Prohibiting Bring Your Own Device (BYOD) in Companies: Effectiveness and Efficiency vs. Satisfaction
暂无分享,去创建一个
[1] Georg Disterer,et al. BYOD Bring Your Own Device , 2013 .
[2] Jeffrey M. Voas,et al. BYOD: Security and Privacy Considerations , 2012, IT Professional.
[3] René Riedl,et al. Emotions and ERP information sourcing: the moderating role of expertise , 2014, Ind. Manag. Data Syst..
[4] B Sheehan,et al. A comparison of usability factors of four mobile devices for accessing healthcare information by adolescents. , 2012, Applied clinical informatics.
[5] Michael Weber,et al. Password entry usability and shoulder surfing susceptibility on different smartphone platforms , 2012, MUM.
[6] Björn Niehaves,et al. AIS Electronic , 2017 .
[7] James R. Lewis,et al. Psychometric Evaluation of the PSSUQ Using Data from Five Years of Usability Studies , 2002, Int. J. Hum. Comput. Interact..
[8] Uwe Ostermann,et al. One of Two or Two for One? - Analyzing Employees' Decisions to Dual Use Devices , 2017, ICIS.
[9] Jeff Sauro,et al. Quantifying the User Experience: Practical Statistics for User Research , 2012 .
[10] Mowafa Said Househ,et al. Revisiting the Impact of Mobile Phone Screen Size on User Comprehension of Health Information , 2014, ICIMTH.
[11] SiauKeng,et al. The value of mobile applications , 2005 .
[12] Chen-Fu Chien,et al. User-experience of tablet operating system: An experimental investigation of Windows 8, iOS 6, and Android 4.2 , 2014, Comput. Ind. Eng..
[13] Maryam Var Naseri,et al. BYOD: Current state and security challenges , 2014, 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE).
[14] John Tripp,et al. It’s My Tool, I Know How to Use It: A Theory of the Impact of IT Consumerization on Device Competence and Job Satisfaction , 2014 .
[15] Björn Niehaves,et al. The Intensified Blurring of Boundaries Between Work and Private Life through IT Consumerisation , 2015, ECIS.
[16] David Jaramillo,et al. Cooperative solutions for Bring Your Own Device (BYOD) , 2013, IBM J. Res. Dev..
[17] Dennis F. Galletta,et al. Assessing Smartphone Ease of Use and Learning from the Perspective of Novice and Expert Users: Development and Illustration of Mobile Benchmark Tasks , 2014 .
[18] Stephen A. Brewster,et al. Investigating the effectiveness of tactile feedback for mobile touchscreens , 2008, CHI.
[19] Alexander Maedche,et al. The Effect of Learning on the Effective Use of Enterprise Systems , 2016, ICIS.
[20] Shashikant Rai,et al. BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES , 2013 .
[21] Yong Wang,et al. Bring your own device security issues and challenges , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).
[22] Maiju Vuolle,et al. Productivity impacts of mobile office service , 2010, Int. J. Serv. Technol. Manag..
[23] Gordon Thomson. BYOD: enabling the chaos , 2012, Netw. Secur..
[24] Maiju Vuolle,et al. Intangible benefits of mobile business services , 2011 .
[25] G. Heiman,et al. Research Methods in Psychology , 1994 .
[26] James R. Lewis,et al. IBM computer usability satisfaction questionnaires: Psychometric evaluation and instructions for use , 1995, Int. J. Hum. Comput. Interact..
[27] Lakshmi Goel,et al. Consumer IT at Work: Development and Test of an IT Empowerment Model , 2014, ICIS.
[28] Jeff Sauro,et al. Correlations among prototypical usability metrics: evidence for the construct of usability , 2009, CHI.
[29] Nima Zahadat,et al. BYOD security engineering: A framework and its analysis , 2015, Comput. Secur..
[30] P. Cozby,et al. Methods in behavioral research , 1977 .
[31] Carsten Kleiner,et al. Bring Your Own Device , 2018 .
[32] Tom Page,et al. Usability of text input interfaces in smartphones , 2013 .
[33] Denzil Ferreira,et al. Understanding Human-Smartphone Concerns: A Study of Battery Life , 2011, Pervasive.
[34] Blake Ives,et al. IT Consumerization: When Gadgets Turn Into Enterprise IT Tools , 2012, MIS Q. Executive.
[35] Mark Freeman,et al. User experience of mobile devices: a three layer method of evaluation , 2014 .
[36] Mark A. Neerincx,et al. Field evaluation of a mobile location-based notification system for police officers , 2008, Mobile HCI.
[37] P. Raven,et al. Child, Adolescent and Family Refugee Mental Health: A Global Perspective , 1996 .
[38] Yuan Lu,et al. Usability benchmark study of commercially available smart phones: cell phone type platform, PDA type platform and PC type platform , 2008, Mobile HCI.
[39] T. Nakagawa,et al. Usability differential in positions of software keyboard on smartphone , 2012, The 1st IEEE Global Conference on Consumer Electronics 2012.
[40] Björn Niehaves,et al. Exploring the Relationship between IT Consumerization and Job Performance: A Theoretical Framework for Future Research , 2014, Commun. Assoc. Inf. Syst..
[41] Björn Niehaves,et al. The Effect of Private IT Use on Work Performance - Towards an IT Consumerization Theory , 2013, Wirtschaftsinformatik.
[42] Ed Elbers,et al. The Role of School Libraries in Reducing Learning Disadvantages in Migrant Children , 2015 .
[43] Keng Siau,et al. The value of mobile applications: a utility company study , 2005, CACM.
[44] Mowafa Said Househ,et al. The Impact of Mobile Phone Screen Size on User Comprehension of Health Information , 2013, ICIMTH.
[45] David R. Morse,et al. Using while moving: HCI issues in fieldwork environments , 2000, TCHI.
[46] Harri Kiljander,et al. Evolution and usability of mobile phone interaction styles , 2004 .
[47] Parag C. Pendharkar,et al. Human-computer interaction issues for mobile computing in a variable work context , 2004, Int. J. Hum. Comput. Stud..
[48] Michael J. Muller,et al. Validating an extension to participatory heuristic evaluation: quality of work and quality of work life , 1995, CHI 95 Conference Companion.
[49] Uwe Ostermann,et al. Bring IT on(E)! Personal Preferences and Traits as Influencing Factors to Participate in BYOD Programs , 2016, ECIS.
[50] Claudio Vitari,et al. Learning about Ambiguous Technologies: Conceptualization and Research Agenda , 2017, ECIS.
[51] Alessandro Armando,et al. Securing the "Bring Your Own Device" Paradigm , 2014, Computer.
[52] Remko Helms,et al. Mobility and Security in the New Way of Working: Employee Satisfaction in a Choose Your Own Device(CYOD) Environment , 2015, MCIS.
[53] Mohd Taufik Abdullah,et al. A Review of Bring Your Own Device on Security Issues , 2015 .