skip to main content
10.1145/2664591.2664607acmotherconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

Employee perceptions of BYOD in South Africa: Employers are turning a blind eye?

Authors Info & Claims
Published:29 September 2014Publication History

ABSTRACT

As mobile Information and Communication Technologies (ICTs) become greater entrenched in society and with the nature of work changing, more and more international organizations are embracing and/or considering formalizing the phenomenon of 'Bring Your Own Device' (BYOD). The gist of BYOD is the use of privately owned devices and software to access and work with organizational resources. There is however little that is known about the degree to which organizations in South Africa are embracing the BYOD phenomenon. In this paper, we explored how employees in organizations in South Africa perceive the use of their privately owned devices for work. The results from 61 employees suggest that there is a strong awareness of the BYOD concept among employees. Employees also appear to believe that although their employers are aware of the use of privately owned devices for work, the employers are reluctant to formally create BYOD organizational strategies. The findings suggest that the laxity of employers in South Africa to deal with the BYOD phenomenon as an issue of strategic importance could result in considerable security challenges for organizational data.

References

  1. Ackerman, A. S., & Krupp, M. L. (2012). Five Components to Consider for BYOT/BYOD. International Association for Development of the Information Society.Google ScholarGoogle Scholar
  2. Afreen, R. (2014). Bring Your Own Device (BYOD) in Higher Education: Opportunities and Challenges. International Journal of Emerging Trends & Technology in Computer Science, 3(1).Google ScholarGoogle Scholar
  3. Ally, M. (2013). Mobile learning: from research to practice to Impact Education. Learning and Teaching in Higher Education: Gulf Perspectives, 10(2).Google ScholarGoogle Scholar
  4. Astani, M., Ready, K., & Tessema, M. (2013). BYOD issues and strategies in organizations. Issues in Information Systems, 14(2), 195--201.Google ScholarGoogle Scholar
  5. Bhattacherjee, A. (2012). Social Science Research: principles, methods, and practices.Google ScholarGoogle Scholar
  6. Blount, S. (2012). The Consumerization of IT: Security challenges of the new world order: CA Technologies.Google ScholarGoogle Scholar
  7. D'Arcy, P. (2011). CIO strategies for consumerization: The future of enterprise mobile computing: Dell CIO Insight Series.Google ScholarGoogle Scholar
  8. Disterer, G., & Kleiner, C. (2013). BYOD Bring Your Own Device. Procedia Technology, 9(0), 43--53. doi: http://dx.doi.org/10.1016/j.protcy.2013.12.005Google ScholarGoogle ScholarCross RefCross Ref
  9. ENISA. (2012). Consumerization of IT: Top Risks and Opportunities. Retrieved from http://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/consumerization-of-it-top-risks-and-opportunities?searchterm=top+risksGoogle ScholarGoogle Scholar
  10. Garlati, C. (2011). Trend Micro Consumerization. London: Gartner.Google ScholarGoogle Scholar
  11. Gruman, G. (2012). Afraid of BYOD? Intel shows a better way. Retrieved from InfoWorld website: http://www.infoworld.com/d/consumerization-of-it/afraid-of-byod-intel-shows-better-way-204123Google ScholarGoogle Scholar
  12. Gruman, G. (2013). Cisco shows how to manage 35,000 Macs. Retrieved from Infoworld website: http://www.infoworld.com/d/consumerization-of-it/cisco-shows-how-manage-35000-macs-226305Google ScholarGoogle Scholar
  13. Herring, M. (2011). Consumerization - The shift from personal to personalised computing. Retrieved from http://www.economist.com/node/21530921Google ScholarGoogle Scholar
  14. ITU. (2014). ICT Facts and Figures 2013: Mobile-cellular subscriptions (Statistical). Retrieved 27 May 2014, from International Telecommunication UnionGoogle ScholarGoogle Scholar
  15. Jarvenpaa, S. L. (2003 ). Mobile commerce at crossroads. Communications of the ACM 46, 41--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jones, J. (2012). BYOD: Organizations Question Risk vs Benefit. Retrieved from http://blogs.technet.com/b/security/archive/2012/08/02/byod-organizations-question-risk-vs-benefit.aspxGoogle ScholarGoogle Scholar
  17. Mansfield-Devine, S. (2012). Interview: BYOD and the enterprise network. Computer fraud & security, 2012(4), 14--17. doi: http://dx.doi.org/10.1016/S1361-3723(12)70031-3Google ScholarGoogle Scholar
  18. Marshall, S. (2014). IT Consumerization: A Case Study of BYOD in a Healthcare Setting. Technology Innovation Management Review(March 2014: Emerging Technologies).Google ScholarGoogle Scholar
  19. mobiThinking. (2014). Global mobile statistics 2014 Part A: Mobile subscribers; handset market share; mobile operators Retrieved 27 May, 2014, from http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats/a#subscribersGoogle ScholarGoogle Scholar
  20. Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), 5--8Google ScholarGoogle ScholarCross RefCross Ref
  21. Moschella, D., Neal, D., Opperman, P., & Taylor, J. (2004). The "Consumerization" of Information Technology. Paper presented at the Leading Edge Forum.Google ScholarGoogle Scholar
  22. Nascio. (2012). Good Technology- BYOD Best Practices Retrieved 13 March, 2013, from http://www.nascio.org/events/sponsors/vrc/BYOD%20Best%20Practices.pdfGoogle ScholarGoogle Scholar
  23. National-Research-Council. (1999). The changing nature of work: Implications for occupational analysis. Washington D.C: National Academy Press.Google ScholarGoogle Scholar
  24. Niehaves, B., Köffer, S., Ortbach, K., & Katschewitz, S. (2012). Towards an IT Consumerization Theory--A Theory and Practice Review Working Papers, European Research Center for Information Systems No. 13. Münster: European Research Center for Information Systems.Google ScholarGoogle Scholar
  25. Rains, J. (2012). Bring Your Own Device (BYOD): Hot or Not? HDI Research Corner. Retrieved from https://news.citrixonline.com/wpcontent/uploads/2012/04/BYOD-Hot-or-Not.pdfGoogle ScholarGoogle Scholar
  26. Reddy, A. S. (2012). Making BYOD work for your organisation: Cognizant Research.Google ScholarGoogle Scholar
  27. Revenaugh, L. D., & Schweigert, M. E. (2013). BYOD: Moving toward a More Mobile and Productive Workforce. Business and Information Technology. Retrieved from http://0-digitalcommons.mtech.edu.innopac.up.ac.za/business_info_tech/3Google ScholarGoogle Scholar
  28. Schadler, T., & McCarthy, J. (2012, 8 March). Mobile Is The New Face Of Engagement. Retrieved from http://cdn.blog-sap.com/innovation/files/2012/08/SAP_Mobile_Is_The_New_Face_Of_Engagement.pdfGoogle ScholarGoogle Scholar
  29. SogetiLabs. (2013). BYOD, Big Data, Cloud Rank High Among Top Trends for 2013. {Article}. Security: Solutions for Enterprise Security Leaders, 50(4), 25--26.Google ScholarGoogle Scholar
  30. Stagliano, T., DiPoalo, A., & Coonelly, P. (2013). The Consumerization of Information Technology: La Salle University Digital Commons.Google ScholarGoogle Scholar
  31. STATS-SA. (2013). Mid-year population estimates. Pretoria: Retrieved from http://www.statssa.gov.za/Publications/P0302/P03022013. pdf.Google ScholarGoogle Scholar
  32. Tokuyoshi, B. (2013). The security implications of BYOD. Network Security, 2013(4), 12--13. doi: http://dx.doi.org/10.1016/S1353-4858(13)70050-3Google ScholarGoogle ScholarCross RefCross Ref
  33. Varshney, U., & Vetter, R. (2000). Emerging mobile and wireless networks. Communications of the ACM 43(6), 73--81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Wright, A. (2013). 5 Trends Changing the Nature of Work. HR News. Retrieved from http://www.shrm.org/Publications/HRNews/Pages/5-Trends-Changing-the-Nature-of-Work.aspxGoogle ScholarGoogle Scholar
  35. Yegulalp, S. (2013). Making BYOD Work- BYOD Deep Dive: Infoworld.Google ScholarGoogle Scholar

Index Terms

  1. Employee perceptions of BYOD in South Africa: Employers are turning a blind eye?

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SAICSIT '14: Proceedings of the Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014 on SAICSIT 2014 Empowered by Technology
      September 2014
      359 pages
      ISBN:9781450332460
      DOI:10.1145/2664591

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 September 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate187of439submissions,43%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader