{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:11Z","timestamp":1750306571544,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T00:00:00Z","timestamp":1411948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,29]]},"DOI":"10.1145\/2664591.2664607","type":"proceedings-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T12:29:24Z","timestamp":1413289764000},"page":"126-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Employee perceptions of BYOD in South Africa"],"prefix":"10.1145","author":[{"given":"Hossana","family":"Twinomurinzi","sequence":"first","affiliation":[{"name":"University of South Africa, School of Computing, Roodepoort, South Africa, +27 11 670 9361"}]},{"given":"Tendani","family":"Mawela","sequence":"additional","affiliation":[{"name":"University of Pretoria, Department of Informatics, Pretoria, South Africa, +27 12 420 3372"}]}],"member":"320","published-online":{"date-parts":[[2014,9,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ackerman A. S. & Krupp M. L. (2012). Five Components to Consider for BYOT\/BYOD. International Association for Development of the Information Society.  Ackerman A. S. & Krupp M. L. (2012). Five Components to Consider for BYOT\/BYOD. International Association for Development of the Information Society."},{"volume-title":"International Journal of Emerging Trends & Technology in Computer Science, 3(1).","year":"2014","author":"Afreen R.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Ally M. (2013). Mobile learning: from research to practice to Impact Education. Learning and Teaching in Higher Education: Gulf Perspectives 10(2).  Ally M. (2013). Mobile learning: from research to practice to Impact Education. Learning and Teaching in Higher Education: Gulf Perspectives 10(2).","DOI":"10.18538\/lthe.v10.n2.140"},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"195","article-title":"BYOD issues and strategies in organizations","volume":"14","author":"Astani M.","year":"2013","journal-title":"Issues in Information Systems"},{"key":"e_1_3_2_1_5_1","unstructured":"Bhattacherjee A. (2012). Social Science Research: principles methods and practices.  Bhattacherjee A. (2012). Social Science Research: principles methods and practices."},{"key":"e_1_3_2_1_6_1","unstructured":"Blount S. (2012). The Consumerization of IT: Security challenges of the new world order: CA Technologies.  Blount S. (2012). The Consumerization of IT: Security challenges of the new world order: CA Technologies."},{"key":"e_1_3_2_1_7_1","unstructured":"D'Arcy P. (2011). CIO strategies for consumerization: The future of enterprise mobile computing: Dell CIO Insight Series.  D'Arcy P. (2011). CIO strategies for consumerization: The future of enterprise mobile computing: Dell CIO Insight Series."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.005"},{"key":"e_1_3_2_1_9_1","unstructured":"ENISA. (2012). Consumerization of IT: Top Risks and Opportunities. Retrieved from http:\/\/www.enisa.europa.eu\/activities\/risk-management\/evolving-threat-environment\/consumerization-of-it-top-risks-and-opportunities?searchterm=top+risks  ENISA. (2012). Consumerization of IT: Top Risks and Opportunities. Retrieved from http:\/\/www.enisa.europa.eu\/activities\/risk-management\/evolving-threat-environment\/consumerization-of-it-top-risks-and-opportunities?searchterm=top+risks"},{"key":"e_1_3_2_1_10_1","unstructured":"Garlati C. (2011). Trend Micro Consumerization. London: Gartner.  Garlati C. (2011). Trend Micro Consumerization. London: Gartner."},{"key":"e_1_3_2_1_11_1","unstructured":"Gruman G. (2012). Afraid of BYOD? Intel shows a better way. Retrieved from InfoWorld website: http:\/\/www.infoworld.com\/d\/consumerization-of-it\/afraid-of-byod-intel-shows-better-way-204123  Gruman G. (2012). Afraid of BYOD? Intel shows a better way. Retrieved from InfoWorld website: http:\/\/www.infoworld.com\/d\/consumerization-of-it\/afraid-of-byod-intel-shows-better-way-204123"},{"key":"e_1_3_2_1_12_1","unstructured":"Gruman G. (2013). Cisco shows how to manage 35 000 Macs. Retrieved from Infoworld website: http:\/\/www.infoworld.com\/d\/consumerization-of-it\/cisco-shows-how-manage-35000-macs-226305  Gruman G. (2013). Cisco shows how to manage 35 000 Macs. Retrieved from Infoworld website: http:\/\/www.infoworld.com\/d\/consumerization-of-it\/cisco-shows-how-manage-35000-macs-226305"},{"key":"e_1_3_2_1_13_1","unstructured":"Herring M. (2011). Consumerization - The shift from personal to personalised computing. Retrieved from http:\/\/www.economist.com\/node\/21530921  Herring M. (2011). Consumerization - The shift from personal to personalised computing. Retrieved from http:\/\/www.economist.com\/node\/21530921"},{"key":"e_1_3_2_1_14_1","unstructured":"ITU. (2014). ICT Facts and Figures 2013: Mobile-cellular subscriptions (Statistical). Retrieved 27 May 2014 from International Telecommunication Union  ITU. (2014). ICT Facts and Figures 2013: Mobile-cellular subscriptions (Statistical). Retrieved 27 May 2014 from International Telecommunication Union"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/953460.953485"},{"key":"e_1_3_2_1_16_1","unstructured":"Jones J. (2012). BYOD: Organizations Question Risk vs Benefit. Retrieved from http:\/\/blogs.technet.com\/b\/security\/archive\/2012\/08\/02\/byod-organizations-question-risk-vs-benefit.aspx  Jones J. (2012). BYOD: Organizations Question Risk vs Benefit. Retrieved from http:\/\/blogs.technet.com\/b\/security\/archive\/2012\/08\/02\/byod-organizations-question-risk-vs-benefit.aspx"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Mansfield-Devine S. (2012). Interview: BYOD and the enterprise network. Computer fraud & security 2012(4) 14--17. doi: http:\/\/dx.doi.org\/10.1016\/S1361-3723(12)70031-3  Mansfield-Devine S. (2012). Interview: BYOD and the enterprise network. Computer fraud & security 2012(4) 14--17. doi: http:\/\/dx.doi.org\/10.1016\/S1361-3723(12)70031-3","DOI":"10.1016\/S1361-3723(12)70031-3"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Marshall S. (2014). IT Consumerization: A Case Study of BYOD in a Healthcare Setting. Technology Innovation Management Review(March 2014: Emerging Technologies).  Marshall S. (2014). IT Consumerization: A Case Study of BYOD in a Healthcare Setting. Technology Innovation Management Review(March 2014: Emerging Technologies).","DOI":"10.22215\/timreview\/771"},{"key":"e_1_3_2_1_19_1","unstructured":"mobiThinking. (2014). Global mobile statistics 2014 Part A: Mobile subscribers; handset market share; mobile operators Retrieved 27 May 2014 from http:\/\/mobithinking.com\/mobile-marketing-tools\/latest-mobile-stats\/a#subscribers  mobiThinking. (2014). Global mobile statistics 2014 Part A: Mobile subscribers; handset market share; mobile operators Retrieved 27 May 2014 from http:\/\/mobithinking.com\/mobile-marketing-tools\/latest-mobile-stats\/a#subscribers"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70111-3"},{"key":"e_1_3_2_1_21_1","unstructured":"Moschella D. Neal D. Opperman P. & Taylor J. (2004). The \"Consumerization\" of Information Technology. Paper presented at the Leading Edge Forum.  Moschella D. Neal D. Opperman P. & Taylor J. (2004). The \"Consumerization\" of Information Technology. Paper presented at the Leading Edge Forum."},{"key":"e_1_3_2_1_22_1","unstructured":"Nascio. (2012). Good Technology- BYOD Best Practices Retrieved 13 March 2013 from http:\/\/www.nascio.org\/events\/sponsors\/vrc\/BYOD%20Best%20Practices.pdf  Nascio. (2012). Good Technology- BYOD Best Practices Retrieved 13 March 2013 from http:\/\/www.nascio.org\/events\/sponsors\/vrc\/BYOD%20Best%20Practices.pdf"},{"key":"e_1_3_2_1_23_1","unstructured":"National-Research-Council. (1999). The changing nature of work: Implications for occupational analysis. Washington D.C: National Academy Press.  National-Research-Council. (1999). The changing nature of work: Implications for occupational analysis. Washington D.C: National Academy Press."},{"key":"e_1_3_2_1_24_1","unstructured":"Niehaves B. K\u00f6ffer S. Ortbach K. & Katschewitz S. (2012). Towards an IT Consumerization Theory--A Theory and Practice Review Working Papers European Research Center for Information Systems No. 13. M\u00fcnster: European Research Center for Information Systems.  Niehaves B. K\u00f6ffer S. Ortbach K. & Katschewitz S. (2012). Towards an IT Consumerization Theory--A Theory and Practice Review Working Papers European Research Center for Information Systems No. 13. M\u00fcnster: European Research Center for Information Systems."},{"key":"e_1_3_2_1_25_1","unstructured":"Rains J. (2012). Bring Your Own Device (BYOD): Hot or Not? HDI Research Corner. Retrieved from https:\/\/news.citrixonline.com\/wpcontent\/uploads\/2012\/04\/BYOD-Hot-or-Not.pdf  Rains J. (2012). Bring Your Own Device (BYOD): Hot or Not? HDI Research Corner. Retrieved from https:\/\/news.citrixonline.com\/wpcontent\/uploads\/2012\/04\/BYOD-Hot-or-Not.pdf"},{"key":"e_1_3_2_1_26_1","unstructured":"Reddy A. S. (2012). Making BYOD work for your organisation: Cognizant Research.  Reddy A. S. (2012). Making BYOD work for your organisation: Cognizant Research."},{"key":"e_1_3_2_1_27_1","unstructured":"Revenaugh L. D. & Schweigert M. E. (2013). BYOD: Moving toward a More Mobile and Productive Workforce. Business and Information Technology. Retrieved from http:\/\/0-digitalcommons.mtech.edu.innopac.up.ac.za\/business_info_tech\/3  Revenaugh L. D. & Schweigert M. E. (2013). BYOD: Moving toward a More Mobile and Productive Workforce. Business and Information Technology. Retrieved from http:\/\/0-digitalcommons.mtech.edu.innopac.up.ac.za\/business_info_tech\/3"},{"key":"e_1_3_2_1_28_1","unstructured":"Schadler T. & McCarthy J. (2012 8 March). Mobile Is The New Face Of Engagement. Retrieved from http:\/\/cdn.blog-sap.com\/innovation\/files\/2012\/08\/SAP_Mobile_Is_The_New_Face_Of_Engagement.pdf  Schadler T. & McCarthy J. (2012 8 March). Mobile Is The New Face Of Engagement. Retrieved from http:\/\/cdn.blog-sap.com\/innovation\/files\/2012\/08\/SAP_Mobile_Is_The_New_Face_Of_Engagement.pdf"},{"issue":"4","key":"e_1_3_2_1_29_1","first-page":"25","article-title":"BYOD, Big Data, Cloud Rank High Among Top Trends for 2013. {Article}. Security","volume":"50","author":"SogetiLabs","year":"2013","journal-title":"Solutions for Enterprise Security Leaders"},{"key":"e_1_3_2_1_30_1","unstructured":"Stagliano T. DiPoalo A. & Coonelly P. (2013). The Consumerization of Information Technology: La Salle University Digital Commons.  Stagliano T. DiPoalo A. & Coonelly P. (2013). The Consumerization of Information Technology: La Salle University Digital Commons."},{"key":"e_1_3_2_1_31_1","unstructured":"STATS-SA. (2013). Mid-year population estimates. Pretoria: Retrieved from http:\/\/www.statssa.gov.za\/Publications\/P0302\/P03022013. pdf.  STATS-SA. (2013). Mid-year population estimates. Pretoria: Retrieved from http:\/\/www.statssa.gov.za\/Publications\/P0302\/P03022013. pdf."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(13)70050-3"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/336460.336478"},{"key":"e_1_3_2_1_34_1","unstructured":"Wright A. (2013). 5 Trends Changing the Nature of Work. HR News. Retrieved from http:\/\/www.shrm.org\/Publications\/HRNews\/Pages\/5-Trends-Changing-the-Nature-of-Work.aspx  Wright A. (2013). 5 Trends Changing the Nature of Work. HR News. Retrieved from http:\/\/www.shrm.org\/Publications\/HRNews\/Pages\/5-Trends-Changing-the-Nature-of-Work.aspx"},{"key":"e_1_3_2_1_35_1","unstructured":"Yegulalp S. (2013). Making BYOD Work- BYOD Deep Dive: Infoworld.  Yegulalp S. (2013). Making BYOD Work- BYOD Deep Dive: Infoworld."}],"event":{"name":"SAICSIT '14: Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014","acronym":"SAICSIT '14","location":"Centurion South Africa"},"container-title":["Proceedings of the Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014 on SAICSIT 2014 Empowered by Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664591.2664607","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2664591.2664607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:24Z","timestamp":1750227204000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664591.2664607"}},"subtitle":["Employers are turning a blind eye?"],"short-title":[],"issued":{"date-parts":[[2014,9,29]]},"references-count":35,"alternative-id":["10.1145\/2664591.2664607","10.1145\/2664591"],"URL":"https:\/\/doi.org\/10.1145\/2664591.2664607","relation":{},"subject":[],"published":{"date-parts":[[2014,9,29]]},"assertion":[{"value":"2014-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}