Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » International Journal of Data and Network Science » Understanding the role of the bring-your-own-device policy in mobile learning behavioral usage

Journals

  • IJIEC (726)
  • MSL (2637)
  • DSL (649)
  • CCL (495)
  • USCM (1092)
  • ESM (404)
  • AC (557)
  • JPM (247)
  • IJDS (912)
  • JFS (91)
  • HE (21)
  • SCI (0)

IJDS Volumes

    • Volume 1 (8)
      • Issue 1 (5)
      • Issue 2 (3)
    • Volume 2 (12)
      • Issue 1 (3)
      • Issue 2 (3)
      • Issue 3 (3)
      • Issue 4 (3)
    • Volume 3 (27)
      • Issue 1 (4)
      • Issue 2 (9)
      • Issue 3 (8)
      • Issue 4 (6)
    • Volume 4 (37)
      • Issue 1 (6)
      • Issue 2 (15)
      • Issue 3 (7)
      • Issue 4 (9)
    • Volume 5 (86)
      • Issue 1 (9)
      • Issue 2 (11)
      • Issue 3 (32)
      • Issue 4 (34)
    • Volume 6 (163)
      • Issue 1 (30)
      • Issue 2 (33)
      • Issue 3 (40)
      • Issue 4 (60)
    • Volume 7 (200)
      • Issue 1 (53)
      • Issue 2 (46)
      • Issue 3 (46)
      • Issue 4 (55)
    • Volume 8 (243)
      • Issue 1 (60)
      • Issue 2 (61)
      • Issue 3 (60)
      • Issue 4 (62)
    • Volume 9 (96)
      • Issue 1 (20)
      • Issue 2 (6)
      • Issue 3 (30)
      • Issue 4 (40)
    • Volume 10 (40)
      • Issue 1 (40)

Keywords

Jordan(161)
Supply chain management(160)
Vietnam(148)
Customer satisfaction(120)
Performance(113)
Supply chain(108)
Service quality(98)
Tehran Stock Exchange(94)
Competitive advantage(93)
SMEs(86)
optimization(84)
Financial performance(83)
Trust(81)
Job satisfaction(79)
Social media(78)
Factor analysis(78)
TOPSIS(78)
Knowledge Management(77)
Genetic Algorithm(76)
Sustainability(76)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(59)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Muhammad Turki Alshurideh(35)
Dmaithan Almajali(35)
Barween Al Kurdi(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Ahmad Makui(31)
Mohammad Khodaei Valahzaghard(30)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Sautma Ronni Basana(27)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2162)
Indonesia(1276)
Jordan(783)
India(779)
Vietnam(500)
Saudi Arabia(438)
Malaysia(438)
United Arab Emirates(220)
China(181)
Thailand(151)
United States(109)
Turkey(102)
Ukraine(99)
Egypt(95)
Canada(89)
Pakistan(84)
Peru(83)
United Kingdom(77)
Nigeria(77)
Morocco(73)


» Show all countries

International Journal of Data and Network Science

ISSN 2561-8156 (Online) - ISSN 2561-8148 (Print)
Quarterly Publication
Volume 6 Issue 4 pp. 1187-1194 , 2022

Understanding the role of the bring-your-own-device policy in mobile learning behavioral usage Pages 1187-1194 Right click to download the paper Download PDF

Authors: Nida AL-Sous, Dmaithan Almajali, Zulkhairi Dahalin

DOI: 10.5267/j.ijdns.2022.7.001

Keywords: Attitude, Subjective norms, Information security awareness, BYOD

Abstract: The determinants of bring-your-own-device (BYOD) use protection intentions affecting BYOD usage protection behaviors were examined in this study. The determinants of employees’ behavioral intention to use and their actual protection behavior in protecting their devices BYOD environment were identified. Jordanian residents aged 18 and above, with mobile learning behavioral usage awareness, made up the study population. A survey questionnaire was used to obtain the data, while the proposed research model was tested using structural equation modeling (SEM). The results show positive impact of BYOD usage protection intention on mobile learning behavioral usage, while attitude showed insignificant impact on BODY usage protection intention. Subjective norms significantly affected BYOD usage protection intention, while information security awareness showed insignificant impact on BYOD usage protection intention.

How to cite this paper
AL-Sous, N., Almajali, D & Dahalin, Z. (2022). Understanding the role of the bring-your-own-device policy in mobile learning behavioral usage.International Journal of Data and Network Science, 6(4), 1187-1194.

Refrences
Ajzen, I. (2020). The theory of planned behavior: Frequently asked questions. Human Behavior and Emerging Technolo-gies, 2(4), 314-324. https://doi.org/10.1002/hbe2.195
Al Ayubi, S. U., Pelletier, A., Sunthara, G., Gujral, N., Mittal, V., & Bourgeois, F. C. (2016). A mobile app development guideline for hospital settings: Maximizing the use of and minimizing the security risks of" bring your own devices" policies. JMIR mHealth and uHealth, 4(2), e4424.‏
Al-Emran, M. (2020). Mobile learning during the era of COVID-19. Revista Virtual Universidad Católica Del Norte, 61, 1–2.
Ally, M. (2013). Mobile learning: From research to practice to impact education. Learning and Teaching in Higher Edu-cation: Gulf Perspectives, 10(2), 3-12.‏
Ameen, N., Tarhini, A., Shah, M. H., Madichie, N., Paul, J., & Choudrie, J. (2021). Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behavior, 114(April 2020), 106531. 39 https://doi.org/10.1016/j.chb.2020.106531
Boxer, M., & Thompson, N. (2020). Herd behaviour in cryptocurrency markets. 31st Australasian Conference on Infor-mation Systems, Wellington. https://espace.curtin.edu.au/handle/20.500.11937/81762
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of ration-ality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.‏
Chang, I. J., Huang, R., He, W., Zhang, S. K., Wang, S. M., Zhao, F. H., ... & Qiao, Y. L. (2013). Effect of an educational intervention on HPV knowledge and vaccine attitudes among urban employed women and female undergraduate stu-dents in China: a cross-sectional study. BMC Public Health, 13(1), 1-8.‏
Chon, B. S., Lee, J. K., Jeong, H., Park, J., & Park, J. (2018). Determinants of the Intention to Protect Personal Infor-mation among Facebook Users: ETRI Journal, 40(1), 146–155. https://doi.org/10.4218/etrij.2017-0082.
D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98. https://doi.org/10.1287/isre.1070.0160
Dhawan, S., Singh, K., & Goel, S. (2014). Impact of privacy attitude, concern and awareness on use 2 of online social net-working. Proceedings of the 5th International Conference on Confluence 2014: 3 The Next Generation Information Technology Summit, 14–17. 4
Dimond, R., Bullock, A., Lovatt, J. and Stacey, M. (2016). Mobile learning devices in the workplace: ‘as much a part of the junior doctors’ kit as a stethoscope?. BMC Medical Education, 16(1), 1-9.
Disterer, G., & Kleiner, C. (2013). BYOD bring your own device. Procedia Technology, 9, 43-53.
Fishbein, M., & Ajzen, A. (1980). Understanding attitudes and predicting social behaviour. Englewood Cliffs: Prentice Hall.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 18(1), 39-50.‏
Grassegger, T., & Nedbal, D. (2021). The role of employees’ information security awareness on the intention to resist so-cial engineering. Procedia Computer Science, 181(2019), 59–66.
Haeussinger, F., &Kranz, J. (2013). Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior. In Proceedings of the 34th International Conference on Information Systems (ICIS), Milan, Italy. Paper 1149.
Hair, J. F., Page, M., & Brunsveld, N. (2019). Essentials of business research methods. Routledge.
Hardyman, W., Bullock, A., Brown, A., Carter-Ingram, S. and Stacey, M. (2013). Mobile technology supporting trainee doctors’ workplace learning and patient care: an evaluation. BMC Medical Education, 13 (1), 1-10.
Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in or-ganisations. European Journal of information systems, 18(2), 106-125.‏
Hina, S., & Dominic, D. D. (2017). Need for information security policies compliance: A perspective in Higher Educa-tion Institutions. International Conference on Research and Innovation in Information Systems, ICRIIS, 1–6.
Hughes. (2016). BYOD and the Medical Practice.
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 83–95.
James, L., Mulaik, S., & Brett, J. (1982). Causal Analysis: Assumptions, Models, and Data. Sage Publications, Beverly Hills.
Kaur, J., Mustafa, N. (2013). Examining the effects of knowledge, attitude and behaviour on information security aware-ness: A case on SME. International Conference on Research and Innovation in Information Systems, ICRIIS, 2013, 286–290.
Lewis, T.L., & Wyatt, J.C. (2014). MHealth and mobile medical apps: a framework to assess risk and promote safer use. Journal of Medical Internet Research, 16(9), 1-8.
Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Computers in Human Behavior, 92, 139-150.‏
McCormac, A., Calic, D., Butavicius, M., Parsons, K., Zwaans, T., & Pattinson, M. (2017). A reliable measure of infor-mation security awareness and the identification of bias in responses. Australasian Journal of Information Systems, 21, ‏1-12.
Meneghetti, A. (2013). Challenges and benefits in a mobile medical world: institutions should create a set of BYOD guidelines that foster mobile device usage. Health management technology, 34(2), 6-7.‏
Milne, S., Orbell, S., & Sheeran, P. (2002). Combining motivational and volitional interventions to promote exercise par-ticipation: Protection motivation theory and implementation intentions. British journal of health psychology, 7(2), 163-184.‏
Musarurwa, A., Flowerday, S., & Cilliers, L. (2019). The bring‐your‐own‐device unintended administrator: A perspective from Zimbabwe. The Electronic Journal of Information Systems in Developing Countries, 85(4), e12076.
Nasir, A., Abdullah Arshah, R., & Ab Hamid, M. R. (2019). A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions. Information Security Journal: A Global Perspective, 28(3), 55-80.‏
Newkirk, H. E., & Lederer, A. L. (2006). The effectiveness of strategic information systems planning under environmen-tal uncertainty. Information & Management, 43(4), 481-501.‏
Nguyen, H. V. (2019). Cybersecurity strategies for universities with bring your own device programs (Doctoral disserta-tion, Walden University).‏
O’Connor, P., Byrne, D., Butt, M., Offiah, G., Lydon, S., McCinerney, K., Stewart, B. and Kerin, M.J. (2014), “Interns and their smartphones: use for clinical practice”, Postgraduate Medical Journal, 90 ( 1060), 75-79.
Oberlo. (2020). How Many People Have Smartphones in Number of Smartphone Users in Advanced and Emerging Econ-omies.
Ortiz, J., Chang, S. H., Chih, W. H., & Wang, C. H. (2017). The contradiction between self-protection and self-presentation on knowledge sharing behavior. Computers in Human Behavior, 76, 406-416.‏
Palanisamy, R., Norman, A. A., & Kiah, M. L. M. (2020). Compliance with Bring Your Own Device security policies in organizations: A systematic literature review. Computers & Security, 98, 101998.‏
Rajab, M., & Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80, 211-223.‏
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-78.‏
Schwab, J. J. (1982). Science, curriculum, and liberal education: Selected essays. University of Chicago Press.‏
Sommestad, T., Karlzén, H., & Hallberg, J. (2019). The Theory of Planned Behavior and Information Security Policy Compliance. Journal of Computer Information Systems, 59(4), 344–353.
Thompson, N., McGill, T. J., & Wang, X. (2017). Security begins at home”: Determinants of home computer and mobile device security behavior. computers & security, 70, 376-391.‏
Topa, I., & Karyda, M. (2015). Identifying factors that influence employees’ security behavior for enhancing ISP compli-ance. In International Conference on Trust and Privacy in Digital Business (pp. 169-179). Springer, Cham.‏
Tran, K., Morra, D., Lo, V., Quan, S.D., Abrams, H., & Wu, R.C. (2014). Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism. Journal of Medical Internet Research, 16 (5), 1-8.
Tsai, S., Lv, N., Xiao, L., & Ma, J. (2016). Gender differences in weight-related attitudes and behaviors among overweight and obese adults in the United States. American journal of men's health, 10(5), 389-398.‏
Turner, F. (2021). From counterculture to cyberculture. In From Counterculture to Cyberculture. University of Chicago Press.
Vrhovec, S., & Markelj, B. (2018). Relating mobile device use and adherence to information security policy with data breach consequences in hospitals. Journal of Universal Computer Science, 24(5), 634–645.
Wani, T.A., Mendoza, A., & Gray, K. (2020). Hospital bring-your-own-device security challenges and solutions: system-atic review of gray literature. JMIR mHealth and uHealth, 8 (6), e18175.
Weeger, A., Wang, X., & Gewald, H. (2016). IT consumerization: BYOD-program acceptance and its impact on employer attractiveness. Journal of Computer Information Systems, 56 (1), 1-10.
Williams, J. (2014). Left to their own devices how healthcare organizations are tackling the BYOD trend. Biomedical In-strumentation & Technology, 48(5), 327-339.‏
Zaidi, S. F. H., Osmanaj, V., Ali, O., & Zaidi, S. A. H. (2021). Adoption of mobile technology for mobile learning by university students during COVID-19. International Journal of Information and Learning Technology, 38(4).
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: International Journal of Data and Network Science | Year: 2022 | Volume: 6 | Issue: 4 | Views: 793 | Reviews: 0

Related Articles:
  • Factors affecting private customers in adopting mobile banking in Vietnam
  • A study on FRAME model: Evidence from banking industry
  • An investigation on the role of brand equity on electronic acceptance
  • An empirical investigation to analysis the dimensions of cultural security: ...
  • A new method for improving security in MANETs AODV Protocol

Add Reviews

Name:*
E-Mail:
Review:
Bold Italic Underline Strike | Align left Center Align right | Insert smilies Insert link URLInsert protected URL Select color | Add Hidden Text Insert Quote Convert selected text from selection to Cyrillic (Russian) alphabet Insert spoiler
winkwinkedsmileam
belayfeelfellowlaughing
lollovenorecourse
requestsadtonguewassat
cryingwhatbullyangry
Security Code: *
Include security image CAPCHA.
Refresh Code

® 2010-2025 GrowingScience.Com