2020
DOI: 10.1080/17517575.2020.1791966
|View full text |Cite
|
Sign up to set email alerts
|

Understanding cloud-based BYOD information security protection behaviour in smart business: in perspective of perceived value

Abstract: This research aims at investigating the critical factors that promote users in protecting the Bring Your Own Device (BYOD) information security. Perceived value serves as the core variable and integrates the Technology Threat Avoidance Theory and the Value-based Adoption Model to propose an integrated model. The questionnaire survey employed to verify the hypotheses. The results show that perceived usefulness (positive), perceived threats (positive), perceived expense (negative), impact on systems performance … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 58 publications
0
7
0
Order By: Relevance
“…Whereas, cybersecurity is a branch of information-security which deals with protecting Internet systems including software, data and hardware from any type of cyber attacks. Protects network integrity from unauthorized electronic access [4], [5]. Network security is a branch of cyber security that is designed to protect network connectivity and secure data delivery through network components.…”
Section: Introductionmentioning
confidence: 99%
“…Whereas, cybersecurity is a branch of information-security which deals with protecting Internet systems including software, data and hardware from any type of cyber attacks. Protects network integrity from unauthorized electronic access [4], [5]. Network security is a branch of cyber security that is designed to protect network connectivity and secure data delivery through network components.…”
Section: Introductionmentioning
confidence: 99%
“…One exemplary self-efficacy scale from the context of privacy or IT security implementation, is the Self-Efficacy in Information Security (SEIS) scale by Rhee, Kim and Ryu [95]. The scale's representative and general character is highlighted by recurring references within other ad-hoc scale development works [38,72,89] and significant correlations (ranging between 𝑟 = .60 and 𝑟 = .85) with a number of alternative cybersecurity self-efficacy measures. Rhee, Kim and Ryu [95] report several steps taken to ensure validity in item construction.…”
Section: Convergent Construct Validitymentioning
confidence: 99%
“…This is important to address potential threats before they are exploited by attackers. Regular auditing and system monitoring were important components of securing BYOD mobile devices in a hybrid environment, as they enabled the identification and remediation of security issues, as well as maintaining compliance with standards and legislation [36][37][38].…”
Section: Yesmentioning
confidence: 99%