{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T04:39:52Z","timestamp":1773203992667,"version":"3.50.1"},"reference-count":91,"publisher":"IGI Global","issue":"2","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,1]]},"abstract":"<p>Bring Your Own Device (BYOD) refers to the provision and use of personal mobile devices by employees for both private and business purposes. Although there has been research on BYOD, little attention has been paid to employees' perception of threats to their personal information security (ISS) when using a BYOD, especially in a professional context. This article investigates employee coping strategies related to BYOD ISS threats in France. The results of a survey of 223 employees indicate that while perceived behavioral control exerts only direct effects on problem-focused (i.e., disturbance handling) and emotion-focused (i.e., self-preservation) coping strategies, ISS concern exhibits significant direct and moderating influences. Several security paradoxes could be identified, namely, discrepancies between the respondents' ISS concern and the adopted coping strategies. This article offers the first insights into the French context and can serve as a basis for comparisons in future research and to help improve employees' personal ISS in the professional context.<\/p>","DOI":"10.4018\/jgim.2020040101","type":"journal-article","created":{"date-parts":[[2019,12,27]],"date-time":"2019-12-27T19:36:51Z","timestamp":1577475411000},"page":"1-28","source":"Crossref","is-referenced-by-count":9,"title":["Coping Strategies and Paradoxes Related to BYOD Information Security Threats in France"],"prefix":"10.4018","volume":"28","author":[{"given":"Pam\u00e9la","family":"Baillette","sequence":"first","affiliation":[{"name":"University of Bordeaux, Bordeaux, France"}]},{"given":"Yves","family":"Barlette","sequence":"additional","affiliation":[{"name":"Montpellier Business School, Montpellier, France"}]}],"member":"2432","reference":[{"key":"JGIM.2020040101-0","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"key":"JGIM.2020040101-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.07.007"},{"key":"JGIM.2020040101-2","doi-asserted-by":"publisher","DOI":"10.3917\/sim.173.0007"},{"key":"JGIM.2020040101-3","doi-asserted-by":"publisher","DOI":"10.2307\/25148693"},{"key":"JGIM.2020040101-4","doi-asserted-by":"publisher","DOI":"10.2307\/25750701"},{"key":"JGIM.2020040101-5","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"JGIM.2020040101-6","unstructured":"Bradley, J., Loucks, J., Macaulay, J., Medcalf, R., & Buckalew, L. (2012). BYOD: A global perspective. Harnessing employee-led innovation. Cisco Internet Business Solutions Group. Retrieved from http:\/\/resources.idgenterprise.com\/original\/AST-0074924_BYOD_Horizons-Global.pdf"},{"key":"JGIM.2020040101-7","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"JGIM.2020040101-8","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.2017040102"},{"key":"JGIM.2020040101-9","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50704"},{"key":"JGIM.2020040101-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.002"},{"key":"JGIM.2020040101-11","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.23"},{"key":"JGIM.2020040101-12","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-06-2016-0248"},{"key":"JGIM.2020040101-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.08.006"},{"key":"JGIM.2020040101-14","first-page":"31","article-title":"Making the case for coping","author":"S.Folkman","year":"1992","journal-title":"Personal coping: Theory, research, and application"},{"key":"JGIM.2020040101-15","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"JGIM.2020040101-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2016.02.013"},{"issue":"4","key":"JGIM.2020040101-17","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1108\/ICS-03-2016-0025","article-title":"A systematic approach to investigating how information security and privacy can be achieved in BYOD environments.","volume":"25","author":"A. B.Garba","year":"2017","journal-title":"Information & Computer Security"},{"key":"JGIM.2020040101-18","unstructured":"Glazer, S. (2015, December 4). Privacy and the Internet. CQ Researcher. Retrieved from http:\/\/tinyurl.com\/h85c83x"},{"key":"JGIM.2020040101-19","unstructured":"Google. (2018). Three years of the Right to be Forgotten."},{"key":"JGIM.2020040101-20","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-04-2016-0130"},{"key":"JGIM.2020040101-21","author":"J. F.Hair","year":"2017","journal-title":"A primer on partial least squares structural equation modeling (PLS-SEM)"},{"key":"JGIM.2020040101-22","author":"J. F.Hair","year":"2018","journal-title":"Advanced issues in partial least squares structural equation modeling"},{"issue":"3","key":"JGIM.2020040101-23","first-page":"99","article-title":"IT consumerization: When gadgets turn into enterprise IT tools.","volume":"11","author":"J.Harris","year":"2012","journal-title":"MIS Quarterly Executive"},{"key":"JGIM.2020040101-24","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-09-2015-0382"},{"key":"JGIM.2020040101-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2009.05.001"},{"key":"JGIM.2020040101-26","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.12"},{"key":"JGIM.2020040101-27","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.06.007"},{"key":"JGIM.2020040101-28","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.934286"},{"key":"JGIM.2020040101-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.05.016"},{"key":"JGIM.2020040101-30","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"JGIM.2020040101-31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.06.003"},{"key":"JGIM.2020040101-32","doi-asserted-by":"crossref","DOI":"10.18574\/nyu\/9781479898718.001.0001","author":"M.Jones","year":"2016","journal-title":"Ctrl Z: The right to be forgotten"},{"key":"JGIM.2020040101-33","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.2017040106"},{"key":"JGIM.2020040101-34","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12062"},{"key":"JGIM.2020040101-35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"JGIM.2020040101-36","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.07.002"},{"key":"JGIM.2020040101-37","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-015-0387-z"},{"key":"JGIM.2020040101-38","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.2017010102"},{"key":"JGIM.2020040101-39","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2004.01.007"},{"key":"JGIM.2020040101-40","author":"R. S.Lazarus","year":"1966","journal-title":"Psychological stress and the coping process"},{"key":"JGIM.2020040101-41","author":"R. S.Lazarus","year":"1984","journal-title":"Stress, appraisal, and coping"},{"key":"JGIM.2020040101-42","doi-asserted-by":"publisher","DOI":"10.1108\/JBS-08-2014-0100"},{"key":"JGIM.2020040101-43","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1184032"},{"key":"JGIM.2020040101-44","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.07.009"},{"key":"JGIM.2020040101-45","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"JGIM.2020040101-46","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.01.017"},{"key":"JGIM.2020040101-47","doi-asserted-by":"publisher","DOI":"10.2307\/20650279"},{"key":"JGIM.2020040101-48","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.1.114"},{"key":"JGIM.2020040101-49","unstructured":"Madden, M. (2012). Privacy management on social media sites. Pew Internet Report."},{"key":"JGIM.2020040101-50","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"JGIM.2020040101-51","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.2016.1252287"},{"key":"JGIM.2020040101-52","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2017.1352028"},{"key":"JGIM.2020040101-53","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2005.00190.x"},{"key":"JGIM.2020040101-54","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"JGIM.2020040101-55","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01544.x"},{"key":"JGIM.2020040101-56","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"key":"JGIM.2020040101-57","unstructured":"Nielsen. (2016). Millennials are top smartphones users. Retrieved from http:\/\/www.nielsen.com\/us\/en\/insights\/news\/2016\/millennials-are-top-smartphone-users.html"},{"key":"JGIM.2020040101-58","unstructured":"Nielsen. (2017). Youth movement: Gen Z boasts the largest, most diverse media users yet. Retrieved from http:\/\/www.nielsen.com\/us\/en\/insights\/news\/2017\/youth-movement-gen-z-boasts-the-largest-most-diverse-media-users-yet.html"},{"key":"JGIM.2020040101-59","author":"J. G.Palfrey","year":"2013","journal-title":"Born digital: Understanding the first generation of digital natives"},{"key":"JGIM.2020040101-60","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.09.005"},{"key":"JGIM.2020040101-61","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"JGIM.2020040101-62","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-120710-100452"},{"key":"JGIM.2020040101-63","unstructured":"Prensky, M. (2001). Digital natives, digital immigrants. Retrieved from http:\/\/www.marcprensky.com\/writing\/Prensky%20-%20Digital%20Natives,%20Digital%20Immigrants%20-%20Part1.pdf"},{"key":"JGIM.2020040101-64","unstructured":"Research and Markets. (2017). Global Enterprise Application Market. Retrieved from https:\/\/www.researchandmarkets.com\/research\/7q48z2\/global_enterprise"},{"key":"JGIM.2020040101-65","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2016.08.001"},{"key":"JGIM.2020040101-66","first-page":"153","article-title":"Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation","author":"R. W.Rogers","year":"1983","journal-title":"Social psychophysiology: A sourcebook"},{"key":"JGIM.2020040101-67","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00161"},{"key":"JGIM.2020040101-68","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2012040104"},{"key":"JGIM.2020040101-69","doi-asserted-by":"publisher","DOI":"10.1177\/1094428114560023"},{"issue":"3","key":"JGIM.2020040101-70","first-page":"1","article-title":"B.Y.O.D. Genie Is Out of the Bottle \u2013 \u2018Devil Or Angel\u2019.","volume":"1","author":"N.Singh","year":"2012","journal-title":"Journal of Business Management & Social Sciences Research"},{"key":"JGIM.2020040101-71","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"JGIM.2020040101-72","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.41.8.1328"},{"key":"JGIM.2020040101-73","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.3.255"},{"key":"JGIM.2020040101-74","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.10.017"},{"key":"JGIM.2020040101-75","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.07"},{"key":"JGIM.2020040101-76","doi-asserted-by":"publisher","DOI":"10.20547\/jms.2014.1704202"},{"key":"JGIM.2020040101-77","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.003"},{"key":"JGIM.2020040101-78","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0206"},{"key":"JGIM.2020040101-79","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2011100104"},{"key":"JGIM.2020040101-80","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.03.002"},{"key":"JGIM.2020040101-81","unstructured":"Utz, S., & Kr\u00e4mer, N. C. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyber psychology: Journal of Psychosocial Research on Cyberspace, 3(2). Retrieved from https:\/\/cyberpsychology.eu\/article\/view\/4223\/3265"},{"key":"JGIM.2020040101-82","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"JGIM.2020040101-83","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000619"},{"key":"JGIM.2020040101-84","article-title":"Determinants of intention to participate in corporate BYOD-programs: The case of digital natives.","author":"X.Wang","year":"2015","journal-title":"75th Annual Meeting of the Academy of Management"},{"key":"JGIM.2020040101-85","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645795"},{"key":"JGIM.2020040101-86","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2014.11645740"},{"key":"JGIM.2020040101-87","first-page":"581","article-title":"Partial least squares","volume":"Vol. 6","author":"H. O.Wold","year":"1985","journal-title":"Encyclopedia of statistical sciences"},{"key":"JGIM.2020040101-88","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"JGIM.2020040101-89","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.12.003"},{"key":"JGIM.2020040101-90","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415160405"}],"container-title":["Journal of Global Information Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=246094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T07:27:37Z","timestamp":1722238057000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JGIM.2020040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":91,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jgim.2020040101","relation":{},"ISSN":["1062-7375","1533-7995"],"issn-type":[{"value":"1062-7375","type":"print"},{"value":"1533-7995","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}