Advertisement

Impact of Mobile IT Consumerization on Organizations – An Empirical Study on the Adoption of BYOD Practices

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10294)

Abstract

The last few years have seen more and more employees using their personal mobile devices for work-related tasks. This phenomenon is part of a broader trend known as IT consumerization. Enterprises and employees have recognized that they might profit from these developments and implemented “Bring Your Own Device” (BYOD) policies, but they also have to face new challenges. This study investigates which types of employees adopt BYOD and how they benefit from it. To address these questions, the authors conducted a survey with 219 participants. Participants were classified into adopter types based on the Diffusion of Innovation Theory. The results indicate that early adopters and the early majority use their personal smartphones more often for work-related tasks than laggards, and that innovators and early adopters more often receive work-related email on their personal smartphones than other adopter types. It is concluded that DOI can successfully be applied to explain BYOD adoption behavior. Differentiated management strategies have to be applied in order to address the whole workforce.

Keywords

BYOD Mobile Diffusion of innovation theory IT consumerization Adoption 

References

  1. 1.
    Aquino, C., Radwanick, S.: Mobile Future in Focus 2012 (2012). http://www.comscore.com/Insights/Presentations_and_Whitepapers/2012/2012_Mobile_Future_in_Focus
  2. 2.
  3. 3.
    Sammer, T.: Why is there variation in the nature of organizational mobile IT adoption? an empirical study of the influence of organizational culture on organizational mobile IT adoption. In: 12th International Conference on Mobile Business, Berlin, pp. 1–12 (2013)Google Scholar
  4. 4.
    Larosiliere, G., Meske, C., Carter, L.: Determinants of social network adoption: a country-level analysis (nominated for the best paper award). In: Proceedings of the 48th Hawaii International Conference on System Sciences (HICSS), pp. 3424–3433 (2015). doi: 10.1109/HICSS.2015.412
  5. 5.
    Dobe, B.: BYOD vor dem Absturz (2012). http://www.cio.de/bring-your-own-device/2896418/
  6. 6.
    Harris, M.A., Patten, K., Regan, E., Fjermestad, J.: Mobile and connected device security considerations: a dilemma for small and medium enterprise business mobility? In: Proceedings of the 18th Americas Conference on Information Systems, Seattle, pp. 1677–1683 (2012)Google Scholar
  7. 7.
    Hopkins, N., Sylvester, A., Tate, M.: Motivations for BYOD: an investigation of the contents of a 21st century school bag. In: Proceedings of the 21st European Conference on Information Systems, Utrecht (2013)Google Scholar
  8. 8.
    Harris, J.G., Ives, B., Junglas, I.: IT consumerization: when gadgets turn into enterprise IT tools. MIS Q. Executive 11, 99–112 (2012)Google Scholar
  9. 9.
    Köffer, S., Ortbach, K.C., Niehaves, B.: Exploring the relationship between IT consumerization and job performance: a theoretical framework for future research. Commun. Assoc. Inf. Syst. 35, 261–283 (2014)Google Scholar
  10. 10.
    Moore, G.: Systems of Engagement and The Future of Enterprise IT. AIIM, p. 14 (2011)Google Scholar
  11. 11.
    Stieglitz, S., Lattemann, C., Brockmann, T.: Mobile applications for knowledge workers and field workers. Mobile Inf. Syst. 2015, 1–8 (2015). doi: 10.1155/2015/372315 CrossRefGoogle Scholar
  12. 12.
    Ahuja, M.K., Chudoba, K.M., Kacmar, C.J., Mcknight, D.H., George, J.F.: IT road warriors: balancing work-family conflict, job autonomy, and work overload to mitigate turnover intentions. MIS Q. 31, 1–17 (2007)Google Scholar
  13. 13.
    Rhee, K., Jeon, W., Won, D.: Security requirements of a mobile device management system. Int. J. Secur. Appl. 6, 353–358 (2012)Google Scholar
  14. 14.
    Gartner. Gartner’s 2012 Hype Cycle for Emerging Technologies Identifies ‘Tipping Point’ Technologies That Will Unlock Long-Awaited Technology Scenarios 2012 (2012). https://www.gartner.com/newsroom/id/2124315
  15. 15.
    Rogers, E.M.: Diffusion of Innovations, 5th edn. The Free Press, New York (2003)Google Scholar
  16. 16.
    Cheikh-Ammar, M., Barki, H.: Technology desirability. In: Proceedings of the 33rd International Conference on Information Systems, Orlando (2012)Google Scholar
  17. 17.
    Ruegge, I.: Mobile Solutions - Einsatzpotenziale, Nutzungsprobleme und Lösungsansätze, Mobile Solutions - Einsatzpotenziale, Nutzungsprobleme und Lösungsansätze, Teubner Research (2007)Google Scholar
  18. 18.
    Amft, O., Lukowicz, P.: From backpacks to smartphones: past, present, and future of wearable computers. IEEE Pervasive Comput. 8, 8–13 (2009). doi: 10.1109/MPRV.2009.44 CrossRefGoogle Scholar
  19. 19.
    Wiredu, G.O.: User appropriation of mobile technologies: Motives, conditions and design properties. Inf. Organ. 17, 110–129 (2007). doi: 10.1016/j.infoandorg.2007.03.002 CrossRefGoogle Scholar
  20. 20.
    Ladd, D.A., Datta, A., Sarker, S., Yu, Y.: Trends in mobile computing within the IS discipline: a ten-year retrospective. Commun. Assoc. Inf. Syst. 27, 285–316 (2010)Google Scholar
  21. 21.
    Chandra, S.S., Srivastava, S.C., Theng, Y.L.: Evaluating the role of trust in consumer adoption of mobile payment systems: an empirical analysis. Commun. Assoc. Inf. Syst. 27, 561–588 (2010)Google Scholar
  22. 22.
    Markova, M., Aula, A., Vainio, T., Wigelius, H., Kulju, M.: MoBiS-Q: a tool for evaluating the success of mobile business services. In: Proceedings of the 9th International Conference on Human Computer Interaction with Mobile Devices and Services, Singapore, pp. 238–245 (2007). doi: 10.1145/1377999.1378013
  23. 23.
    Penttinen, E., Rossi, M., Tuunainen, V.K.: Mobile games: Analyzing the needs and values of the consumers. J. Inf. Technol. Theory Appl. 11, 5–22 (2010)Google Scholar
  24. 24.
    Steele, R., Tao, W.: MobiPass: a passport for mobile business. Pers. Ubiquit. Comput. 11, 157–169 (2006). doi: 10.1007/s00779-006-0100-9 CrossRefGoogle Scholar
  25. 25.
    Schadler, T., McCarthy, J.: Mobile is the New Face of Engagement-CIOs Must Plan Now for New Systems of Engagement. Forrester Research (2012)Google Scholar
  26. 26.
    Willis, D.A.: Bring Your Own Device: New Opportunities. New Challenges, Gartner (2012)Google Scholar
  27. 27.
    Golden, A.G., Geisler, C.: Work-life boundary management and the personal digital assistant. Hum. Relat. 60, 519–551 (2007). doi: 10.1177/0018726707076698 CrossRefGoogle Scholar
  28. 28.
    Stieglitz, S., Schallenmüller, S., Meske, C.: Adoption of social media for internal usage in a global enterprise. In: Proceedings of the IEEE 27th International Conference on Advanced Information Networking and Applications, pp. 1483–1488 (2013). doi: 10.1099/WAINA.2013.212
  29. 29.
    Stieglitz, S., Riemer, K., Meske, C.: Hierarchy or activity? the role of formal and informal influence in eliciting responses from enterprise social networks. In: Proceedings of the 22nd European Conference on Information Systems (2014)Google Scholar
  30. 30.
    Riemer, K., Stieglitz, S., Meske, C.: From top to bottom: investigating the changing role of hierarchy in enterprise social networks. Bus. Inf. Syst. Eng. 57, 197–212 (2015). doi: 10.1007/s12599-015-0375-3 CrossRefGoogle Scholar
  31. 31.
    Stieglitz, S., Meske, C.: Maßnahmen für die Einführung und den Betrieb unternehmensinterner Social Media. HMD – Praxis der Wirtschaftsinformatik, pp. 36–43 (2012). doi: 10.1007/BF03340735
  32. 32.
    Meske, C., Brockmann, T., Wilms, K., Stieglitz, S.: Social collaboration and gamification. In: Stieglitz, S., Lattemann, C., Robra-Bissantz, S., Zarnekow, R., Brockmann, T. (eds.) Gamification - Using Game Elements in Serious Contexts, pp. 93–109. Springer, Berlin (2016). doi: 10.1007/978-3-319-45557-0_7
  33. 33.
    Dery, K., MacCormick, J.: Managing mobile technology: The shift from mobility to connectivity. MIS Q. Executive 11, 159–173 (2012)Google Scholar
  34. 34.
    Stieglitz, S., Brockmann, T.: Increasing organizational performance by transforming into a mobile enterprise. MIS Q. Executive 11, 189–204 (2012)Google Scholar
  35. 35.
    Basole, R.C.: The emergence of the mobile enterprise: a value-driven perspective. In: Proceedings of the 6th International Conference on the Management of Mobile Business, ICMB 2007, p. 41 (2007). doi: 10.1109/ICMB.2007.63
  36. 36.
    Davis, G.B.: Anytime/anyplace computing and the future of knowledge work. Commun. ACM 45, 67–73 (2002). doi: 10.1145/585597.585617 CrossRefGoogle Scholar
  37. 37.
    Johnson, N.: The pathway to enterprise mobile readiness: analysis of perceptions, pressures, preparedness, and progression. In: Proceedings of the 18th Americas Conference on Information Systems, Seattle, pp. 2517–2524 (2012)Google Scholar
  38. 38.
    LaBarre, O.: Banks may not be able to resist ‘bring your own device’. Bank Syst. + Technol. – Online 49, 16–18 (2012)Google Scholar
  39. 39.
    Miller, K.W., Springfield, I., Voas, J., Fellow, I., Hurlburt, G.F., Index, C.: BYOD: security and privacy considerations. IT Prof. 14, 53–55 (2012)CrossRefGoogle Scholar
  40. 40.
    Perry, M., O’Hara, K., Sellen, A., Brown, B., Harper, R.: Dealing with mobility: understanding access anytime, anywhere. ACM Trans. Comput.-Hum. Interact. 8, 323–347 (2001). doi: 10.1145/504704.504707 CrossRefGoogle Scholar
  41. 41.
    Bergstein, B.: IBM Faces the Perils of “Bring Your Own Device” (2012). http://www.technologyreview.com/business/40324/
  42. 42.
    Sawyer, S., Winter, S.J.: Special issue on futures for research on information systems: Prometheus unbound. J. Inf. Technol. 26, 95–98 (2011). doi: 10.1057/jit.2011.7 CrossRefGoogle Scholar
  43. 43.
    Niehaves, B., Köffer, S., Ortbach, K.: IT consumerization – a theory and practice review. In: Proceedings of the 18th Americas Conference on Information Systems, Seattle (2012)Google Scholar
  44. 44.
    Melville, N., Kraemer, K., Gurbaxani, V.: Review: information technology and organizational performance: an integrative model of IT business value. MIS Q. 28, 283–322 (2004)Google Scholar
  45. 45.
    Sambamurthy, V., Zmud, R.: IT Management Competency Assessment: A Tool for Creating Business Value Through IT. Financial Executives Research Foundation, Morristown (1994)Google Scholar
  46. 46.
    Tornatzky, L., Klein, K.: Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings. IEEE Trans. Eng. Manage. 29, 28–43 (1982). doi: 10.1109/TEM.1982.6447463 CrossRefGoogle Scholar
  47. 47.
    Moore, G.C., Benbasat, I.: Development of an instrument to measure the perceptions of adopting an information technology innovation. Inst. Manage. Sci. 2, 192–222 (1991). doi: 10.1287/isre.2.3.192 Google Scholar
  48. 48.
    Agarwal, R., Prasad, J.: The role of innovation characteristics and perceived voluntariness in the acceptance of information technologies. Decis. Sci. 28, 557–582 (1997). doi: 10.1111/j.1540-5915.1997.tb01322.x CrossRefGoogle Scholar
  49. 49.
    Plouffe, C.R., Hulland, J.S., Vandenbosch, M.: Research report: richness versus parsimony in modeling technology adoption decisions - understanding merchant adoption of a smart card-based payment system. Inf. Syst. Res. 12, 208–222 (2001)CrossRefGoogle Scholar
  50. 50.
    Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27, 425–478 (2003)Google Scholar
  51. 51.
    Prescott, M.B., Conger, S.A.: Information technology innovations: a classification by IT locus of impact and research approach. Innovation 26, 20–41 (1995). doi: 10.1145/217278.217284 Google Scholar
  52. 52.
    Kim, Y., Seoh, H., Lee, S., Lee, B.G.: Analysing user’s intention and innovation diffusion of smartphones. In: Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications, Sanya, pp. 1–6 (2010). doi: 10.1109/ICUT.2010.5677850
  53. 53.
    Monchak, A., Kim, D.J.: Examining trends of technology diffusion theories in information systems. In: Proceedings of the 32nd International Conference on Information Systems, Shanghai, pp. 1318–1329 (2011)Google Scholar
  54. 54.
    Weiß, F., Leimeister, J.M.: Consumerization. IT-Innovationen aus dem Konsumentenumfeld als Herausforderung für die Unternehmens-IT. Wirtschaftsinformatik 54, 351–354 (2012). doi: 10.1007/s11576-012-0338-y CrossRefGoogle Scholar
  55. 55.
    Morris, M.G., Venkatesh, V.: Age differences in technology adoption decisions: Implications for a changing work force. Pers. Psychol. 53, 375–403 (2000)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.University of Duisburg-EssenDuisburgGermany
  2. 2.innoscale AGBerlinGermany

Personalised recommendations