Abstract

Corporations continue to see a growing demand for Bring-Your-Own-Device (BYOD) programs which allow employees to use their own computing devices for business purposes. This study analyses the demand of digital natives for such programs when entering the workforce and how they perceive the benefits and risk associated with BYOD. A theoretical model building on net valence considerations, technology adoption theories and perceived risk theory is proposed and tested. International students from five countries in their final year and with relevant work experience were surveyed. The results show that the intention to enroll in a BYOD program is primarily a function of perceived benefits while risks are widely ignored. Only safety and performance risks proved to contribute significantly to the overall perceived risk. The knowledge acquired from this study is particularly beneficial to IT executives as a guide to deciding whether and how to set up or adjust corporate BYOD initiatives.

Highlights

  • The last decade saw an unprecedented rise of technology infiltrating private life and altering personal habits

  • The results demonstrate that digital natives primarily consider the benefits and neglect the risks of participating in a BYOD program

  • Benefit expectations positively influence behavior al intention, whereby perceived risk inhibits the dual use of privately-owned devices

Read more

Summary

Introduction

The last decade saw an unprecedented rise of technology infiltrating private life and altering personal habits. ‘being always online’ increasingly becomes a habit for people of all ages (Smith 2017) it seems to be absolutely indispensable for the younger generations (Tapscott 2009). This phenomenon is well researched for those born between 1980 and 1995, a cohort which has been given a wide range of names, including ‘Millennials’ (Strauss and Howe 1991), ‘Generation Y’ (Johnson and Johnson 2010), ‘Generation Me’ (Twenge 2007), or ‘Nexters’ (Zemke et al 2000). This term reflects that they are used to have access to the internet everywhere and everywhen to find information, perform social interaction, etc. (Tapscott 2009)

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.