How to cite this paper
AL-Sous, N., Almajali, D & Dahalin, Z. (2022). Understanding the role of the bring-your-own-device policy in mobile learning behavioral usage.International Journal of Data and Network Science, 6(4), 1187-1194.
Refrences
Ajzen, I. (2020). The theory of planned behavior: Frequently asked questions. Human Behavior and Emerging Technolo-gies, 2(4), 314-324. https://doi.org/10.1002/hbe2.195
Al Ayubi, S. U., Pelletier, A., Sunthara, G., Gujral, N., Mittal, V., & Bourgeois, F. C. (2016). A mobile app development guideline for hospital settings: Maximizing the use of and minimizing the security risks of" bring your own devices" policies. JMIR mHealth and uHealth, 4(2), e4424.
Al-Emran, M. (2020). Mobile learning during the era of COVID-19. Revista Virtual Universidad Católica Del Norte, 61, 1–2.
Ally, M. (2013). Mobile learning: From research to practice to impact education. Learning and Teaching in Higher Edu-cation: Gulf Perspectives, 10(2), 3-12.
Ameen, N., Tarhini, A., Shah, M. H., Madichie, N., Paul, J., & Choudrie, J. (2021). Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behavior, 114(April 2020), 106531. 39 https://doi.org/10.1016/j.chb.2020.106531
Boxer, M., & Thompson, N. (2020). Herd behaviour in cryptocurrency markets. 31st Australasian Conference on Infor-mation Systems, Wellington. https://espace.curtin.edu.au/handle/20.500.11937/81762
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of ration-ality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.
Chang, I. J., Huang, R., He, W., Zhang, S. K., Wang, S. M., Zhao, F. H., ... & Qiao, Y. L. (2013). Effect of an educational intervention on HPV knowledge and vaccine attitudes among urban employed women and female undergraduate stu-dents in China: a cross-sectional study. BMC Public Health, 13(1), 1-8.
Chon, B. S., Lee, J. K., Jeong, H., Park, J., & Park, J. (2018). Determinants of the Intention to Protect Personal Infor-mation among Facebook Users: ETRI Journal, 40(1), 146–155. https://doi.org/10.4218/etrij.2017-0082.
D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98. https://doi.org/10.1287/isre.1070.0160
Dhawan, S., Singh, K., & Goel, S. (2014). Impact of privacy attitude, concern and awareness on use 2 of online social net-working. Proceedings of the 5th International Conference on Confluence 2014: 3 The Next Generation Information Technology Summit, 14–17. 4
Dimond, R., Bullock, A., Lovatt, J. and Stacey, M. (2016). Mobile learning devices in the workplace: ‘as much a part of the junior doctors’ kit as a stethoscope?. BMC Medical Education, 16(1), 1-9.
Disterer, G., & Kleiner, C. (2013). BYOD bring your own device. Procedia Technology, 9, 43-53.
Fishbein, M., & Ajzen, A. (1980). Understanding attitudes and predicting social behaviour. Englewood Cliffs: Prentice Hall.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 18(1), 39-50.
Grassegger, T., & Nedbal, D. (2021). The role of employees’ information security awareness on the intention to resist so-cial engineering. Procedia Computer Science, 181(2019), 59–66.
Haeussinger, F., &Kranz, J. (2013). Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior. In Proceedings of the 34th International Conference on Information Systems (ICIS), Milan, Italy. Paper 1149.
Hair, J. F., Page, M., & Brunsveld, N. (2019). Essentials of business research methods. Routledge.
Hardyman, W., Bullock, A., Brown, A., Carter-Ingram, S. and Stacey, M. (2013). Mobile technology supporting trainee doctors’ workplace learning and patient care: an evaluation. BMC Medical Education, 13 (1), 1-10.
Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in or-ganisations. European Journal of information systems, 18(2), 106-125.
Hina, S., & Dominic, D. D. (2017). Need for information security policies compliance: A perspective in Higher Educa-tion Institutions. International Conference on Research and Innovation in Information Systems, ICRIIS, 1–6.
Hughes. (2016). BYOD and the Medical Practice.
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 83–95.
James, L., Mulaik, S., & Brett, J. (1982). Causal Analysis: Assumptions, Models, and Data. Sage Publications, Beverly Hills.
Kaur, J., Mustafa, N. (2013). Examining the effects of knowledge, attitude and behaviour on information security aware-ness: A case on SME. International Conference on Research and Innovation in Information Systems, ICRIIS, 2013, 286–290.
Lewis, T.L., & Wyatt, J.C. (2014). MHealth and mobile medical apps: a framework to assess risk and promote safer use. Journal of Medical Internet Research, 16(9), 1-8.
Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Computers in Human Behavior, 92, 139-150.
McCormac, A., Calic, D., Butavicius, M., Parsons, K., Zwaans, T., & Pattinson, M. (2017). A reliable measure of infor-mation security awareness and the identification of bias in responses. Australasian Journal of Information Systems, 21, 1-12.
Meneghetti, A. (2013). Challenges and benefits in a mobile medical world: institutions should create a set of BYOD guidelines that foster mobile device usage. Health management technology, 34(2), 6-7.
Milne, S., Orbell, S., & Sheeran, P. (2002). Combining motivational and volitional interventions to promote exercise par-ticipation: Protection motivation theory and implementation intentions. British journal of health psychology, 7(2), 163-184.
Musarurwa, A., Flowerday, S., & Cilliers, L. (2019). The bring‐your‐own‐device unintended administrator: A perspective from Zimbabwe. The Electronic Journal of Information Systems in Developing Countries, 85(4), e12076.
Nasir, A., Abdullah Arshah, R., & Ab Hamid, M. R. (2019). A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions. Information Security Journal: A Global Perspective, 28(3), 55-80.
Newkirk, H. E., & Lederer, A. L. (2006). The effectiveness of strategic information systems planning under environmen-tal uncertainty. Information & Management, 43(4), 481-501.
Nguyen, H. V. (2019). Cybersecurity strategies for universities with bring your own device programs (Doctoral disserta-tion, Walden University).
O’Connor, P., Byrne, D., Butt, M., Offiah, G., Lydon, S., McCinerney, K., Stewart, B. and Kerin, M.J. (2014), “Interns and their smartphones: use for clinical practice”, Postgraduate Medical Journal, 90 ( 1060), 75-79.
Oberlo. (2020). How Many People Have Smartphones in Number of Smartphone Users in Advanced and Emerging Econ-omies.
Ortiz, J., Chang, S. H., Chih, W. H., & Wang, C. H. (2017). The contradiction between self-protection and self-presentation on knowledge sharing behavior. Computers in Human Behavior, 76, 406-416.
Palanisamy, R., Norman, A. A., & Kiah, M. L. M. (2020). Compliance with Bring Your Own Device security policies in organizations: A systematic literature review. Computers & Security, 98, 101998.
Rajab, M., & Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80, 211-223.
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-78.
Schwab, J. J. (1982). Science, curriculum, and liberal education: Selected essays. University of Chicago Press.
Sommestad, T., Karlzén, H., & Hallberg, J. (2019). The Theory of Planned Behavior and Information Security Policy Compliance. Journal of Computer Information Systems, 59(4), 344–353.
Thompson, N., McGill, T. J., & Wang, X. (2017). Security begins at home”: Determinants of home computer and mobile device security behavior. computers & security, 70, 376-391.
Topa, I., & Karyda, M. (2015). Identifying factors that influence employees’ security behavior for enhancing ISP compli-ance. In International Conference on Trust and Privacy in Digital Business (pp. 169-179). Springer, Cham.
Tran, K., Morra, D., Lo, V., Quan, S.D., Abrams, H., & Wu, R.C. (2014). Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism. Journal of Medical Internet Research, 16 (5), 1-8.
Tsai, S., Lv, N., Xiao, L., & Ma, J. (2016). Gender differences in weight-related attitudes and behaviors among overweight and obese adults in the United States. American journal of men's health, 10(5), 389-398.
Turner, F. (2021). From counterculture to cyberculture. In From Counterculture to Cyberculture. University of Chicago Press.
Vrhovec, S., & Markelj, B. (2018). Relating mobile device use and adherence to information security policy with data breach consequences in hospitals. Journal of Universal Computer Science, 24(5), 634–645.
Wani, T.A., Mendoza, A., & Gray, K. (2020). Hospital bring-your-own-device security challenges and solutions: system-atic review of gray literature. JMIR mHealth and uHealth, 8 (6), e18175.
Weeger, A., Wang, X., & Gewald, H. (2016). IT consumerization: BYOD-program acceptance and its impact on employer attractiveness. Journal of Computer Information Systems, 56 (1), 1-10.
Williams, J. (2014). Left to their own devices how healthcare organizations are tackling the BYOD trend. Biomedical In-strumentation & Technology, 48(5), 327-339.
Zaidi, S. F. H., Osmanaj, V., Ali, O., & Zaidi, S. A. H. (2021). Adoption of mobile technology for mobile learning by university students during COVID-19. International Journal of Information and Learning Technology, 38(4).
Al Ayubi, S. U., Pelletier, A., Sunthara, G., Gujral, N., Mittal, V., & Bourgeois, F. C. (2016). A mobile app development guideline for hospital settings: Maximizing the use of and minimizing the security risks of" bring your own devices" policies. JMIR mHealth and uHealth, 4(2), e4424.
Al-Emran, M. (2020). Mobile learning during the era of COVID-19. Revista Virtual Universidad Católica Del Norte, 61, 1–2.
Ally, M. (2013). Mobile learning: From research to practice to impact education. Learning and Teaching in Higher Edu-cation: Gulf Perspectives, 10(2), 3-12.
Ameen, N., Tarhini, A., Shah, M. H., Madichie, N., Paul, J., & Choudrie, J. (2021). Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behavior, 114(April 2020), 106531. 39 https://doi.org/10.1016/j.chb.2020.106531
Boxer, M., & Thompson, N. (2020). Herd behaviour in cryptocurrency markets. 31st Australasian Conference on Infor-mation Systems, Wellington. https://espace.curtin.edu.au/handle/20.500.11937/81762
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of ration-ality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.
Chang, I. J., Huang, R., He, W., Zhang, S. K., Wang, S. M., Zhao, F. H., ... & Qiao, Y. L. (2013). Effect of an educational intervention on HPV knowledge and vaccine attitudes among urban employed women and female undergraduate stu-dents in China: a cross-sectional study. BMC Public Health, 13(1), 1-8.
Chon, B. S., Lee, J. K., Jeong, H., Park, J., & Park, J. (2018). Determinants of the Intention to Protect Personal Infor-mation among Facebook Users: ETRI Journal, 40(1), 146–155. https://doi.org/10.4218/etrij.2017-0082.
D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98. https://doi.org/10.1287/isre.1070.0160
Dhawan, S., Singh, K., & Goel, S. (2014). Impact of privacy attitude, concern and awareness on use 2 of online social net-working. Proceedings of the 5th International Conference on Confluence 2014: 3 The Next Generation Information Technology Summit, 14–17. 4
Dimond, R., Bullock, A., Lovatt, J. and Stacey, M. (2016). Mobile learning devices in the workplace: ‘as much a part of the junior doctors’ kit as a stethoscope?. BMC Medical Education, 16(1), 1-9.
Disterer, G., & Kleiner, C. (2013). BYOD bring your own device. Procedia Technology, 9, 43-53.
Fishbein, M., & Ajzen, A. (1980). Understanding attitudes and predicting social behaviour. Englewood Cliffs: Prentice Hall.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 18(1), 39-50.
Grassegger, T., & Nedbal, D. (2021). The role of employees’ information security awareness on the intention to resist so-cial engineering. Procedia Computer Science, 181(2019), 59–66.
Haeussinger, F., &Kranz, J. (2013). Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior. In Proceedings of the 34th International Conference on Information Systems (ICIS), Milan, Italy. Paper 1149.
Hair, J. F., Page, M., & Brunsveld, N. (2019). Essentials of business research methods. Routledge.
Hardyman, W., Bullock, A., Brown, A., Carter-Ingram, S. and Stacey, M. (2013). Mobile technology supporting trainee doctors’ workplace learning and patient care: an evaluation. BMC Medical Education, 13 (1), 1-10.
Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in or-ganisations. European Journal of information systems, 18(2), 106-125.
Hina, S., & Dominic, D. D. (2017). Need for information security policies compliance: A perspective in Higher Educa-tion Institutions. International Conference on Research and Innovation in Information Systems, ICRIIS, 1–6.
Hughes. (2016). BYOD and the Medical Practice.
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 83–95.
James, L., Mulaik, S., & Brett, J. (1982). Causal Analysis: Assumptions, Models, and Data. Sage Publications, Beverly Hills.
Kaur, J., Mustafa, N. (2013). Examining the effects of knowledge, attitude and behaviour on information security aware-ness: A case on SME. International Conference on Research and Innovation in Information Systems, ICRIIS, 2013, 286–290.
Lewis, T.L., & Wyatt, J.C. (2014). MHealth and mobile medical apps: a framework to assess risk and promote safer use. Journal of Medical Internet Research, 16(9), 1-8.
Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Computers in Human Behavior, 92, 139-150.
McCormac, A., Calic, D., Butavicius, M., Parsons, K., Zwaans, T., & Pattinson, M. (2017). A reliable measure of infor-mation security awareness and the identification of bias in responses. Australasian Journal of Information Systems, 21, 1-12.
Meneghetti, A. (2013). Challenges and benefits in a mobile medical world: institutions should create a set of BYOD guidelines that foster mobile device usage. Health management technology, 34(2), 6-7.
Milne, S., Orbell, S., & Sheeran, P. (2002). Combining motivational and volitional interventions to promote exercise par-ticipation: Protection motivation theory and implementation intentions. British journal of health psychology, 7(2), 163-184.
Musarurwa, A., Flowerday, S., & Cilliers, L. (2019). The bring‐your‐own‐device unintended administrator: A perspective from Zimbabwe. The Electronic Journal of Information Systems in Developing Countries, 85(4), e12076.
Nasir, A., Abdullah Arshah, R., & Ab Hamid, M. R. (2019). A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions. Information Security Journal: A Global Perspective, 28(3), 55-80.
Newkirk, H. E., & Lederer, A. L. (2006). The effectiveness of strategic information systems planning under environmen-tal uncertainty. Information & Management, 43(4), 481-501.
Nguyen, H. V. (2019). Cybersecurity strategies for universities with bring your own device programs (Doctoral disserta-tion, Walden University).
O’Connor, P., Byrne, D., Butt, M., Offiah, G., Lydon, S., McCinerney, K., Stewart, B. and Kerin, M.J. (2014), “Interns and their smartphones: use for clinical practice”, Postgraduate Medical Journal, 90 ( 1060), 75-79.
Oberlo. (2020). How Many People Have Smartphones in Number of Smartphone Users in Advanced and Emerging Econ-omies.
Ortiz, J., Chang, S. H., Chih, W. H., & Wang, C. H. (2017). The contradiction between self-protection and self-presentation on knowledge sharing behavior. Computers in Human Behavior, 76, 406-416.
Palanisamy, R., Norman, A. A., & Kiah, M. L. M. (2020). Compliance with Bring Your Own Device security policies in organizations: A systematic literature review. Computers & Security, 98, 101998.
Rajab, M., & Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80, 211-223.
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-78.
Schwab, J. J. (1982). Science, curriculum, and liberal education: Selected essays. University of Chicago Press.
Sommestad, T., Karlzén, H., & Hallberg, J. (2019). The Theory of Planned Behavior and Information Security Policy Compliance. Journal of Computer Information Systems, 59(4), 344–353.
Thompson, N., McGill, T. J., & Wang, X. (2017). Security begins at home”: Determinants of home computer and mobile device security behavior. computers & security, 70, 376-391.
Topa, I., & Karyda, M. (2015). Identifying factors that influence employees’ security behavior for enhancing ISP compli-ance. In International Conference on Trust and Privacy in Digital Business (pp. 169-179). Springer, Cham.
Tran, K., Morra, D., Lo, V., Quan, S.D., Abrams, H., & Wu, R.C. (2014). Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism. Journal of Medical Internet Research, 16 (5), 1-8.
Tsai, S., Lv, N., Xiao, L., & Ma, J. (2016). Gender differences in weight-related attitudes and behaviors among overweight and obese adults in the United States. American journal of men's health, 10(5), 389-398.
Turner, F. (2021). From counterculture to cyberculture. In From Counterculture to Cyberculture. University of Chicago Press.
Vrhovec, S., & Markelj, B. (2018). Relating mobile device use and adherence to information security policy with data breach consequences in hospitals. Journal of Universal Computer Science, 24(5), 634–645.
Wani, T.A., Mendoza, A., & Gray, K. (2020). Hospital bring-your-own-device security challenges and solutions: system-atic review of gray literature. JMIR mHealth and uHealth, 8 (6), e18175.
Weeger, A., Wang, X., & Gewald, H. (2016). IT consumerization: BYOD-program acceptance and its impact on employer attractiveness. Journal of Computer Information Systems, 56 (1), 1-10.
Williams, J. (2014). Left to their own devices how healthcare organizations are tackling the BYOD trend. Biomedical In-strumentation & Technology, 48(5), 327-339.
Zaidi, S. F. H., Osmanaj, V., Ali, O., & Zaidi, S. A. H. (2021). Adoption of mobile technology for mobile learning by university students during COVID-19. International Journal of Information and Learning Technology, 38(4).