

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Marett, K., Xiao, S. & Kim, S. Security compliance and work-issued mobile devices: Out of sight, out of mind?. Inf Syst E-Bus Manage 21, 913–945 (2023). https://doi.org/10.1007/s10257-023-00654-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10257-023-00654-y

Keywords

Navigation