skip to main content
10.1145/2664591.2664607acmotherconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

Employee perceptions of BYOD in South Africa: Employers are turning a blind eye?

Published: 29 September 2014 Publication History

Abstract

As mobile Information and Communication Technologies (ICTs) become greater entrenched in society and with the nature of work changing, more and more international organizations are embracing and/or considering formalizing the phenomenon of 'Bring Your Own Device' (BYOD). The gist of BYOD is the use of privately owned devices and software to access and work with organizational resources. There is however little that is known about the degree to which organizations in South Africa are embracing the BYOD phenomenon. In this paper, we explored how employees in organizations in South Africa perceive the use of their privately owned devices for work. The results from 61 employees suggest that there is a strong awareness of the BYOD concept among employees. Employees also appear to believe that although their employers are aware of the use of privately owned devices for work, the employers are reluctant to formally create BYOD organizational strategies. The findings suggest that the laxity of employers in South Africa to deal with the BYOD phenomenon as an issue of strategic importance could result in considerable security challenges for organizational data.

References

[1]
Ackerman, A. S., & Krupp, M. L. (2012). Five Components to Consider for BYOT/BYOD. International Association for Development of the Information Society.
[2]
Afreen, R. (2014). Bring Your Own Device (BYOD) in Higher Education: Opportunities and Challenges. International Journal of Emerging Trends & Technology in Computer Science, 3(1).
[3]
Ally, M. (2013). Mobile learning: from research to practice to Impact Education. Learning and Teaching in Higher Education: Gulf Perspectives, 10(2).
[4]
Astani, M., Ready, K., & Tessema, M. (2013). BYOD issues and strategies in organizations. Issues in Information Systems, 14(2), 195--201.
[5]
Bhattacherjee, A. (2012). Social Science Research: principles, methods, and practices.
[6]
Blount, S. (2012). The Consumerization of IT: Security challenges of the new world order: CA Technologies.
[7]
D'Arcy, P. (2011). CIO strategies for consumerization: The future of enterprise mobile computing: Dell CIO Insight Series.
[8]
Disterer, G., & Kleiner, C. (2013). BYOD Bring Your Own Device. Procedia Technology, 9(0), 43--53.
[9]
ENISA. (2012). Consumerization of IT: Top Risks and Opportunities. Retrieved from http://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/consumerization-of-it-top-risks-and-opportunities?searchterm=top+risks
[10]
Garlati, C. (2011). Trend Micro Consumerization. London: Gartner.
[11]
Gruman, G. (2012). Afraid of BYOD? Intel shows a better way. Retrieved from InfoWorld website: http://www.infoworld.com/d/consumerization-of-it/afraid-of-byod-intel-shows-better-way-204123
[12]
Gruman, G. (2013). Cisco shows how to manage 35,000 Macs. Retrieved from Infoworld website: http://www.infoworld.com/d/consumerization-of-it/cisco-shows-how-manage-35000-macs-226305
[13]
Herring, M. (2011). Consumerization - The shift from personal to personalised computing. Retrieved from http://www.economist.com/node/21530921
[14]
ITU. (2014). ICT Facts and Figures 2013: Mobile-cellular subscriptions (Statistical). Retrieved 27 May 2014, from International Telecommunication Union
[15]
Jarvenpaa, S. L. (2003 ). Mobile commerce at crossroads. Communications of the ACM 46, 41--44.
[16]
Jones, J. (2012). BYOD: Organizations Question Risk vs Benefit. Retrieved from http://blogs.technet.com/b/security/archive/2012/08/02/byod-organizations-question-risk-vs-benefit.aspx
[17]
Mansfield-Devine, S. (2012). Interview: BYOD and the enterprise network. Computer fraud & security, 2012(4), 14--17.
[18]
Marshall, S. (2014). IT Consumerization: A Case Study of BYOD in a Healthcare Setting. Technology Innovation Management Review(March 2014: Emerging Technologies).
[19]
mobiThinking. (2014). Global mobile statistics 2014 Part A: Mobile subscribers; handset market share; mobile operators Retrieved 27 May, 2014, from http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats/a#subscribers
[20]
Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), 5--8
[21]
Moschella, D., Neal, D., Opperman, P., & Taylor, J. (2004). The "Consumerization" of Information Technology. Paper presented at the Leading Edge Forum.
[22]
Nascio. (2012). Good Technology- BYOD Best Practices Retrieved 13 March, 2013, from http://www.nascio.org/events/sponsors/vrc/BYOD%20Best%20Practices.pdf
[23]
National-Research-Council. (1999). The changing nature of work: Implications for occupational analysis. Washington D.C: National Academy Press.
[24]
Niehaves, B., Köffer, S., Ortbach, K., & Katschewitz, S. (2012). Towards an IT Consumerization Theory--A Theory and Practice Review Working Papers, European Research Center for Information Systems No. 13. Münster: European Research Center for Information Systems.
[25]
Rains, J. (2012). Bring Your Own Device (BYOD): Hot or Not? HDI Research Corner. Retrieved from https://news.citrixonline.com/wpcontent/uploads/2012/04/BYOD-Hot-or-Not.pdf
[26]
Reddy, A. S. (2012). Making BYOD work for your organisation: Cognizant Research.
[27]
Revenaugh, L. D., & Schweigert, M. E. (2013). BYOD: Moving toward a More Mobile and Productive Workforce. Business and Information Technology. Retrieved from http://0-digitalcommons.mtech.edu.innopac.up.ac.za/business_info_tech/3
[28]
Schadler, T., & McCarthy, J. (2012, 8 March). Mobile Is The New Face Of Engagement. Retrieved from http://cdn.blog-sap.com/innovation/files/2012/08/SAP_Mobile_Is_The_New_Face_Of_Engagement.pdf
[29]
SogetiLabs. (2013). BYOD, Big Data, Cloud Rank High Among Top Trends for 2013. {Article}. Security: Solutions for Enterprise Security Leaders, 50(4), 25--26.
[30]
Stagliano, T., DiPoalo, A., & Coonelly, P. (2013). The Consumerization of Information Technology: La Salle University Digital Commons.
[31]
STATS-SA. (2013). Mid-year population estimates. Pretoria: Retrieved from http://www.statssa.gov.za/Publications/P0302/P03022013. pdf.
[32]
Tokuyoshi, B. (2013). The security implications of BYOD. Network Security, 2013(4), 12--13.
[33]
Varshney, U., & Vetter, R. (2000). Emerging mobile and wireless networks. Communications of the ACM 43(6), 73--81.
[34]
Wright, A. (2013). 5 Trends Changing the Nature of Work. HR News. Retrieved from http://www.shrm.org/Publications/HRNews/Pages/5-Trends-Changing-the-Nature-of-Work.aspx
[35]
Yegulalp, S. (2013). Making BYOD Work- BYOD Deep Dive: Infoworld.

Cited By

View all
  • (2021)Optimized Three-Dimensional Security Framework to Mitigate Risks Arising From BYOD-Enabled Business EnvironmentResearch Anthology on Securing Mobile Technologies and Applications10.4018/978-1-7998-8545-0.ch011(194-222)Online publication date: 2021
  • (2021) Factors affecting the adoption of BYOD in South African small and medium enterprise s THE ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES10.1002/isd2.1218587:6Online publication date: 6-May-2021
  • (2019)The bring‐your‐own‐device unintended administrator: A perspective from ZimbabweTHE ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES10.1002/isd2.1207685:4Online publication date: 29-Jan-2019
  • Show More Cited By

Index Terms

  1. Employee perceptions of BYOD in South Africa: Employers are turning a blind eye?

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SAICSIT '14: Proceedings of the Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014 on SAICSIT 2014 Empowered by Technology
    September 2014
    359 pages
    ISBN:9781450332460
    DOI:10.1145/2664591
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 September 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. BYOD
    2. ICT Consumerisation
    3. ICT Managers
    4. South Africa

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    SAICSIT '14

    Acceptance Rates

    Overall Acceptance Rate 187 of 439 submissions, 43%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Optimized Three-Dimensional Security Framework to Mitigate Risks Arising From BYOD-Enabled Business EnvironmentResearch Anthology on Securing Mobile Technologies and Applications10.4018/978-1-7998-8545-0.ch011(194-222)Online publication date: 2021
    • (2021) Factors affecting the adoption of BYOD in South African small and medium enterprise s THE ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES10.1002/isd2.1218587:6Online publication date: 6-May-2021
    • (2019)The bring‐your‐own‐device unintended administrator: A perspective from ZimbabweTHE ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES10.1002/isd2.1207685:4Online publication date: 29-Jan-2019
    • (2018)Informal interactive bring your own device strategising practices of South African small and medium enterprisesInternational Journal of Information Technology and Management10.5555/3292861.329286217:4(257-295)Online publication date: 19-Dec-2018
    • (2018)Optimized Three-Dimensional Security Framework to Mitigate Risks Arising From BYOD-Enabled Business EnvironmentHandbook of Research on Information and Cyber Security in the Fourth Industrial Revolution10.4018/978-1-5225-4763-1.ch008(205-233)Online publication date: 2018
    • (2018)The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and MotivationJournal of Computer Information Systems10.1080/08874417.2018.1543001(1-12)Online publication date: 15-Nov-2018
    • (2016)Governing information security within the context of “bring your own device in SMMEs”2016 IST-Africa Week Conference10.1109/ISTAFRICA.2016.7530586(1-11)Online publication date: May-2016
    • (2015)Contextualizing BYOD in SMEs in developing countriesProceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists10.1145/2815782.2815824(1-8)Online publication date: 28-Sep-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media