Next Article in Journal
Demystifying the Specific Roles and Challenges of Educational Audiologists: A Narrative Review
Previous Article in Journal
Key Determinants of Continuance Usage Intention: An Empirical Study of Mobile Food Delivery Apps among Malaysians
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Proceeding Paper

Bring-Your-Own-Device (BYOD) and Productivity: A Conceptual Framework †

by
Mohamad Rahimi Mohamad Rosman
*,
Nurfatihah S Baharuddin
,
Noor Azreen Alimin
,
Nik Nur Izzati Nik Rosli
,
Amira Idayu Mohd Shukry
and
Noor Masliana Razlan
Faculty of Information Management, Universiti Teknologi MARA Kelantan Branch, Machang 18500, Malaysia
*
Author to whom correspondence should be addressed.
Presented at the International Academic Symposium of Social Science 2022, Kota Bharu, Malaysia, 3 July 2022.
Proceedings 2022, 82(1), 10; https://doi.org/10.3390/proceedings2022082010
Published: 7 September 2022
(This article belongs to the Proceedings of International Academic Symposium of Social Science 2022)

Abstract

:
BYOD is defined as the act of bringing your own gadget, facilities, or device to the organization or institution. The concept of BYOD has spread almost to many sectors, especially in education, due to a shortage of financial resources in the aftermath of the Novel Coronavirus 2019 pandemic. BYOD is a helpful concept in face-to-face education by giving the needy access to adequate resources. However, most of the time, students especially in higher learning institutions, are having a problem accessing adequate resources and facilities standards that may influence their productivity, performance, and perceived benefits. Moreover, the inadequacy of standardized facilities and requirements may also deprive the students of necessary productivity standards. Furthermore, the pandemic of Novel Coronavirus 2019 has transformed the current workplace practices, changing the work-life environment and warranting further exploration. Therefore, the purpose of this study is twofold; first, to identify user behavior intention to adopt BYOD, and second, to propose a conceptual model of BYOD underlying the interrelationship between BYOD antecedents and productivity. A structured literature review methodology was adopted, and a conceptual model was developed for further exploration of the topic. The contribution of this paper is as follows; first, this study identifies the antecedents of behavioral intention to adopt BYOD in the aftermath of the Novel Coronavirus 2019. Second, this study proposes a conceptual model underlying the relationship between BYOD antecedent, behavioral intention to adopt BYOD, and its impact in terms of productivity.

1. Introduction

Bring-your-own-device (BYOD) is defined as an act of bringing your own gadget, facilities, or device to the organization or institution. It’s a concept that is fast-spreading, especially in information technology (IT) consortiums and educational institutions [1,2,3,4]. BYOD is simply a process of allowing employees or students to attach or utilize their own facilities or device to the organizational or institutional facilities and network. According to [2], BYOD allows the employee to utilize their privately-owned device to assist business purposes, however, not without the added pressure of increasing individual cost, benefits, and extra cyber security threats. Previous research shows that BYOD has the capability to increase student learning engagement [5,6] via mastery of their privately-owned device and facilities. BYOD also encourages cost reduction, better management of organizational assets, and management of IT security [2].
However, the Novel Coronavirus 2019 (COVID-19) pandemic has seen drastic changes in the IT infrastructure acquisition and policy. Many organizations and education institutions were hampered by a lack of financial ability to maintain, sustain, or improve their current IT investment and facilities. Most organizations were also faced with a budget shortage for IT investment due to the cause of the COVID-19 pandemic [7,8]. Due to these limitations, users were left with incomplete, unstandardized, and insufficient access to IT facilities that may influence their level of productivity [1,9,10,11]. However, knowledge of this relationship is scarce within the field of Information System (IS); thus, warranting further exploration of the topic. For example, the COVID-19 pandemic has transformed the current workplace practices, thus, the changing work-life environment. Therefore, the purpose of this study is twofold; first, to identify user behavior intention to adopt BYOD, and second, to propose a conceptual model of BYOD underlying the interrelationship between BYOD antecedents and productivity.
The rest of the paper is organized as follows: First, the literature of the study is presented, followed by the methodology of the study. Next, the conceptual model of the study is presented and discussed. Lastly, the conclusion of the study is outlined.

2. Literature Review

2.1. Concept of BYOD

The concept of bring-your-own-device or BYOD can be traced from multiple disciplines: Information systems (IS), and business and management. BYOD can be categorized into two explicit terms. First, BYOD is related to the tendency of employees or students in an organization to connect their privately-owned devices to the work network [1,2]. Second, it relates to the mobile phone capability that allows users to activate their current phone independently without the need to buy a new phone (provider independence). BYOD has been on an emerging trend since its inception in early 2012. Surveys in 2013 showed that respondents in emerging countries (including Malaysia) showed enormous interest in using their privately-owned device in their workplace [12]. These employees believe that having direct and constant access to their workplace network helps them to be competitive and sustainable. Interestingly, a recent survey conducted in 2020 indicated that more than 77% of Malaysians connect their privately-owned device to their organizational corporate network [13].
Even though BYOD is on the rise, much of the discussion is on the security of corporate data resides within the privately-owned devices [3,5,14,15]. Allowing privately-owned devices to access corporate information may lead to several problems: first, privately-owned devices may be susceptible to cybersecurity attacks due to low-security mechanisms on personal hardware. Second, un-erased corporate data residing in the privately-owned devices may be leaked to outsiders once employees discarded or sold their devices. Thus, implementing a BYOD concept requires an appropriate workflow and policy enforcement.

2.2. BYOD and Education

The concept of BYOD has shifted from a business-based environment to an educational-centric environment. As mentioned in [5,6], the concept of BYOD has the capability to enhance student engagement and subsequently improve productivity. Previous surveys conducted on the interrelationship between BYOD and education show a wider acceptance of the BYOD concept in the educational institution, and most students own their personal devices such as laptops and mobile phones. Unlike IT companies, educational institution deals with less sensitive information, thus ensuring the information can be accessed from outside of the institution [1].
On the other hand, recent studies show that a total of 42% of students were satisfied with the teaching and learning approach in the wake of BYOD [16]. Besides, it also encourages professional competence (by bringing their privately-owned device), inspires the learning process, increases the reliance on IT, and decreases the dependency on the conventional document [16]. On top of it, the BYOD concept also appeals to many schools as it was actively adopted concept over the years due to cost-saving and the comfort of using the privately-owned device [17].

3. Methodology

This study adopted the structured literature review (SLR) methodology of [18] and [19]. First, the literature search started with a leading journal that was relevant to the field of study. Second, a backward search was conducted to identify relevant articles. Third, a forward search was conducted to identify any news articles that cite the publication.
In the first phase, we utilize the EzAccess, online database tools from one of the biggest universities in Malaysia to identify and search relevant articles from leading journals. The keywords used are “BYOD”, “Productivity”, and “Factors” or (TITLE-ABS-KEY(BYOD)) AND ((productivity)) AND (factor). To improve the accuracy of search results, we limit the article to research manuscripts, theses, and books. A total of 37 articles were found relevant to the topic of interest.
In the next stage, we evaluate the article based on the method suggested by [20]. First, we skimmed each of the papers to identify its topics and critical issues, Second, we focus on the introduction, abstract, discussion, and conclusion of the study. Third, we identify potential variables underlying the topic for the development of our proposed conceptual framework.

4. Conceptual Model

Based on the literature search, four (4) main themes or dimensions were identified, namely technological readiness [1,15,21,22,23], individual readiness [22,24,25,26,27], contextual readiness [1,6,28,29,30], and organizational readiness [31,32,33]. The following Figure 1 shows the proposed conceptual model of the study.
Behavioral intention to adopt BYOD is operationalized as the degree to which an individual has the urgency or tendency to adopt or refuse to adopt BYOD approaches. Behavior intention to adopt BYOD plays an important role in productivity improvement. Disengaging behavior or reluctance to adopt BYOD will lead to a negative impact on productivity improvement. As found out by [34], BYOD is no longer an option as many IT organizations turn to the concept of BYOD, thus, understanding the behavioral intention of users is very crucial to ensure the success of the transformation process. Similarly, [35,36] argue that BYOD implementation with related purposed has the capability to influence one’s productivity. Furthermore, BYOD also has the capability to enhance morale and increase engagement—thus closely related to productivity improvement [1,30]. Therefore, it can be hypothesized that:
H1. 
The intention to adopt BYOD has a positive and significant relationship with productivity.
Technological readiness is operationalized as the extent of individual technological establishment in support of BYOD implementation. According to [37], it is predicted that more than 95% of organizations allow the use of privately-owned devices and more than 85% of organizations implemented BYOD due to the COVID-19 pandemic. Subsequently, more employees relied on their privately-owned devices (65% of employees disclosed their personal contact numbers), and the number of privately-owned devices increased to over USD 11.96 billion in 2021. This recent statistic serves as evidence of the influence of the technological readiness towards user behavioral intention to implement or adapt the BYOD concept in the workplace. Therefore, it can be hypothesized that:
H2. 
Technological readiness has a positive and significant relationship with the intention to adopt BYOD.
Individual readiness is conceptualized as the extent of individual intrapersonal and interpersonal influence toward BYOD adoption. Individual readiness is believed to be one of the most relevant factors in IS success factor studies [38,39,40,41]. Among the factors that differentiate an individual is often related to demographic profiles such as age, education, income, etcetera [42]. These factors are crucial in the decision-making process that will shape user behavioral intention and either encourage or discourage the adoption of BYOD. Moreover, a lack of individual readiness usually discourages further interaction with the BYOD implementation. Therefore, it can be hypothesized that:
H3. 
Individual readiness has a positive and significant relationship with the intention to adopt BYOD.
Contextual readiness refers to external factors of an individual that shape their interaction and behavior towards BYOD implementation. Contextual factors can include multiple factors and antecedents, such as task resources and task complexity [6,43,44]. As argued by [45], the level of complexity influence user behavioral intention to adopt BYOD; for instance, BYOD increase cybersecurity threats and require more effort to ensure the safety of corporate data. Moreover, an individual has the preference to be familiar with their privately-owned devices, subsequently creating less pressure or a less intimidating environment [38]. Therefore, it can be hypothesized that:
H4. 
Contextual readiness has a positive and significant relationship with the intention to adopt BYOD.
Organizational readiness can be defined as the facilities, services, and support provided by the organization to the individual in an organization or institution. As mentioned by [31], organizational commitment is an important indicator of adoption success, as it may reduce resistance among the employee. Intriguingly, the number of adoption of BYOD among educational institutions is rather high with or without the organizational consent or policy [46]. According to [47], the adoption of BYOD may contribute to organizational benefits and performance; such as productivity enhancement. Therefore, it can be hypothesized that:
H5. 
Organizational readiness has a positive and significant relationship with the intention to adopt BYOD.

5. Conclusions

This study was conducted with two purposes; first, to identify user behavior intention to adopt BYOD, and second, to propose a conceptual model of BYOD underlying the interrelationship between BYOD antecedents and productivity. To proceed, a systematic literature review (SLR) methodology for [18,19] was adopted. Subsequently, four (4) antecedents underlying the adoption intention of BYOD were identified, technological readiness, individual readiness, contextual readiness, and organizational readiness. Next, the conceptual model of the study was proposed, and discussions were made on each hypothesis.
The next stage of this research is to validate the conceptual research model in a quantitative study. An instrument will be developed by adapting and adopting the previous instrument and it will be sent for expert validation. Following the expert validation, a pilot study will be conducted, and Cronbach’s Alpha coefficient will be used to determine the reliability of the instrument. Upon completion of the reliability assessment, a full-scale data collection will be performed among the respondents selected via the convenience sampling method. The potential respondents are undergraduate students from one of the local universities in Malaysia, selected based on demographic information explored via the SLR. Next, data will be analyzed based on descriptive using Statistical Package for Social Sciences (SPSS) version 26 and inferential using SmartPLS version 3.3.3.

Author Contributions

Conceptualization, M.R.M.R. and N.S.B.; methodology, N.A.A. and N.N.I.N.R.; validation, M.R.M.R. and A.I.M.S.; formal analysis, N.M.R.; investigation, N.A.A., N.N.I.N.R. and A.I.M.S.; resources, N.S.B.; data curation, M.R.M.R.; writing—original draft preparation, M.R.M.R., N.S.B., N.A.A., N.N.I.N.R., N.M.R. and A.I.M.S.; writing—review and editing, M.R.M.R.; visualization, M.R.M.R.; supervision, M.R.M.R.; project administration, M.R.M.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

This research was partially supported by Universiti Teknologi MARA Kelantan Branch, Malaysia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Afreen, R. Bring your own device (BYOD) in higher education: Opportunities and challenges. Int. J. Emerg. Trends Technol. Comput. Sci. 2014, 3, 233–236. [Google Scholar]
  2. Loose, M.; Weeger, A.; Gewald, H. BYOD–the next big thing in recruiting? Examining the determinants of BYOD service adoption behavior from the perspective of future employees. In AMCIS 2013 Proceedings, Chicago, IL, USA, 15–17 August 2013; Association for Information Systems: Atlanta, GA, USA, 2013; p. 12. [Google Scholar]
  3. Ratchford, M.; El-Gayar, O.; Noteboom, C.; Wang, Y. BYOD security issues: A systematic literature review. Inf. Secur. J. A Glob. Perspect. 2022, 31, 253–273. [Google Scholar] [CrossRef]
  4. Blay, A. Factors Influencing Employees’ Intention to Participate in a Bring Your Own Device Program in the Workplace: A Correlational Study in Ghana. Ph.D Thesis, Capella University, Minneapolis, MN, USA, 2022. [Google Scholar]
  5. Cheng, G. Using the community of inquiry framework to support and analyse BYOD implementation in the blended EFL classroom. Internet High. Educ. 2022, 54, 100854. [Google Scholar] [CrossRef]
  6. Rosman, M.R.M.; Arshad, I.H.; Alias, N.R.; Idris, Z.; Hamid, H.A. Managing Individual Online Learning Experience: The Roles of Perceived Engagement and Perceived Performance. In Advances in Information, Communication and Cybersecurity—Proceedings of ICI2C’21; Maleh, Y., Alazab, M., Gherabi, N., Tawalbeh, L., Abd El-Latif, A.A., Eds.; Lecture Notes in Networks and Systems; Springer: Cham, Switzerland, 2022; Volume 357, pp. 331–344. [Google Scholar]
  7. Baharuddin, N.S.; Rosman, M.R.M. Factors affecting the usage of Library e-services in the aftermath of COVID-19 Pandemic. Acad. J. Bus. Soc. Sci. 2020, 4, 1–14. [Google Scholar]
  8. Rosman, M.R.M.; Zawawi, M.Z.M.; Fadzil, F.H.; Abdullah, N.; Arshad, I.H.; Saleh, M.S.M. Does Information System Aids Decision Making Approach? The Case of Jury Management System. In Proceedings of the 2021 International Conference on Decision Aid Sciences and Application (DASA), Sakheer, Bahrain, 7–8 December 2021; pp. 85–90. [Google Scholar]
  9. Singh, N. BYOD genie is out of the bottle—“Devil or angel”. J. Bus. Manag. Soc. Sci. Res. 2012, 1, 1–12. [Google Scholar]
  10. Alotaibi, B.; Almagwashi, H. A review of BYOD security challenges, solutions and policy best practices. In Proceedings of the 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 4–6 April 2018; pp. 1–6. [Google Scholar]
  11. Soubhagyalakshmi, P.; Satyanarayan Reddy, K. SWOT Analysis of BYOD (Bring Your Own Device). In Emerging Technologies in Data Mining and Information Security; Springer: Berlin/Heidelberg, Germany, 2021; pp. 681–688. [Google Scholar]
  12. Cook, I. BYOD—Research Findings Released. Available online: https://cxounplugged.com/2012/11/ovum_byod_research-findings-released/ (accessed on 22 May 2022).
  13. Murugiah, S. Majority of Malaysians Connect Corporate Laptops to Home Network—Survey. Available online: https://www.theedgemarkets.com/article/majority-malaysians-connect-corporate-laptops-home-network-%E2%80%94-survey (accessed on 22 May 2022).
  14. Palanisamy, R.; Norman, A.A.; Mat Kiah, M.L. BYOD policy compliance: Risks and strategies in organizations. J. Comput. Inf. Syst. 2022, 62, 61–72. [Google Scholar] [CrossRef]
  15. Downer, K.; Bhattacharya, M. BYOD Security: A Study of Human Dimensions. Informatics 2022, 9, 16. [Google Scholar] [CrossRef]
  16. Jehma, H.; Punkhoom, W. How Thai Students Perceive BYOD as an Effective Strategy Applied in English Learning Environment. Dhammathas Acad. J. 2022, 22, 29–38. [Google Scholar]
  17. Siyam, N.; Hussain, M.; Alqaryouti, O. Factors impacting teachers’ acceptance and use of Bring Your Own Device (BYOD) in the classroom. SN Soc. Sci. 2022, 2, 1–30. [Google Scholar] [CrossRef]
  18. Webster, J.; Watson, R.T. Analyzing the past to prepare for the future: Writing a literature review. MIS Q. 2002, 26, xiii–xxiii. [Google Scholar]
  19. Rosman, M.R.M. Reviewing the Concept of Enterprise Content Management (ECM). J. Digit. Inf. Manag. 2020, 18, 125. [Google Scholar]
  20. Glaser, B.G.; Strauss, A.L.; Strutzel, E. The discovery of grounded theory; strategies for qualitative research. Nurs. Res. 1968, 17, 364. [Google Scholar] [CrossRef]
  21. Tsarapkina, J.M.; Dunaeva, N.; Kireicheva, A. Application of BYOD technology in education on the example of Lecture Racing mobile application. Инфoрматика Образoвание 2019, 9, 56–64. [Google Scholar] [CrossRef]
  22. Cristol, D.; Gimbert, B. Academic achievement in BYOD classrooms. In Proceedings of the 12th World Conference on Mobile and Contextual Learning (mLearn 2013), Doha, Qatar, 22–24 October 2013; p. 15. [Google Scholar]
  23. Koh, E.B.; Oh, J.; Im, C. A study on security threats and dynamic access control technology for BYOD, smart-work environment. In Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong, China, 12–14 March 2014; pp. 1–6. [Google Scholar]
  24. Leclercq-Vandelannoitte, A. Managing BYOD: How do organizations incorporate user-driven IT innovations? Inf. Technol. People 2015, 28, 2–23. [Google Scholar] [CrossRef]
  25. Köffer, S.; Ortbach, K.; Junglas, I.; Niehaves, B.; Harris, J. Innovation through BYOD? Bus. Inf. Syst. Eng. 2015, 57, 363–375. [Google Scholar] [CrossRef]
  26. Santos, I.M.; Bocheco, O. Exploring BYOD usage in the classroom and policies. Int. J. Inf. Commun. Technol. Educ. (IJICTE) 2016, 12, 51–61. [Google Scholar] [CrossRef]
  27. Arpaci, I. Arpaci, I. A theoretical framework for IT consumerization: Factors influencing the adoption of BYOD. In Handbook of Research on Technology Integration in the Global World; IGI Global: Hershey, PA, USA, 2018; pp. 114–129. [Google Scholar] [CrossRef]
  28. Alaskar, M.; Shen, K.N. Understanding bring your own device (BYOD) and employee information security behaviors from a work-life domain perspective. In AMCIS 2016 Proceedings, San Diego, CA, USA, 11–14 August 2016; Association for Information Systems: Atlanta, GA, USA, 2016; p. 38. [Google Scholar]
  29. Dang, D.P.T.; Pittayachawan, S.; Nkhoma, M.Z. Contextual difference and intention to perform information security behaviours against malware in a BYOD environment: A protection motivation theory approach. In ACIS 2013 Proceedings; Association for Information Systems: Atlanta, GA, USA, 2013; p. 49. Available online: https://aisel.aisnet.org/acis2013/49 (accessed on 24 May 2022).
  30. Yin, C.; Liu, L.; Liu, L. BYOD implementation: Understanding organizational performance through a gift perspective. In PACIS 2014 Proceedings, Chengdu, China, 24–28 June 2014; Association for Information Systems: Atlanta, GA, USA, 2014; p. 129. Available online: https://aisel.aisnet.org/pacis2014/129/ (accessed on 24 May 2022).
  31. Doargajudhur, M.S.; Dell, P. Impact of BYOD on organizational commitment: An empirical investigation. Inf. Technol. People 2018, 32, 246–268. [Google Scholar] [CrossRef]
  32. Hovav, A.; Putri, F.F. This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy. Pervasive Mob. Comput. 2016, 32, 35–49. [Google Scholar] [CrossRef]
  33. Putri, F.F.; Hovav, A. Employees’ Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory. In Proceedings of the European Conference on Information Systems (ECIS) 2014, Tel Aviv, Israel, 9–11 June 2014; Association for Information Systems: Atlanta, GA, USA, 2014. Available online: https://aisel.aisnet.org/ecis2014/proceedings/track16/2/ (accessed on 24 May 2022).
  34. Gupta, R.; Bhardwaj, G.; Singh, G. Employee Perception and Behavioral Intention to Adopt BYOD in the Organizations. In Proceedings of the 2019 International Conference on Automation, Computational and Technology Management (ICACTM), London, UK, 24–26 April 2019; pp. 73–78. [Google Scholar]
  35. Hayes, B.; Kotwica, K. Bring Your Own Device (BYOD) to Work: Trend Report; Newnes: Amsterdam, The Netherlands, 2013. [Google Scholar]
  36. Gaff, B.M. Byod? omg! Computer 2015, 48, 10–11. [Google Scholar] [CrossRef]
  37. Chang, J. 44 Basic BYOD Statistics: 2022 Market Share Analysis & Data. Available online: https://financesonline.com/byod-statistics/ (accessed on 24 May 2022).
  38. Mohamad Rosman, M.R.; Ismail, M.N.; Masrek, M.N. Investigating the predictors of digital library engagement: A structured literature analysis. Pak. J. Inf. Manag. Libr. 2021, 22, 60–82. [Google Scholar]
  39. Hong, K.-K.; Kim, Y.-G. The critical success factors for ERP implementation: An organizational fit perspective. Inf. Manag. 2002, 40, 25–40. [Google Scholar] [CrossRef]
  40. Hong, W.; Thong, J.Y.; Wong, W.-M.; Tam, K.-Y. Determinants of user acceptance of digital libraries: An empirical examination of individual differences and system characteristics. J. Manag. Inf. Syst. 2002, 18, 97–124. [Google Scholar] [CrossRef]
  41. Thong, J.Y.; Hong, W.; Tam, K.-Y. Understanding user acceptance of digital libraries: What are the roles of interface characteristics, organizational context, and individual differences? Int. J. Hum.-Comput. Stud. 2002, 57, 215–242. [Google Scholar] [CrossRef]
  42. Rosman, M.R.M.; Nik Rosli, N.N.I.; Shukry, A.I.M.; Razlan, N.M.; Alimin, N.A. Entangling the Interrelationship Between Demographics Profiles, Referencing Competencies and Individual Performance in the Digital Environments. Int. J. Emerg. Technol. Learn. 2022, 17, 125–136. [Google Scholar] [CrossRef]
  43. Rosman, M.R.M.; Ismail, M.N.; Masrek, M.N. Development and validation of a tool for measuring digital library engagement. Int. J. Electr. Comput. Eng. (IJECE) 2022, 12, 4146–4154. [Google Scholar] [CrossRef]
  44. Danner-Schröder, A.; Ostermann, S.M. Towards a Processual Understanding of Task Complexity: Constructing task complexity in practice. Organ. Stud. 2022, 43, 437–463. [Google Scholar] [CrossRef]
  45. Disterer, G.; Kleiner, C. BYOD bring your own device. Procedia Technol. 2013, 9, 43–53. [Google Scholar] [CrossRef] [Green Version]
  46. Vejayon, J.; Samy, G.N.; Maarop, N.; Megat, N.; Shanmugam, B.; Magalingam, P. Adopting Factors of Bring Your Own Device (BYOD) at the Selected Private Higher Learning Institution in Malaysia. J. Adv. Res. Soc. Behav. Sci. 2016, 2, 24–32. [Google Scholar]
  47. Astani, M.; Ready, K.; Tessema, M. BYOD Issues and strategies in organizations. Issues Inf. Syst. 2013, 14, 195–201. [Google Scholar]
Figure 1. Conceptual Framework.
Figure 1. Conceptual Framework.
Proceedings 82 00010 g001
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Rosman, M.R.M.; Baharuddin, N.S.; Alimin, N.A.; Rosli, N.N.I.N.; Shukry, A.I.M.; Razlan, N.M. Bring-Your-Own-Device (BYOD) and Productivity: A Conceptual Framework. Proceedings 2022, 82, 10. https://doi.org/10.3390/proceedings2022082010

AMA Style

Rosman MRM, Baharuddin NS, Alimin NA, Rosli NNIN, Shukry AIM, Razlan NM. Bring-Your-Own-Device (BYOD) and Productivity: A Conceptual Framework. Proceedings. 2022; 82(1):10. https://doi.org/10.3390/proceedings2022082010

Chicago/Turabian Style

Rosman, Mohamad Rahimi Mohamad, Nurfatihah S Baharuddin, Noor Azreen Alimin, Nik Nur Izzati Nik Rosli, Amira Idayu Mohd Shukry, and Noor Masliana Razlan. 2022. "Bring-Your-Own-Device (BYOD) and Productivity: A Conceptual Framework" Proceedings 82, no. 1: 10. https://doi.org/10.3390/proceedings2022082010

Article Metrics

Back to TopTop