Research and Advances
Computing Applications Contributed articles

Millennials’ Attitudes Toward It Consumerization in the Workplace

Millennials entering the workforce ignore the risks of using privately owned devices on the job.
Posted
  1. Introduction
  2. Key Insights
  3. Research Background
  4. Research Model
  5. Methodology
  6. Discussion
  7. Conclusion
  8. References
  9. Authors
millennial with smartphone

People born after 1980, often called “millennials” by demographic researchers, behave differently from older generations in significant ways. They are the first “digital natives,” the “always on generation” that expects to have information instantly and always available at its fingertips. Their attitudes have been described by previous research in often unfavorable terms. And when they enter the workplace, they pose a major challenge to managers from older generations, who, it has been shown, typically follow a different set of values.

Back to Top

Key Insights

  • Members of Generation Y (so-called millennials) see the use of their privately owned devices for work as a necessity, not an option.
  • Millennials focus on their personal benefit,generally ignoring the risks they may introduce into corporate networks when their own devices and accounting for risk only if it threatens than directly.
  • When it comes to weighing risks against benefits, such behavior is seen across developed economies, with no significant cultural influence across an international sample.

Our research investigates the attitudes of millennials who have not yet entered the workforce toward the use of information technology (IT) in terms of “IT consumerization.” Specifically, we want to know how this significant part of the population weighs benefits against risks when it comes to intention to use technology in a business environment.

In 2013, we conducted an international study involving 402 students in their final year of undergraduate study just before entering the workplace. We received feedback from students at Neu-Ulm University of Applied Sciences (Germany), Dongbei University of Finance & Economics (China), Texas Woman’s University (U.S.), Carleton University (Canada), Fundação Getulio Vargas (Brazil), and RMIT University (Australia). We found they share a common set of values regardless of nationality, including motivational drivers that would alarm corporate IT managers, if known. The individuals in our sample value their own benefit highly and dramatically neglect the risks their actions might pose.

The way we work, think, and behave is heavily influenced by the Internet, email, smartphones, and other technological innovations that have proliferated over the past 20 to 30 years. The generation of people born after 1980 is the first to grow up with information everywhere, anytime24 and referred to as digital natives, or, more commonly, millennials.15

Many studies have sought to analyze them.20 For example, in their 2010 literature review, Ng et al.24 characterized them as “want it all” and “want it now.” It seems generally accepted in research and practice alike that millennials are difficult to cope with when entering the workplace from the perspective of managers born perhaps decades earlier.32 However, given the need for talent in today’s technology-driven society, especially in computer science, management needs to adapt and offer millennials working conditions that attract them.37

Previous research focused mainly on millennials’ attitudes toward work.3 Their attitude toward using technology for work purposes has not yet, however, received sufficient academic attention.35 There is a striking paucity of research looking at how millennials use technology for professional and personal purposes.35 To partially close this gap, we conducted our study on the motivational factors that shape millennials’ intention to use technology in the context of IT consumerization. Here come the cherry pickers.

Back to Top

Research Background

Here, we introduce the concept of IT consumerization, then discuss how national culture was relevant in our study:

IT consumerization. IT consumerization describes the ongoing process of blending private and business life when it comes to the use of technology, as driven by employees who push IT solutions they use privately into the workplace.38 This applies to hardware (as in “bring your own device,” or BYOD) where privately owned laptops, tablets, and smartphones are used for business tasks but also to software when online email services or cloud-storage solutions are used for business purposes.31 “Ownership” of the device or service is usually regarded as a key characteristic of IT consumerization,14,25 as possession shifts from employer to user/employee.

We expect IT consumerization to have a positive influence on employees’ work performance by increasing satisfaction, flexibility, and mobility.14 It is also demanded by more and more employees who want to use their own smartphone to, say, access corporate email messages.36 However, using privately owned devices at work involves risks like blurred boundaries between professional and private lives,5,13,25 creating additional stress for the employee (such as when responding to email messages on weekends when technically not at work). Not only users, but their employers as well, face notable challenges from this trend. Anecdotal evidence indicates corporate IT departments are under pressure to give in to user demands to be allowed to use privately owned IT for work purposes. However, granting myriad different consumer devices access to the corporate network is a nightmare for anyone concerned about IT security.

Consumerization of IT seems to be a key characteristic of millennials, as their desire to be always on is not limited only to the workplace. In the same vein, they are accustomed to always using state-of-the-art technology, something not every work environment is able to provide, especially because the definition of “state of the art” is subjective.

Our study focused on mobile devices as an exemplary technology to explain millennials’ behavioral intentions when it comes to the use of technology. This area is of great concern to practitioners, including CIOs and senior IT managers.31

To understand the role of such contradictory factors in individual decision making, social psychology provides net-valence models (NVMs) that assume individuals intend to perform an action only if the perceived benefits outweigh the associated costs.7,26 Prior research found NVMs help explain the adoption of technology-related services.17 Other prominent theories on technology adoption (such as Unified Theory of Acceptance and Use of Technology33) do not capture the risks associated with technology use and is why we chose NVMs as our theoretical lens (see Figure 1).

f1.jpg
Figure 1. Research model.

Cultural values and IT use behavior. Millennials’ use of corporate IT involves multiple challenges for IT executives worldwide. However, the literature suggests behavioral models do not apply universally across all cultures.30 Research by Srite and Karahanna30 showed the significance of factors determining technology use are notably dependent on espoused cultural values, particularly those reflecting national culture. National culture refers to “the collective programming of the mind that distinguishes the members of one group or category of people from another.”11 Hofstede and Bond10 proposed five dimensions of national culture: power distance; individualism/collectivism; masculinity/femininity; uncertainty avoidance; and long-term orientation. Other research found that national cultural values strongly affect an individual’s IT-adoption behavior.12,32

In order to understand how millennials perceive benefits and risks associated with IT consumerization across different cultures, we identified uncertainty avoidance (UA) and individualism/collectivism (IC) as the most relevant dimensions. Power distance, masculinity/femininity, and long-term orientation are important in the more general context of technology adoption but less relevant in understanding the effect of perceived risks and benefits in the context of our study.

“Uncertainty avoidance” refers to “the extent to which individuals feel vulnerable to unpredictable and unknown situations.”9 People with strong UA values fear uncertainty. In the context of work-related technology, they need the predictability often provided by rules, policies, and structure in organizations that IT consumerization contradicts or dilutes. UA can thus help understand how millennials perceive the risks associated with IT consumerization.

“Individualism/collectivism” is one of the most widely studied cultural values in cross-cultural research,30 referring to “an individual’s preference for a social framework where individuals take care of themselves (individualism), as opposed to how they expect the group to take care of them in exchange for their loyalty (collectivism).”9 Individuals with individualistic values have a more complex and more frequently sampled private self. Consequently, their own goals, beliefs, and values are more salient. Considering technology use at work, they are more concerned with the benefits they might achieve than the disadvantages that could arise for others. IC is thus useful in understanding how millennials perceive benefits associated with IT consumerization, especially when there could be conflict between themselves and their employers.

Back to Top

Research Model

Based on NVMs, it is assumed an individual’s behavioral intention to use privately owned devices on the job is determined by the outcome of weighing perceived benefits vs. perceived risks/associated costs, as in Figure 1.

Perceived benefits. Perceived benefits “include all benefits which the customer perceives as having been received.”18 In the context of IT use, they reflect the overall positive utility individuals expect when using a particular technology.12 Prior research demonstrated that perceived benefits significantly affect behavioral intention regarding the use of IT.16,19

We define perceived benefits as individuals’ assessment of the functional benefits they associate with using a privately owned device for work purposes. Building on the premises of technology acceptance and use models,22,29,33 we propose that the benefits of using a privately owned device for work purposes are related to the characteristics of the technology and the functional advances it provides.29 We thus assume perceived benefits as a multidimensional construct comprising three facets of employment behavior: performance expectancy; effort expectancy; and compatibility.

Employees may realize productivity gains when allowed to select devices on their own.14 Consequently, performance expectancy reflects the extent individuals perceive that using privately owned devices supports their ability to perform better at work.33 Moreover, devices selected by individual employees are usually perceived as easier to use and more intuitive than those provided by an IT department.25 We thus define effort expectancy as the degree of ease an individual associates with using a privately owned device as compared to using a device provided by an IT department. Overall benefit perceptions are also formed by an individual’s work style and associated needs and values. To capture these influential factors, Moore and Benbasat22 proposed the construct “compatibility” as the degree to which using a privately owned device for work purposes fits the individual’s work style. Employees who agree to be available for work responsibilities (such as to respond to email messages) after work hours are more likely to see the use of their devices for business purposes as beneficial.

Following these insights, we hypothesize that perceived benefits influence individuals’ consumerization behavior:

Hypothesis 1. The greater the perceived benefits of using privately owned devices for work purposes, the greater an individual’s intention to participate in a BYOD program.

“Perceived risk” reflects negative utility from a subjective perspective, a concept introduced by Bauer2 as part of his “Perceived Risk Theory,” which assumes subjective risk perceptions directly influence an individual’s intention to perform a certain action.4 Perceived risk is defined by Cunningham4 as “the amount that would be lost, or that which is at stake, if the consequences of an act were not favorable, and the individual’s subjective feeling of certainty that the consequences will be unfavorable.” Featherman and Pavlou6 and Hoehle et al.9 found perceived risk plays a significant role in individuals’ IT-use behavior.

To reflect the perceived cost associated with using privately owned devices, we define perceived risk as the belief of individuals about the potential negative outcomes caused by using privately owned devices on the job. The negative consequences of such behaviors can be classified into multiple types of loss, indicating that, as with perceived benefit, perceived risk is a multidimensional construct.6,16 Based on the arguments discussed earlier regarding consumerization and its effects on corporate IT, we hypothesize that using privately owned devices for business purposes encompasses three facets of risk: performance; privacy; and security.

Using privately owned devices for work purposes generally shifts responsibility from the IT department to the individual. For instance, the individual is, at least psychologically, accountable for “how well the [device] will perform relative to expectations.”1 The risk associated with using one’s own devices on the job includes the potential that the device the individual is responsible for is not sufficient for its intended business purpose. Performance risk thus reflects the potential for not being able to perform business activities as expected.


Granting myriad different consumer devices access to the corporate network is a nightmare for anyone concerned about IT security.


Using a device for both private and business purposes entails the risk that personal information is disclosed to the employer without the employee’s consent and knowledge.21 Privacy risk, as defined by Featherman and Pavlou6 as the “potential loss of control over personal information,”6 encompasses this facet of risky behavior. Business data, as well as personal data, is at risk. The potential for corporate data to be exposed to unauthorized third parties also increases when individuals use their private devices for work purposes.25 Information security is one of the most important topics related to IT consumerization, as 90% of all corporate data breaches fall into four patterns:34 lost and stolen devices, user-initiated crimeware, insider misuse, and miscellaneous human errors. To capture this facet of risky behavior, we assume security risk, or potential loss due to fraud or a hacker compromising corporate information security,16 contributes to overall perceived risk.

We thus hypothesize that perceived risk negatively affects individuals’ decisions regarding use of privately owned devices at work:

Hypothesis 2. The greater the perceived risk of using privately owned devices for work purposes, the lower an individual’s intention to participate in a BYOD program.

We also assume the perceived risk associated with IT consumerization influences behavioral intention indirectly by negatively affecting perceived benefits. For instance, as a measure of safeguarding IT security, firms usually adopt policies that allow them to erase data when an employee’s device is lost or stolen. Such “loss of full ownership” significantly affects the perceived benefits of BYOD.28 We thus propose:

Hypothesis 3. The perceived risk of using privately owned devices for work purposes negatively affects an individual’s perception of benefit.

Cultural values. Research provides evidence that millennials’ cultural values influence their technology-use behavior.30 However, it remains to be demonstrated whether the proposed NVM holds across the general population of millennials who reflect a variety of cultural values.30 We propose that the explanatory power of the theoretical model depends on how distinctively millennials espouse characteristic cultural values.

Based on these arguments, we expect to see distinctions in individualistic values and perceptions toward uncertainty. Using their own devices for work purposes enables millennials to express their sense of self and better achieve their own goals and follow their own beliefs and values. Also, using a privately owned device can indicate that individuals are more strongly concerned with their own needs than with those of the collective, including their employers. We thus expect individuals who espouse individualistic cultural values to more strongly value the benefits of using privately owned devices. Likewise, we assume individuals who experience less difficulty dealing with uncertainty to put less emphasis on the potential risks of using privately owned devices for work purposes and hence to be more likely to use their own devices at work. We also expect perceived risk to be less important for millennials who espouse lower uncertainty-avoidance cultural values.

We thus propose that there are distinctive subcultures within the overall group of millennials that are determined by differences regarding their UA and IC values. We hypothesize that the subcultures will take different approaches toward risk/benefit-assessment of their intention to participate in a BYOD program:

Hypothesis 4. The effect of the perceived risks of using privately owned devices for work purposes differs among millennials with lower UA scores and millennials with higher UA scores. The effect of perceived benefits of using privately owned devices for work purposes also differs among millennials with higher IC scores and millennials with lower IC scores.

Back to Top

Methodology

Here, we discuss our data collection, sample clustering, data analysis, and results:

Data collection. To test our research model, we developed a questionnaire with a set of measurement items for each construct, and to safeguard measurement validity, we adapted items from prior research, as outlined in the online appendix (dl.acm.org/citation.cfm?doid=3132745&picked=formats).

We distributed the questionnaire among students in their final year of undergraduate studies and with relevant work experience (most respondents worked full time for at least six months during their studies) using an online survey tool. Our approach is consistent with Vodanovich et al.35 who suggested conducting surveys with students to understand how millennials (“digital natives” in their terminology) use technology. We collected data from students with “technology-affine” majors—”information systems,” “industrial engineering,” and “business administration”—in a number of universities worldwide. We chose countries with different values of UA and IC, according to Hofstede.11 After stripping out incomplete questionnaires, we received a total of 402 valid responses.

Clustering for espoused cultural values. We conducted exploratory factor analysis, a statistical method used to uncover the underlying structure in a large set of variables, to test the “unidimensionality” of the measurement items for IC and UA. It revealed three items measuring IC and two items measuring UA load with a high coefficient on the factors they are intended to measure (loadings > 0.79). Using the factor scores of these items, we then conducted a K-means clustering. Cluster analysis revealed two clusters (see Table 1) where the first cluster (referred to as A) encompassed respondents with high IC scores (cluster center 0.13) and low UA scores (cluster center –0.61), and the second cluster (referred to as B) encompassed respondents with rather low IC scores (cluster center –0.20) and rather high UA scores (cluster center 0.93).

t1.jpg
Table 1. Dataset demographics.

We characterized the respondents in group A as more individualistic and less risk-averse than in group B. Although both groups encompass only millennials, they showed different characteristics when it comes to the formation of behavioral intention. One could argue A is the more forthcoming, self-centered, and aggressive, while B represents the more group-oriented and considerate.

Measurement model assessment. We tested our model with partial least squares using SmartPLS 3.0 with 1,000 samples bootstrapping, assessing the measurement model with the complete dataset C, as well as with clusters A and B.

We measured behavioral intention reflectively (loadings of the indicators were above 0.95 and significant at the .001 level) and confirmed internal consistency by assessing Cronbach’s Alpha (CA) and Composite Reliability (CR) measures. Both exceeded the threshold of 0.90 for all datasets: A CA=0.90, CR=0.95; B CA=0.92, CR=0.96; C CA=0.91; and CR=0.96. The average variance extracted was greater than 0.50 (A 0.91; B 0.93; and C 0.92), demonstrating sufficient convergent validity. Finally, we used cross-loading analysis to confirm that all constructs load highest with their respective items.

The formative measures of “perceived benefits” were significant, at least at the .05 level, and path coefficients were greater than .1, suggesting the chosen characteristics of each category were relevant for the formation of the construct (see Table 2). Moreover, the variance inflation factor (VIF) was less than 2, supporting our assumption for indicator validity.

t2.jpg
Table 2. Formative constructs measurements.

The formative measures of “perceived risks” revealed mixed results regarding the risk facets’ contribution to the formation of the formative index. We found privacy risk was not relevant regardless of dataset used; performance risk was significant only in subset B and the complete dataset; and security risk contributed significantly only to the formative index of the complete dataset. Although not all facets of risky behavior contributed significantly, VIF was less than 2 within all three datasets, confirming indicator validity. Consequently, low redundancy of indicators’ information was confirmed.

The results show performance risk contributed significantly to overall risk perception in dataset B and C, while security risk contributed to overall risk perception in only the complete dataset C. Privacy risk did not significantly contribute to perceived risk, regardless of dataset. And performance expectancy, effort expectancy, and compatibility contributed significantly to perceived benefits in all datasets.

Structural model assessment. The results (see Figure 2) demonstrate the millennials responding to the survey primarily consider the benefits and neglect the risks of using technology; in our research context, which involves taking part in a corporate BYOD program.

f2.jpg
Figure 2. Structural model assessment.

Detailed analysis confirmed the existence of two distinct groups of millennials differentiated by their espoused cultural values in our sample. We named them due to their strong characteristics the “narcissists” (group A) and the “prudent” (group B). Both groups showed intentions expected by millennials: take the benefits and ignore the risks. However, the groups also showed different approaches to acting on their risk-and-benefit perceptions, depending on their respective IC/UA scores.

For millennials with high IC scores and low UA scores—narcissists—risk perceptions have no effect, while benefits are weighted comparatively high when it comes to technology-adoption decisions. Additionally, perceived risks do not significantly affect perceived benefits. For the group with low IC scores and high UA scores (prudent) risk and benefit perceptions are—relative to the narcissists—more important for the intention to participate in a BYOD program. For these millennials, we found perceived risk was significantly related to perceived benefits (medium effect, Cohen’s d=.163), indicating they are more aware of risk and react more cautiously.

Overall, the results show our research model is capable of explaining a good portion of the variance in millennials’ behavioral intention to participate in a BYOD program (R2=.37). The explanatory power of the model is slightly stronger (R2=.42) for individuals categorized as the prudent.

Finally, removing perceived benefits from the model leads to a significantly stronger path between perceived risk and behavioral intention for the prudent (β=−244**) and for the combined dataset (β=−166**). This result indicates the effect of perceived risk on behavioral intention is most likely mediated by perceived benefits.

Back to Top

Discussion

These results confirm our expectations but also point to unanticipated conclusions. Millennials are egocentric, especially when it comes to their expectations regarding the workplace.24,27 The respondents in our survey expect great benefit from using their own devices, but the related risks are not reflected in their behavioral decision patterns unless they are personally affected. In our sample, we also found that only those millennials who are more strongly oriented toward the collective and somehow feel vulnerable in unpredictable situations (prudent) are influenced to at least some degree by risk perceptions regarding the performance of their privately owned devices. These findings confirm what research expects23,24,27 and anecdotal evidence underlines.

What we did not expect was the cross-cultural homogeneity of the sample. Millennials’ values seem uniform regardless of cultural background. Throughout our sample we did not find statistically significant differences in responses based on interviewee nationality. Investigating further, we used two distinct cultural values—IC and UA—to cluster the responses. We were able to distinguish between two groups—narcissist and prudent—that react as typical millennials but also differ in tendencies toward their intention to participate in BYOD programs. Forming their intention, the prudent (with lower IC and higher UA) seem slightly more risk-sensitive than the narcissists (with higher IC and lower UA). Contrary to our expectations, the two groups were well distributed among all participants in our sample; that is, we found no significant correlation with nationality or any other control factor to define the two clusters.

Even if the intention to use privately owned devices had formed differently depending on IC and UA scores, millennials remain millennials first and foremost. The proposed facets of risk do not significantly contribute to their risk perceptions, which, in turn, do not show considerable direct effect on behavior intention to participate in corporate BYOD programs. Our data implies that risk perceptions influence their decision making, which is mediated through perceived benefits. However, this effect applies only to group B.

That is, the results show that the espoused cultural values individualism and uncertainty avoidance only slightly influenced survey-responding millennials’ decision making regarding their IT consumerization behavior. Given these findings, our study contributes to theory and practice alike. First, it provides an NVM that accounts for the particularities of IT consumerization, demonstrating the risks/costs associated with the use of privately owned devices at work do not significantly affect decision making for most millennials. Further evidence is thus given that millennials are concerned mainly with their own benefit and happy to neglect the risks that do not jeopardize them directly. Privacy risk seems to be of no concern, as in Vodanovich35

Second, the study also enhances our knowledge of the role of millennials’ espoused cultural values, showing for the first time in the academic literature that the formation of technology-use decisions are apparently universal for millennials independent of cultural background.

For corporate IT managers, our findings are a warning: Millennials will quite likely use their private devices for work, not necessarily as part of an official program, then through shadow IT. To avoid this, structured offerings should be made available. IT security managers should thus consider the implications of millennials’ egocentric approach to risk. If users are not concerned about the risks their behavior poses to the company, then the company itself must be doubly cautious. To counter this potential threat, companies need to create robust BYOD programs that provide employees the benefits of using their own devices and simultaneously safeguard corporate data and networks.

Our findings embrace the typical limitations of empirical research: We had only a limited number of participants from a limited number of countries and who cannot be representative of the global millennial population. As such, our findings represent an indication but are not generalizable for all millennials. Additionally, our research subjects were students. Although all participants belonged to the millennial generation and had working experience, they were currently not all actually working. The part of the millennials population already in the active workforce was not included in our dataset. Even though we took care, it cannot be ruled out that the occasional participant lacked the required work experience. It is thus possible that some participants did not fully understand or misinterpreted the BYOD concept and its implication for their future working lives.

Back to Top

Conclusion

We conducted an international study to obtain information about how millennials about to enter the workforce weigh risks and benefits when it comes to using privately owned technology in the workplace. It included 402 students in their final year of study and with relevant work experience from six countries. The results indicate they pay a lot of attention to their own benefit and significantly neglect the risks associated with using privately owned technology on the job. We tested our hypothesis by asking them about their intention to use privately owned devices at work by enrolling in a corporate BYOD program. The responses showed they expect to use their private devices for work purposes. They perceive major benefits from using their own devices but pay little attention to the risk such use may impose on their employers. These findings have important implications for corporate IT managers who must deal with this new workforce (of cherry pickers).

However, a new generation—born after 1998, or “Gen-Z”—will itself soon enter the workforce23 and expected to behave differently—more concerned with risk and less on their own personal benefit.27 This change in employees’ mindset will provide fruitful ground for further research. Further research should also look toward longitudinal datasets, as it would be interesting to find out how perceptions change before entering the workplace and then again after several months and years. Maybe IT managers could see cherry pickers evolve into socially minded corporate citizens over time.

Back to Top

Back to Top

    1. Aldás-Manzano, J., Lassala-Navarre, C., Ruiz-Mafe, C., and Sanz-Blas, S. The role of consumer innovativeness and perceived risk in online banking usage. International Journal of Bank Marketing 27, 1 (2009), 53–75.

    2. Bauer, R.A. Consumer behavior as risk taking. In Risk Taking and Information Handling in Consumer Behavior, D.F. Cox, Ed. Harvard University Press, Cambridge, MA, 1967, 23–33.

    3. Breitsohl, H. and Ruhle, S. Differences in work-related attitudes between Millennials and Generation X: Evidence from Germany. In Managing the New Workforce: International Perspective on the Millennial Generation, E.S.W. Ng, S. Lyons, and L. Schweitzer, Eds. Edward Elgar, Cheltenham, U.K., 2014, 107–129.

    4. Cunningham, S.M. The major dimensions of perceived risk. In Risk Taking and Information Handling in Consumer Behavior, D.F. Cox, Ed. Harvard University Press, Cambridge, MA, 1967, 21–33.

    5. Derks, D., Duin, D., Tims, M., and Bakker, A.B. Smartphone use and work-home interference: The moderating role of social norms and employee work engagement. Journal of Occupational and Organizational Psychology 88, 1 (Mar. 2015), 155–177.

    6. Featherman, M.S. and Pavlou, P.A. Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies 59, 4 (2003), 451–474.

    7. Fishbein, M., Ed. Readings in Attitude Theory and Measurement. John Wiley & Sons, Inc., New York, 1967.

    8. Gewald, H. and Franke, J. The risks of business process outsourcing: A two-fold assessment in the German banking industry. International Journal of Electronic Finance 1, 4 (2007), 420–441.

    9. Hoehle, H., Zhang, X., and Venkatesh, V. An espoused cultural perspective to understand continued intention to use mobile applications: A four-country study of mobile social media application usability. European Journal of Information Systems 24, 3 (2015), 337–359.

    10. Hofstede, G. and Bond, M.H. The Confucius connection: From cultural roots to economic growth. Organizational Dynamics 16, 4 (Spring 1933), 5–21.

    11. Hofstede, G., Hofstede, G.J., and Minkov, M. Cultures and Organizations: Software of the Mind. McGraw Hill, New York, 2010.

    12. Kim, D. and Olfman, L. Determinants of corporate Web services adoption: A survey of companies in Korea. Communications of the AIS 29, 1 (2011), 1–24.

    13. Köffer, S., Anlauf, L., Ortbach, K., and Niehaves, B. The intensified blurring of boundaries between work and private life through IT consumerization. In Proceedings of the European Conference on Information Systems (Münster, Germany, 2015).

    14. Köffer, S., Ortbach, K., Junglas, I., Niehaves, B., and Harris, J. Innovation through BYOD? Business & Information Systems Engineering 57, 6 (Dec. 2015), 1–13.

    15. Kraut, R. and Burke, M. Internet use and psychological well-being: Effects of activity and audience. Commun. ACM 58, 12 (Dec. 2015), 94–100.

    16. Lee, M.-C. Factors influencing the adoption of Internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications 8, 3 (May-June 2009), 130–141.

    17. Li, Y., Wang, X., Lin, X., and Hajli, M. Seeking and sharing health information on social media: A net-valence model and cross-cultural comparison. Technological Forecasting and Social Change (July 20, 2016); https://doi.org/10.10167/j.techfore.2016.07.021

    18. Liljander, V. and Strandvik, T. Estimating zones of tolerance in perceived service quality and perceived service value. International Journal of Service Industry Management 4, 2 (1993), 6–23.

    19. Liu, Y., Yang, Y., and Li, H. A unified risk-benefit analysis framework for investigating mobile payment adoption. In Proceedings of the 2012 International Conference on Mobile Business. AIS Electronic Library, Atlanta, GA, 2012; http://aisel.aisnet.org/icmb2012/20

    20. Lyons, S. and Kuron, L. Generational differences in the workplace: A review of the evidence and directions for future research. Journal of Organizational Behavior 35, S1 (Feb. 2014), 139–157.

    21. Miller, K.W., Voas, J., and Hurlburt, G.F. BYOD: Security and privacy considerations. IT Professional 14, 5 (Sept.-Oct. 2012), 53–55.

    22. Moore, G.C. and Benbasat, I. Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research 2, 3 (1991), 192–222.

    23. Nadler, J.T., Morr, R., and Naumann, S. Millennials, Media, and Research: Ageism and the Younger Worker. Palgrave Macmillan, London, U.K., 2017.

    24. Ng, E.S.W., Schweitzer, L., and Lyons, S.T. New generation, great expectations: A field study of the millennial generation. Journal of Business and Psychology 25, 2 (June 2010), 281–292.

    25. Niehaves, B., Köffer, S., and Ortbach, K. IT consumerization: A theory and practice review. In Proceedings of the 18th Americas Conference on Information Systems (Seattle, WA, Aug. 9–11). Association for Information Systems, Atlanta, GA, 2012.

    26. Peter, J.P. and Tarpey Sr., L.X. A comparative analysis of three consumer decisions strategies. Journal of Consumer Research 2, 1 (June 1975), 29–37.

    27. Pew Research. Teens, Social Media, and Privacy. Pew Research, Washington, D.C., 2013; http://www.pewinternet.org/files/2013/05/PIP_TeensSocialMediaandPrivacy_PDF.pdf

    28. Rapoza, J. The increasing costs of BYOD. Aberdeen Group Market Alert, Boston, MA, 2014.

    29. Rogers, E.M. Diffusion of Innovations. Free Press, New York, 1995.

    30. Srite, M. and Karahanna, E. The role of espoused national cultural values in technology acceptance. MIS Quarterly 30, 3 (Sept. 2006), 679–704.

    31. Steelman, Z.R., Lacity, M., and Sabherwal, R. Charting your organization's bring-your-own-device voyage. MIS Quarterly Executive 15, 2 (2016), 85–104.

    32. Twenge, J.M. The evidence for Generation Me and against Generation We. Emerging Adulthood 1, 1 (2013), 11–16.

    33. Venkatesh, V., Morris, M., Davis, G., and Davis, F. User acceptance of information technology: Toward a unified view. MIS Quarterly 27, 3 (Sept. 2003), 425–473.

    34. Verizon. Data Breach Investigations Report, 2015; https://iapp.org/media/pdf/resource_center/Verizon_data-breach-investigation-report-2015.pdf

    35. Vodanovich, S., Sundaram, D., and Myers, M. Digital natives and ubiquitous information systems. Information Systems Research 21, 4 (2010), 711–723.

    36. Weeger, A. and Gewald, H. Factors influencing future employees' decision making to participate in a BYOD program: Does risk matter? In Proceedings of the 22nd European Conference on Information Systems (Tel Aviv, Israel), 2014.

    37. Weeger, A., Wang, X., and Gewald, H. IT consumerization: BYOD-program acceptance and its impact on employer attractiveness. Journal of Computer Information Systems 56, 1 (Fall 2016), 1–10.

    38. Weiß, F. and Leimeister, J.M. Consumerization: IT innovations from the consumer market as a challenge for corporate IT. Business & Information Systems Engineering 54, 6 (Dec. 2012), 363–366.

Join the Discussion (0)

Become a Member or Sign In to Post a Comment

The Latest from CACM

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More