Identifying and Prioritizing Factors Affecting the Adoption of BYOD in Organization Using a Fuzzy Approach

Document Type: Research Paper

Authors

Persian Gulf University

Abstract

In the wake of rapid growth in information technology, modern organizations seeking to increase the access and exchange data with minimal costs. BYOD is an emergent policy under which employees are allowed to use their personal devices such as smart phones, tablets and laptops to perform tasks. In this study, a model to prioritize the factors influencing the organizational adoption of BYOD is proposed. The model has two main criteria, each of which has ten subcriteria. Using ICT experts’ views and Improved Fuzzy Analytical Hierarchy Process technique, the model criteria were weighted. The two main factors, political factors identified as foremost important factor and behavioral intention to use IT were in the second priority. The model can be used as a basis for further research and successful implementation of BYOD by the organizations.

Keywords

Main Subjects


Akman, I. & Mishra, A. (2015). Sector diversity in Green Information Technology practices: Technology Acceptance Model perspective. Computers in Human Behavior, 49: 477-486.
Alirezaee, A., Jabarzadeh, Y., Haji Akhondi, E. & Rahmani Yshanluee, H. (2013). Teleworking Technology Adoption in Organizations: Explaining the Role of Social Influence, Motivation and Facilitating Conditions. Quarterly Journal of Information Technology Management, 5(3): 105-122. (in Persian)
Amoako-Gyampah, K. & Salam, A.F. (2004). An extension of the technology acceptance model in an ERP implementation environment. Information & Management, 41(6): 731–745.
Anderson, N. (2013). Cisco Systems, Inc. (Cisco Bring Your Own Device) Retrieved 12/11/2013, from Cisco Systems, Inc website: http://www.cisco.com.
Asgharpour, M. J. (2009). Multi criteria decision making. Tehran, University of Tehran Press (UTP). (in Persian)
Astani, M., Ready, K. & Tessema, M. (2013). BYOD issues and strategies in organizations. Issues in Information Systems, 14(2): 195-201.
Azar, A. & Faraji, H. (2008). Fuzzy management science. Tehran: Ketabe mehraban nashr institution. (in Persian)
Barnes, S. (2013). Orb Data. Retrieved 1/2/2014, from Orb Data's Blog Site: http://www.blog.orb-data.com.
Berry, M. (2014). Sample BYOD policy template. Retrieved 1/2/ 2014, from http://www.itmanagerdaily.com/
Bradley, J., Luacks, J., Macaulay, J., Medcalf, R. & Buckalew, L. (2012). BYOD: A Global Perspective. Cisco IBSG.
Chen, J. K., & Chen, I. S. (2007). Fuzzy MCDM construct vision developmental indices of tech R&D institutions in Taiwan. Business Renaissance Quarterly, 2(3), 23.
Dedeche, A., Liu, F., Le, M. & Lajami, S. (2013). Emergent BYOD security challenges and mitigation strategy. working paper. University of Melbourne.
Dell Inc. (2012). Mobile and BYOD Solutions for Enterprise Mobility. Retrieved 1/2/2014, from www.Dell.com.
FUJITSU Technology Solutions GmbH. (2013). BYOD Whitepaper. Retrieved 2013, from www.fujitsu.com/fts.
Gagnon, M..P., Ghandour, E., Talla, P.K., Simonyan, D., Godin, G., Labrecque, M., Rousseau, M. (2013). Electronic health record acceptance by physicians: Testing an integrated theoretical model. Journal of Biomedical Informatics, 48: 17-27.
Hashemian, M., Isaai, M.T., Mikaili, F. & Tabatabaee, M. (2012). Effective Factors in Adoption of Electronic Banking by Customers (Saman Bank). Quartely Journal of Information Technology Management, 4(11): 155-174.
(in Persian)
Hensema, M. (2013). Acceptance of BYOD among Employees at Small to Medium-sized Organizations. 19th Twente Student Conference on IT, Enschede, The Netherlands.
Hu, A.H., Hsu, C.W., Kuo, T.C. & Wu, W.C. (2009). Risk evaluation of green components to hazardous substance using FMEA and FAHP. Expert Systems with Applications, 36(3): 7142-7147.
Ibrahim, H. (2013). 24th DAAAM International Symposium on Intelligent Manufacturing and Automation. Proceedings of a meeting held 23-26 October 2013, Zadar, Croatia.
IDG Enterprise (2014). Consumerization of IT in the Enterprise. IDG Enterprise: an IDG communications company.
Intel Corporation. (2012). BYOD Blueprint, Retrieved 2013, from www.k12blue print.com.
Legris, P., Ingham, J. & Collerette, P. (2003). Why do people use information technology?A critical review of the technology acceptance model. Information & Management, 40(3): 191–204.
Momeni, M. (2010). New Topics In Operations Research. Tehran: M. momeni.
(in Persian)
Sánchez-Prieto, J., Olmos-Migueláñez, S. & García-Peña, F. (2015). Informal tools in formal contexts: Development of a model to assess the acceptance of mobile technologies among teachers. Computers in Human Behavior, 55(Part A):519-528.
Santhosh Reddy, A. (2012). ‎Perspectives:Making BYOD Work for Your Organization. Retrieved 12 6, 2013, from Cognizant corporation website: www.cognizant.com.
Schulze, H. (2014). BYOD and mobile security. information security community on LinkedIn.
Shams Aliee, F. S., Davoodi, M. R. &  Badi, K. (2010). An Approach towards Enterprise Architecture Quality Attribute Assessment based on Fuzzy AHP. Quarterly Journal of Information technology management, 2(4): 78-98.
(in Persian)
Shoaee, F.S. & Olumi, T. (2007). Investigating the affecting factors in information technology acceptance of librarians in technical faculties of Tehran’s public universities. Journal of Library and Information, 10(3): 9-34. (in Persian)
Son, H., Park, Y., Kim, C. & Chou, J.S. (2012). Toward an understanding of construction professionals' acceptance of mobile computing devices in South Korea: An extension of the technology acceptance model. Automation in Construction, 28: 82-90.
Tajfar, A.H., Mimand, M.M., R. Soltani, F. & R. Soltani, P. (2014). Ranking the barriers of implementing Information Security Management System and Investigation of readiness rate of exploration management. Quarterly Journal of Information technology management. 6(4): 551-556. (in Persian)
Un Jan, A. & Contreras, V. (2011). Technology acceptance model for the use of information technology in universities. Computers in Human Behavior, 27(2): 845–851.
Vignesh, U. & Asha, S. (2015). Modifying security policies towards BYOD. 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15) Procedia computer science. pp. 511 – 516.
VM ware (2013). The BYOD Opportunity. Retrieved 12/6/2013, from VMware, Inc web site: www.vmware.com.
Zanjirchi, S. M. (2011). Fuzzy Analatycal Hierarchy Process. Tehran: Sane’ee Press. (in Persian)