It Consumerization and compliant Use: do Policies Matter?

Facing the ongoing IT consumerization trend, organizations take different strategies that permit or regulate the acquisition and use of consumer-originated IT devices at the workplace. This paper investigates the effect of two types of IT consumerization strategies (‘laissez-faire’ and ‘middle ground’) on the policy-related attitudes of employees and their level of policy-compliant device usage (voice, email, and data) at two higher education institutions. Based on hypotheses derived from two theories – i.e., procedural justice theory and transaction cost theory – and mixed methods interviews with 36 employees, our findings suggest a paradox where middle ground strategies accommodating for IT consumerization are associated with a higher understanding of, but a lower satisfaction with these policies. Differences in compliant behavior are found for voice and data usage on professional devices. Extending the procedural justice view, we conclude that transaction cost theory serves as a complementary lens to explain policy compliance.

[1]  Andrea Back,et al.  Shadow it – A View from Behind the Curtain , 2014, Comput. Secur..

[2]  Jonas Repschläger,et al.  The Blurring Boundaries Of Work-Related And Personal Media Use: A Grounded Theory Study On The Employee's Perspective , 2013, ECIS.

[3]  O. Williamson Transaction-Cost Economics: The Governance of Contractual Relations , 1979, The Journal of Law and Economics.

[4]  Christopher Rentrop,et al.  On the Emergence of Shadow IT - a Transaction Cost-Based Approach , 2014, ECIS.

[5]  Jung P. Shim,et al.  Current Status, Issues, and Future of Bring Your Own Device (BYOD) , 2014, Commun. Assoc. Inf. Syst..

[6]  Alexander Benlian,et al.  The Dual Role of IS Specificity in Governing Software as a Service , 2012, ICIS.

[7]  J. Thibaut,et al.  Procedural Justice: A Psychological Analysis , 1976 .

[8]  Gerold Mikula,et al.  Justice and Social Interaction: Experimental and Theoretical Contributions, from Psychological Research , 1980 .

[9]  Robert W. Covert,et al.  Designing and Constructing Instruments for Social Research and Evaluation , 2007 .

[10]  Björn Niehaves,et al.  AIS Electronic , 2017 .

[11]  R. Bennett,et al.  Development of a measure of workplace deviance. , 2000, The Journal of applied psychology.

[12]  Christine Nadel,et al.  Case Study Research Design And Methods , 2016 .

[13]  R. Folger,et al.  Effects of Procedural and Distributive Justice on Reactions to Pay Raise Decisions , 1989 .

[14]  Walter Brenner,et al.  European Conference on Information Systems ( ECIS ) 5-15-2012 EXPLORING THE SHADOWS : IT GOVERNANCE APPROACHES TO USER-DRIVEN INNOVATION , 2012 .

[15]  N. Denzin The research act: A theoretical introduction to sociological methods , 1977 .

[16]  Laurie Giddens,et al.  It ’ s My Tool , I Know How to Use It : A Theory of the Impact of BYOD on Device Competence and Job Satisfaction Research-in-Progress , 2014 .

[17]  J. Colquitt On the dimensionality of organizational justice: a construct validation of a measure. , 2001, The Journal of applied psychology.

[18]  Philip E. T. Lewis,et al.  Research Methods for Business Students , 2006 .

[19]  R. Mauborgne,et al.  Procedural justice, strategic decision making, and the knowledge economy , 1998 .

[20]  Susan Greener,et al.  Business Research Methods , 2008 .

[21]  Joan V. Robinson,et al.  The Nature of the Firm , 2004 .

[22]  Carl J. Dahlman The Problem of Externality , 1979, The Journal of Law and Economics.

[23]  Jennifer E. Moyer Managing Mobile Devices in Hospitals: A Literature Review of BYOD Policies and Usage , 2013 .

[24]  Carol T. Kulik,et al.  Individual and corporate dispute resolution: Using procedural fairness as a decision heuristic. , 1993 .

[25]  J. Greenberg,et al.  The social side of fairness: Interpersonal and informational classes of organizational justice. , 1993 .

[26]  Viswanath Venkatesh,et al.  Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems , 2013, MIS Q..

[27]  Jennifer Caroline Greene,et al.  Mixed Methods in Social Inquiry , 2007 .

[28]  B. McCarthy NEW ECONOMICS OF SOCIOLOGICAL CRIMINOLOGY , 2002 .

[29]  Mo Adam Mahmood,et al.  Employees' Behavior towards IS Security Policy Compliance , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[30]  Bella Lise Galperin Determinants of deviance in the workplace : an empirical examination in Canada and Mexico , 2002 .

[31]  Anat Hovav,et al.  Employees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory , 2014, ECIS.

[32]  Sandy Behrens,et al.  Shadow systems: the good, the bad and the ugly , 2009, CACM.

[33]  Björn Niehaves,et al.  Dual Use of Mobile IT and Work-to-Life Conflict in the Context of IT Consumerization , 2014, ICIS.

[34]  Jeffrey M. Stanton,et al.  Analysis of end user security behaviors , 2005, Comput. Secur..

[35]  Jan Marco Leimeister,et al.  Consumerization - IT Innovations from the Consumer Market as a Challenge for Corporate IT , 2012, Bus. Inf. Syst. Eng..

[36]  Brian Tokuyoshi The security implications of BYOD , 2013, Netw. Secur..

[37]  W. Firestone,et al.  Multisite Qualitative Policy Research: Optimizing Description and Generalizability , 1983 .

[38]  Bill Morrow,et al.  BYOD security challenges: control and protect your most sensitive data , 2012, Netw. Secur..

[39]  Michael D. Myers,et al.  The qualitative interview in IS research: Examining the craft , 2007, Inf. Organ..

[40]  Tom R. Tyler,et al.  Why People Cooperate: The Role of Social Motivations , 2010 .

[41]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[42]  D. Schweiger,et al.  Building Commitment, Attachment, and Trust in Strategic Decision-Making Teams: The Role of Procedural Justice , 1995 .

[43]  Aurélie Leclercq-Vandelannoitte,et al.  Managing BYOD: how do organizations incorporate user-driven IT innovations? , 2015, Inf. Technol. People.