{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:42Z","timestamp":1750306482245,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T00:00:00Z","timestamp":1443398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,28]]},"DOI":"10.1145\/2815782.2815824","type":"proceedings-article","created":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T14:32:43Z","timestamp":1450449163000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Contextualizing BYOD in SMEs in developing countries"],"prefix":"10.1145","author":[{"given":"Adedolapo","family":"Akin-Adetoro","sequence":"first","affiliation":[{"name":"University of Cape Town, Private Bag X3, Rondebosch 7701, South Africa, +27 21 650 2261"}]},{"given":"Salah","family":"Kabanda","sequence":"additional","affiliation":[{"name":"University of Cape Town, Private Bag X3, Rondebosch 7701, South Africa, +27 21 650 4253"}]}],"member":"320","published-online":{"date-parts":[[2015,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"215","article-title":"Issues in SME development in Ghana and South Africa","volume":"39","author":"Abor J.","year":"2010","journal-title":"International Research Journal of Finance and Economics"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-11-2012-0129"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Avgerou C. 2001. The significance of context in information systems and organizational change. Information systems journal 11 1 43--63.  Avgerou C. 2001. The significance of context in information systems and organizational change. Information systems journal 11 1 43--63.","DOI":"10.1046\/j.1365-2575.2001.00095.x"},{"key":"e_1_3_2_1_4_1","unstructured":"Bell M. 2013. Considerations When Implementing a BYOD Strategy. IS Practices for SME Success Series 19--22.  Bell M. 2013. Considerations When Implementing a BYOD Strategy. IS Practices for SME Success Series 19--22."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.36"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.005"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03510"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1741-6248.2002.00277.x"},{"volume-title":"18th Americas Conference on Information Systems","year":"2012","author":"Harris M.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-03-2013-0019"},{"volume-title":"Proceedings of the 19th Twente Student Conference on IT (Netherlands","year":"2013","author":"Hensema M.","key":"e_1_3_2_1_11_1"},{"volume-title":"21st European conference on Information Systems","year":"2013","author":"Hopkins N.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.52283\/NSWRCA.AJBMR.20120202A01","article-title":"An investigative study of the factors affecting the adoption of information and communication technology in small and medium scale enterprises in Nigeria","volume":"2","author":"Irefin I.","year":"2012","journal-title":"Australian Journal of Business and Management Research"},{"volume-title":"Proc. of ICCEET'12 (India, March 21 --22","year":"2012","author":"Jadeja Y.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Kabanda S. 2012. Power Dynamics in E-commerce Adoption in Least Developing Countries: The Case of Dar-es-Salaam SMEs Tanzania. In e-Infrastructure and e-Services for Developing Countries. Springer 218--227.  Kabanda S. 2012. Power Dynamics in E-commerce Adoption in Least Developing Countries: The Case of Dar-es-Salaam SMEs Tanzania. In e-Infrastructure and e-Services for Developing Countries. Springer 218--227.","DOI":"10.1007\/978-3-642-29093-0_21"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"E-Commerce Institutionalization is not for us\": SMEs perception of E-Commerce in Tanzania","volume":"3","author":"Kabanda S.","year":"2011","journal-title":"The African Journal of Information Systems"},{"volume-title":"25th Australian Conference on Information Systems","year":"2014","author":"Kabanda S.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","first-page":"2288","article-title":"Job creation versus job shedding and the role of SMEs in economic development","volume":"4","author":"Kongolo M.","year":"2010","journal-title":"African Journal of Business Management"},{"volume-title":"Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption. In 34th International Conference on Information systems","year":"2013","author":"Lee J.","key":"e_1_3_2_1_19_1"},{"volume-title":"19th Americas Conference on Information Systems","year":"2013","author":"Loose M.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Madzima K. Moyo M. and Abdullah H. 2014. Is bring your own device an institutional information security risk for small-scale business organisations? In 2014 Information Security for South Africa (ISSA) (Johannesburg South Africa August 13 --15 2014).  Madzima K. Moyo M. and Abdullah H. 2014. Is bring your own device an institutional information security risk for small-scale business organisations? In 2014 Information Security for South Africa (ISSA) (Johannesburg South Africa August 13 --15 2014).","DOI":"10.1109\/ISSA.2014.6950497"},{"key":"e_1_3_2_1_22_1","unstructured":"Mahmood S. 2008. Corporate governance and business ethics for SMEs in developing countries: Challenges and way forward. In International Society of Business Economics and Ethics World Congress (Cape Town South Africa July 15 --18 2008).  Mahmood S. 2008. Corporate governance and business ethics for SMEs in developing countries: Challenges and way forward. In International Society of Business Economics and Ethics World Congress (Cape Town South Africa July 15 --18 2008)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1120.0806"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.11.021"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090388.1709325"},{"volume-title":"18th Americas Conference on Information Systems","year":"2012","author":"Niehaves B.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","first-page":"729","article-title":"Obstacles to the growth of new SMEs in South Africa: A principal component analysis approach","volume":"4","author":"Olawale F.","year":"2010","journal-title":"African Journal of Business Management"},{"key":"e_1_3_2_1_28_1","unstructured":"Qing Y. L. 2013. BYOD on rise in Asia but challenges remain ZDNET. Available at: http:\/\/www.zdnet.comibyod-on-rise-inasia-but-challenges-remain-70000 I 06601. {Accessed: 11 June 2015}.  Qing Y. L. 2013. BYOD on rise in Asia but challenges remain ZDNET. Available at: http:\/\/www.zdnet.comibyod-on-rise-inasia-but-challenges-remain-70000 I 06601. {Accessed: 11 June 2015}."},{"volume-title":"Society for Information Technology & Teacher Education International Conference.","year":"2014","author":"Rackley R.","key":"e_1_3_2_1_29_1"},{"volume-title":"20th Americas Conferences on Information systems","year":"2014","author":"Shahrasbi N.","key":"e_1_3_2_1_30_1"},{"volume-title":"19th Americas conference on Information Systems","year":"2013","author":"Shim J.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","first-page":"1","article-title":"BYOD Genie Is Out Of the Bottle--","volume":"1","author":"Singh N.","year":"2012","journal-title":"Journal of Business Management & Social Sciences Research"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/ert.21436"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Steenson M. and Donner J. 2009. Beyond the personal and private: Modes of mobile phone sharing in urban India. The reconstruction of space and time: Mobile communication practices 1 231--250.  Steenson M. and Donner J. 2009. Beyond the personal and private: Modes of mobile phone sharing in urban India. The reconstruction of space and time: Mobile communication practices 1 231--250.","DOI":"10.4324\/9781315134499-11"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1090.0520"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2288-8-45"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664591.2664607"},{"key":"e_1_3_2_1_38_1","unstructured":"UNIDO. 1999. SMEs in Africa Survive against all Odds. Available at: http:\/\/www.unido.org\/doc\/view?document_id=3927&language_code=en. {Accessed: 09 March 2015}.  UNIDO. 1999. SMEs in Africa Survive against all Odds. Available at: http:\/\/www.unido.org\/doc\/view?document_id=3927&language_code=en. {Accessed: 09 March 2015}."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2014.9"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1108\/00251749710186496"},{"key":"e_1_3_2_1_41_1","first-page":"26","article-title":"BYOD: Where the Employee and the Enterprise Intersect","volume":"40","author":"Waterfill M. R.","year":"2014","journal-title":"Employee Relat. Law J."}],"event":{"name":"SAICSIT '15: The 2015 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists","acronym":"SAICSIT '15","location":"Stellenbosch South Africa"},"container-title":["Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815782.2815824","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815782.2815824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:23Z","timestamp":1750225703000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815782.2815824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,28]]},"references-count":41,"alternative-id":["10.1145\/2815782.2815824","10.1145\/2815782"],"URL":"https:\/\/doi.org\/10.1145\/2815782.2815824","relation":{},"subject":[],"published":{"date-parts":[[2015,9,28]]},"assertion":[{"value":"2015-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}