Prohibiting Bring Your Own Device (BYOD) in Companies: Effectiveness and Efficiency vs. Satisfaction

Smartphones are the most relevant digital companions that we employ on a daily basis and increasingly used by employees to perform business tasks. However, some companies do not allow the use of personal devices to access their IT infrastructure (BYOD) due to security concerns or for other organizational reasons; thus these employees have to use a smartphone provided by the company. Hence, employees may be confronted with unfamiliar operating systems or applications and which may influence their satisfaction and performance. We analyzed these effects by conducting a usability study that measured efficiency, effectiveness, and satisfaction of iOS and Android users when required to use a company provided device (CPD) in the form of a Nokia Lumia Windows Phone compared to their own device when executing the same tasks on their own device. The study used a within-subjects design and three measurement points, each of which consisted of multiple typical business tasks. The study used a within-subjects design and three measurement points each, which consisted of multiple typical business tasks. Results show that users become accustomed to the Company Provides Devices fast, since efficiency and effectiveness improve rapidly. The satisfaction level also improves, but remains below the personal devices.

[1]  Georg Disterer,et al.  BYOD Bring Your Own Device , 2013 .

[2]  Jeffrey M. Voas,et al.  BYOD: Security and Privacy Considerations , 2012, IT Professional.

[3]  René Riedl,et al.  Emotions and ERP information sourcing: the moderating role of expertise , 2014, Ind. Manag. Data Syst..

[4]  B Sheehan,et al.  A comparison of usability factors of four mobile devices for accessing healthcare information by adolescents. , 2012, Applied clinical informatics.

[5]  Michael Weber,et al.  Password entry usability and shoulder surfing susceptibility on different smartphone platforms , 2012, MUM.

[6]  Björn Niehaves,et al.  AIS Electronic , 2017 .

[7]  James R. Lewis,et al.  Psychometric Evaluation of the PSSUQ Using Data from Five Years of Usability Studies , 2002, Int. J. Hum. Comput. Interact..

[8]  Uwe Ostermann,et al.  One of Two or Two for One? - Analyzing Employees' Decisions to Dual Use Devices , 2017, ICIS.

[9]  Jeff Sauro,et al.  Quantifying the User Experience: Practical Statistics for User Research , 2012 .

[10]  Mowafa Said Househ,et al.  Revisiting the Impact of Mobile Phone Screen Size on User Comprehension of Health Information , 2014, ICIMTH.

[11]  SiauKeng,et al.  The value of mobile applications , 2005 .

[12]  Chen-Fu Chien,et al.  User-experience of tablet operating system: An experimental investigation of Windows 8, iOS 6, and Android 4.2 , 2014, Comput. Ind. Eng..

[13]  Maryam Var Naseri,et al.  BYOD: Current state and security challenges , 2014, 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE).

[14]  John Tripp,et al.  It’s My Tool, I Know How to Use It: A Theory of the Impact of IT Consumerization on Device Competence and Job Satisfaction , 2014 .

[15]  Björn Niehaves,et al.  The Intensified Blurring of Boundaries Between Work and Private Life through IT Consumerisation , 2015, ECIS.

[16]  David Jaramillo,et al.  Cooperative solutions for Bring Your Own Device (BYOD) , 2013, IBM J. Res. Dev..

[17]  Dennis F. Galletta,et al.  Assessing Smartphone Ease of Use and Learning from the Perspective of Novice and Expert Users: Development and Illustration of Mobile Benchmark Tasks , 2014 .

[18]  Stephen A. Brewster,et al.  Investigating the effectiveness of tactile feedback for mobile touchscreens , 2008, CHI.

[19]  Alexander Maedche,et al.  The Effect of Learning on the Effective Use of Enterprise Systems , 2016, ICIS.

[20]  Shashikant Rai,et al.  BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES , 2013 .

[21]  Yong Wang,et al.  Bring your own device security issues and challenges , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).

[22]  Maiju Vuolle,et al.  Productivity impacts of mobile office service , 2010, Int. J. Serv. Technol. Manag..

[23]  Gordon Thomson BYOD: enabling the chaos , 2012, Netw. Secur..

[24]  Maiju Vuolle,et al.  Intangible benefits of mobile business services , 2011 .

[25]  G. Heiman,et al.  Research Methods in Psychology , 1994 .

[26]  James R. Lewis,et al.  IBM computer usability satisfaction questionnaires: Psychometric evaluation and instructions for use , 1995, Int. J. Hum. Comput. Interact..

[27]  Lakshmi Goel,et al.  Consumer IT at Work: Development and Test of an IT Empowerment Model , 2014, ICIS.

[28]  Jeff Sauro,et al.  Correlations among prototypical usability metrics: evidence for the construct of usability , 2009, CHI.

[29]  Nima Zahadat,et al.  BYOD security engineering: A framework and its analysis , 2015, Comput. Secur..

[30]  P. Cozby,et al.  Methods in behavioral research , 1977 .

[31]  Carsten Kleiner,et al.  Bring Your Own Device , 2018 .

[32]  Tom Page,et al.  Usability of text input interfaces in smartphones , 2013 .

[33]  Denzil Ferreira,et al.  Understanding Human-Smartphone Concerns: A Study of Battery Life , 2011, Pervasive.

[34]  Blake Ives,et al.  IT Consumerization: When Gadgets Turn Into Enterprise IT Tools , 2012, MIS Q. Executive.

[35]  Mark Freeman,et al.  User experience of mobile devices: a three layer method of evaluation , 2014 .

[36]  Mark A. Neerincx,et al.  Field evaluation of a mobile location-based notification system for police officers , 2008, Mobile HCI.

[37]  P. Raven,et al.  Child, Adolescent and Family Refugee Mental Health: A Global Perspective , 1996 .

[38]  Yuan Lu,et al.  Usability benchmark study of commercially available smart phones: cell phone type platform, PDA type platform and PC type platform , 2008, Mobile HCI.

[39]  T. Nakagawa,et al.  Usability differential in positions of software keyboard on smartphone , 2012, The 1st IEEE Global Conference on Consumer Electronics 2012.

[40]  Björn Niehaves,et al.  Exploring the Relationship between IT Consumerization and Job Performance: A Theoretical Framework for Future Research , 2014, Commun. Assoc. Inf. Syst..

[41]  Björn Niehaves,et al.  The Effect of Private IT Use on Work Performance - Towards an IT Consumerization Theory , 2013, Wirtschaftsinformatik.

[42]  Ed Elbers,et al.  The Role of School Libraries in Reducing Learning Disadvantages in Migrant Children , 2015 .

[43]  Keng Siau,et al.  The value of mobile applications: a utility company study , 2005, CACM.

[44]  Mowafa Said Househ,et al.  The Impact of Mobile Phone Screen Size on User Comprehension of Health Information , 2013, ICIMTH.

[45]  David R. Morse,et al.  Using while moving: HCI issues in fieldwork environments , 2000, TCHI.

[46]  Harri Kiljander,et al.  Evolution and usability of mobile phone interaction styles , 2004 .

[47]  Parag C. Pendharkar,et al.  Human-computer interaction issues for mobile computing in a variable work context , 2004, Int. J. Hum. Comput. Stud..

[48]  Michael J. Muller,et al.  Validating an extension to participatory heuristic evaluation: quality of work and quality of work life , 1995, CHI 95 Conference Companion.

[49]  Uwe Ostermann,et al.  Bring IT on(E)! Personal Preferences and Traits as Influencing Factors to Participate in BYOD Programs , 2016, ECIS.

[50]  Claudio Vitari,et al.  Learning about Ambiguous Technologies: Conceptualization and Research Agenda , 2017, ECIS.

[51]  Alessandro Armando,et al.  Securing the "Bring Your Own Device" Paradigm , 2014, Computer.

[52]  Remko Helms,et al.  Mobility and Security in the New Way of Working: Employee Satisfaction in a Choose Your Own Device(CYOD) Environment , 2015, MCIS.

[53]  Mohd Taufik Abdullah,et al.  A Review of Bring Your Own Device on Security Issues , 2015 .