ABSTRACT
As mobile Information and Communication Technologies (ICTs) become greater entrenched in society and with the nature of work changing, more and more international organizations are embracing and/or considering formalizing the phenomenon of 'Bring Your Own Device' (BYOD). The gist of BYOD is the use of privately owned devices and software to access and work with organizational resources. There is however little that is known about the degree to which organizations in South Africa are embracing the BYOD phenomenon. In this paper, we explored how employees in organizations in South Africa perceive the use of their privately owned devices for work. The results from 61 employees suggest that there is a strong awareness of the BYOD concept among employees. Employees also appear to believe that although their employers are aware of the use of privately owned devices for work, the employers are reluctant to formally create BYOD organizational strategies. The findings suggest that the laxity of employers in South Africa to deal with the BYOD phenomenon as an issue of strategic importance could result in considerable security challenges for organizational data.
- Ackerman, A. S., & Krupp, M. L. (2012). Five Components to Consider for BYOT/BYOD. International Association for Development of the Information Society.Google Scholar
- Afreen, R. (2014). Bring Your Own Device (BYOD) in Higher Education: Opportunities and Challenges. International Journal of Emerging Trends & Technology in Computer Science, 3(1).Google Scholar
- Ally, M. (2013). Mobile learning: from research to practice to Impact Education. Learning and Teaching in Higher Education: Gulf Perspectives, 10(2).Google Scholar
- Astani, M., Ready, K., & Tessema, M. (2013). BYOD issues and strategies in organizations. Issues in Information Systems, 14(2), 195--201.Google Scholar
- Bhattacherjee, A. (2012). Social Science Research: principles, methods, and practices.Google Scholar
- Blount, S. (2012). The Consumerization of IT: Security challenges of the new world order: CA Technologies.Google Scholar
- D'Arcy, P. (2011). CIO strategies for consumerization: The future of enterprise mobile computing: Dell CIO Insight Series.Google Scholar
- Disterer, G., & Kleiner, C. (2013). BYOD Bring Your Own Device. Procedia Technology, 9(0), 43--53. doi: http://dx.doi.org/10.1016/j.protcy.2013.12.005Google ScholarCross Ref
- ENISA. (2012). Consumerization of IT: Top Risks and Opportunities. Retrieved from http://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/consumerization-of-it-top-risks-and-opportunities?searchterm=top+risksGoogle Scholar
- Garlati, C. (2011). Trend Micro Consumerization. London: Gartner.Google Scholar
- Gruman, G. (2012). Afraid of BYOD? Intel shows a better way. Retrieved from InfoWorld website: http://www.infoworld.com/d/consumerization-of-it/afraid-of-byod-intel-shows-better-way-204123Google Scholar
- Gruman, G. (2013). Cisco shows how to manage 35,000 Macs. Retrieved from Infoworld website: http://www.infoworld.com/d/consumerization-of-it/cisco-shows-how-manage-35000-macs-226305Google Scholar
- Herring, M. (2011). Consumerization - The shift from personal to personalised computing. Retrieved from http://www.economist.com/node/21530921Google Scholar
- ITU. (2014). ICT Facts and Figures 2013: Mobile-cellular subscriptions (Statistical). Retrieved 27 May 2014, from International Telecommunication UnionGoogle Scholar
- Jarvenpaa, S. L. (2003 ). Mobile commerce at crossroads. Communications of the ACM 46, 41--44. Google ScholarDigital Library
- Jones, J. (2012). BYOD: Organizations Question Risk vs Benefit. Retrieved from http://blogs.technet.com/b/security/archive/2012/08/02/byod-organizations-question-risk-vs-benefit.aspxGoogle Scholar
- Mansfield-Devine, S. (2012). Interview: BYOD and the enterprise network. Computer fraud & security, 2012(4), 14--17. doi: http://dx.doi.org/10.1016/S1361-3723(12)70031-3Google Scholar
- Marshall, S. (2014). IT Consumerization: A Case Study of BYOD in a Healthcare Setting. Technology Innovation Management Review(March 2014: Emerging Technologies).Google Scholar
- mobiThinking. (2014). Global mobile statistics 2014 Part A: Mobile subscribers; handset market share; mobile operators Retrieved 27 May, 2014, from http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats/a#subscribersGoogle Scholar
- Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), 5--8Google ScholarCross Ref
- Moschella, D., Neal, D., Opperman, P., & Taylor, J. (2004). The "Consumerization" of Information Technology. Paper presented at the Leading Edge Forum.Google Scholar
- Nascio. (2012). Good Technology- BYOD Best Practices Retrieved 13 March, 2013, from http://www.nascio.org/events/sponsors/vrc/BYOD%20Best%20Practices.pdfGoogle Scholar
- National-Research-Council. (1999). The changing nature of work: Implications for occupational analysis. Washington D.C: National Academy Press.Google Scholar
- Niehaves, B., Köffer, S., Ortbach, K., & Katschewitz, S. (2012). Towards an IT Consumerization Theory--A Theory and Practice Review Working Papers, European Research Center for Information Systems No. 13. Münster: European Research Center for Information Systems.Google Scholar
- Rains, J. (2012). Bring Your Own Device (BYOD): Hot or Not? HDI Research Corner. Retrieved from https://news.citrixonline.com/wpcontent/uploads/2012/04/BYOD-Hot-or-Not.pdfGoogle Scholar
- Reddy, A. S. (2012). Making BYOD work for your organisation: Cognizant Research.Google Scholar
- Revenaugh, L. D., & Schweigert, M. E. (2013). BYOD: Moving toward a More Mobile and Productive Workforce. Business and Information Technology. Retrieved from http://0-digitalcommons.mtech.edu.innopac.up.ac.za/business_info_tech/3Google Scholar
- Schadler, T., & McCarthy, J. (2012, 8 March). Mobile Is The New Face Of Engagement. Retrieved from http://cdn.blog-sap.com/innovation/files/2012/08/SAP_Mobile_Is_The_New_Face_Of_Engagement.pdfGoogle Scholar
- SogetiLabs. (2013). BYOD, Big Data, Cloud Rank High Among Top Trends for 2013. {Article}. Security: Solutions for Enterprise Security Leaders, 50(4), 25--26.Google Scholar
- Stagliano, T., DiPoalo, A., & Coonelly, P. (2013). The Consumerization of Information Technology: La Salle University Digital Commons.Google Scholar
- STATS-SA. (2013). Mid-year population estimates. Pretoria: Retrieved from http://www.statssa.gov.za/Publications/P0302/P03022013. pdf.Google Scholar
- Tokuyoshi, B. (2013). The security implications of BYOD. Network Security, 2013(4), 12--13. doi: http://dx.doi.org/10.1016/S1353-4858(13)70050-3Google ScholarCross Ref
- Varshney, U., & Vetter, R. (2000). Emerging mobile and wireless networks. Communications of the ACM 43(6), 73--81. Google ScholarDigital Library
- Wright, A. (2013). 5 Trends Changing the Nature of Work. HR News. Retrieved from http://www.shrm.org/Publications/HRNews/Pages/5-Trends-Changing-the-Nature-of-Work.aspxGoogle Scholar
- Yegulalp, S. (2013). Making BYOD Work- BYOD Deep Dive: Infoworld.Google Scholar
Index Terms
- Employee perceptions of BYOD in South Africa: Employers are turning a blind eye?
Recommendations
Antecedents of turnover intention and actual turnover among information systems personnel in South Africa
SIGMIS CPR '06: Proceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research: Forty four years of computer personnel research: achievements, challenges & the futureThis study investigates Information Systems (IS) personnel turnover in South Africa. The results indicate that there is significant positive correlation between job satisfaction, career satisfaction and organisational commitment, whereby individuals ...
e-governance strategies in Cape Verde and South Africa: from service delivery to e-participation
ICEGOV '07: Proceedings of the 1st international conference on Theory and practice of electronic governanceAn assessment of current state of e-Governance in Africa notes that while many initiatives and projects are being implemented throughout Africa, the application of ICT for better governance is not systematic and the impacts are uneven. Thus two cases in ...
The shortage of skilled storage professionals in South Africa and coping strategies employed
SAICSIT '10: Proceedings of the 2010 Annual Research Conference of the South African Institute of Computer Scientists and Information TechnologistsOrganisations are faced with the requirement to store increasing amounts of data, yet the skills needed to design, manage and maintain the storage environment are often lacking. This paper presents the findings of a study undertaken to investigate the ...
Comments