{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T15:08:07Z","timestamp":1770736087733,"version":"3.49.0"},"reference-count":64,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1080\/08874417.2015.11645795","type":"journal-article","created":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T09:56:23Z","timestamp":1460368583000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":48,"title":["It Consumerization: Byod-Program Acceptance and its Impact on Employer Attractiveness"],"prefix":"10.1080","volume":"56","author":[{"given":"Andy","family":"Weeger","sequence":"first","affiliation":[]},{"given":"Xuequn","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Gewald","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2004.005163"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.03.003"},{"issue":"2","key":"CIT0003","first-page":"285","volume":"2","author":"Barclay D.","year":"1995","journal-title":"Technology studies"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.8"},{"key":"CIT0005","first-page":"23","volume-title":"Risk Taking and Information Handling in Consumer Behavior","author":"Bauer R.A.","year":"1967"},{"key":"CIT0006","volume-title":"Proceedings of the Nineteenth Americas Conference on Information Systems","author":"Beimborn D.","year":"2013"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000717"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-00139-1"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/00036810600603377"},{"key":"CIT0010","volume-title":"Federal Office for Information Security","author":"BSI","year":"2013"},{"key":"CIT0011","volume-title":"Proceedings of the 39th Hawaii International Conference on System Sciences","author":"Carlsson C","year":"2006"},{"key":"CIT0012","first-page":"29","volume-title":"Proceedings of the Southern Association for Information Systems Conference","author":"Carter M.","year":"2011"},{"issue":"11","key":"CIT0013","doi-asserted-by":"crossref","first-page":"472","DOI":"10.17705\/1jais.00059","volume":"5","author":"Cenfetelli R.","year":"2004","journal-title":"Journal of the Association for Information Systems"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2007.04.004"},{"key":"CIT0015","first-page":"vii","volume-title":"MIS Quarterly","author":"Chin W.W.","year":"1998"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32827-8_29"},{"key":"CIT0017","volume-title":"Modern Methods for Business Research","author":"Chin W.W.","year":"1998"},{"key":"CIT0018","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J.","year":"1988"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.2307\/249749"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.118"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"CIT0022","volume-title":"Proceedings of the Nineteenth Americas Conference on Information Systems","author":"Dernbecher S.","year":"2013"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2008.31"},{"key":"CIT0024","volume-title":"Proceedings of the Seventh Americas Conference on Information Systems","author":"Featherman M.","year":"2001"},{"key":"CIT0025","volume-title":"\u201cHype Cycle for Emerging Technologies,\u201d","author":"Fenn J.","year":"2011"},{"key":"CIT0026","volume-title":"Belief, attitude, intention, and behavior: an introduction to theory and research","author":"Fishbein M.","year":"1975"},{"issue":"1","key":"CIT0027","doi-asserted-by":"crossref","first-page":"159","DOI":"10.3233\/IKS-2008-00122","volume":"7","author":"Friedman J.","year":"2008","journal-title":"Information-Knowledge-Systems Management"},{"issue":"4","key":"CIT0028","first-page":"62","volume":"4","author":"Gajar PK.","year":"2013","journal-title":"Journal of Global Research in Computer Science"},{"issue":"2","key":"CIT0029","doi-asserted-by":"crossref","first-page":"iii","DOI":"10.2307\/23044042","volume":"35","author":"Gefen D.","year":"2011","journal-title":"MIS Quarterly"},{"key":"CIT0030","volume-title":"Communications of the Association for Information Systems","author":"Gefen D.","year":"16"},{"issue":"5","key":"CIT0031","first-page":"91","volume":"16","author":"Gefen D.","year":"2000","journal-title":"Communications of the Association for Information Systems"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1975.10479865"},{"key":"CIT0033","volume-title":"Proceedings of the 20th European Conference on Information Systems","author":"Gy\u00f6ry A.","year":"2012"},{"key":"CIT0034","volume-title":"\u201cMobile Consumerization Trends & Perceptions - IT Executive and CEO Survey,\u201d","author":"Harris C.","year":"2012"},{"issue":"3","key":"CIT0035","first-page":"99","volume":"11","author":"Harris J.","year":"2013","journal-title":"MIS Quarterly Executive"},{"key":"CIT0036","volume-title":"\u201cThe Genie Is Out of the Bottle: Managing the Infiltration of Consumer IT Into the Workforce,\u201d","author":"Harris J.G.","year":"2011"},{"key":"CIT0037","volume-title":"Proceedings of the Nineteenth Americas Conference on Information Systems","author":"Harris M.A.","year":"2013"},{"key":"CIT0038","volume-title":"LT Manager's Handbook: Getting Your New Job Done","author":"Holtsnider B.","year":"2012"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2004.10.004"},{"key":"CIT0041","volume-title":"Proceedings of the Seventeenth Americas Conference on Information Systems","author":"Ingalsbe J.A.","year":"2011"},{"key":"CIT0042","volume-title":"Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle","author":"Johnson N.","year":"2012"},{"key":"CIT0043","volume-title":"CIO-Handbuch","author":"Lang M.","year":"2012"},{"key":"CIT0044","volume-title":"Proceedings of the Nineteenth Americas Conference on Information Systems","author":"Lebek B.","year":"2013"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.1.114"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-52512-4"},{"key":"CIT0047","volume-title":"Proceedings of the 18th Americas Conference on Information Systems","author":"Loose M.","year":"2013"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-006-0126-z"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.192"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.433"},{"key":"CIT0051","volume-title":"\u201cCan Enterprise IT Survive the Meteor of Consumer Technology?,\u201d","author":"Murdoch R.","year":"2010"},{"key":"CIT0052","volume-title":"Proceedings of the International Conference on Wirtschaftsinformatik","author":"Niehaves B.","year":"2013"},{"key":"CIT0053","volume-title":"Proceedings of the Eighteenth Americas Conference on Information Systems, Seatle","author":"Niehaves B.","year":"2012"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1108\/10748120110424816"},{"issue":"1","key":"CIT0056","doi-asserted-by":"crossref","first-page":"iii","DOI":"10.2307\/41410402","volume":"36","author":"Ringle CM.","year":"2012","journal-title":"MIS Quarterly"},{"key":"CIT0057","volume-title":"\u201cSmartPLS 2.0 (M3) Beta,\u201d","author":"Ringle CM.","year":"2005"},{"issue":"36","key":"CIT0058","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.2517-6161.1974.tb00994.x","author":"Stone M.","year":"1974","journal-title":"Journal of the Royal Statistical Society. Series B (Methodological)"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.3102\/0034654308325896"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1016\/j.jwb.2009.09.019"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.2307\/249443"},{"issue":"3","key":"CIT0062","doi-asserted-by":"crossref","DOI":"10.2307\/30036540","volume":"27","author":"Venkatesh V.","year":"2003","journal-title":"Management Information Systems Quarterly"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-9768-8"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-012-0234-4"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T11:52:09Z","timestamp":1748865129000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2015.11645795"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":64,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,12,7]]},"published-print":{"date-parts":[[2016,1]]}},"alternative-id":["10.1080\/08874417.2015.11645795"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2015.11645795","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}