{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:48:24Z","timestamp":1769633304456,"version":"3.49.0"},"reference-count":54,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4,1]]},"abstract":"<p>IT consumerization refers to the phenomenon of using personal devices and applications for work-related tasks. Considered as a major wave of employee-driven innovation, many organizations have adopted IT consumerization to reap its benefits. Bring-your-own-device (BYOD) is a major form of IT consumerization. This study examines the perceptions of BYOD among business students and professionals. Utilizing a perceived value approach, a survey was designed to examine how the benefits and sacrifices of BYOD influence its perceived value. Through survey data collected from 217 business students and 200 full time working professionals, the study finds that job flexibility control, technology empowerment, and enjoyment are positively related to the perceived value of BYOD.<\/p>","DOI":"10.4018\/joeuc.2019040104","type":"journal-article","created":{"date-parts":[[2019,1,30]],"date-time":"2019-01-30T19:22:33Z","timestamp":1548876153000},"page":"65-82","source":"Crossref","is-referenced-by-count":46,"title":["Role of Perceived Value in Acceptance of \u201cBring Your Own Device\u201d Policy"],"prefix":"10.4018","volume":"31","author":[{"given":"Lixuan Zhang","family":"Zhang","sequence":"first","affiliation":[{"name":"Weber State University, Ogden, USA"}]},{"given":"Matthew","family":"Mouritsen","sequence":"additional","affiliation":[{"name":"Weber State University, Ogden, USA"}]},{"given":"Jeffrey R.","family":"Miller","sequence":"additional","affiliation":[{"name":"Sam Houston State University, Huntsville, USA"}]}],"member":"2432","reference":[{"key":"JOEUC.2019040104-0","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.164"},{"key":"JOEUC.2019040104-1","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.1.4316.8726"},{"key":"JOEUC.2019040104-2","unstructured":"Cesare, C. (2011). Trend Micro Consumerization Report 2011. Bringyourownit. Retrieved from http:\/\/bringyourownit.com\/2011\/09\/26\/trend-micro-consumerization-report-2011"},{"issue":"1","key":"JOEUC.2019040104-3","first-page":"24","article-title":"Attitudinal and behavioral outcomes of employees\u2019 psychological empowerment: A structural equation modeling approach. Journal of Organizational Culture","volume":"19","author":"Y. H.Chan","year":"2015","journal-title":"Communications and Conflict"},{"key":"JOEUC.2019040104-4","doi-asserted-by":"publisher","DOI":"10.1177\/0092070394221002"},{"key":"JOEUC.2019040104-5","doi-asserted-by":"publisher","DOI":"10.1002\/mar.10076"},{"issue":"7","key":"JOEUC.2019040104-6","article-title":"Best practices in exploratory factor analysis: Four recommendations for getting the most from your analysis.","volume":"10","author":"A. B.Costello","year":"2005","journal-title":"Practical Assessment, Research & Evaluation"},{"key":"JOEUC.2019040104-7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1992.tb00945.x"},{"key":"JOEUC.2019040104-8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-4446-9"},{"key":"JOEUC.2019040104-9","year":"2011","journal-title":"The evolving workforce: the workflow perspective"},{"key":"JOEUC.2019040104-10","year":"2014","journal-title":"The evolving workforce: the workflow perspective"},{"key":"JOEUC.2019040104-11","unstructured":"Ferguson, M., Carlson, D., Boswell, W., Whitten, D., Butts, M., & Kacmar, K. (2015). Tethered to Work: A Family Systems Approach Linking Mobile Device Use to Turnover Intentions. Journal of Applied Psychology. Retrieved from http:\/\/ovidsp.ovid.com\/ovidweb.cgi?T=JS&PAGE=reference&D=yrovftq&NEWS=N&AN=00004565-900000000-99504"},{"issue":"10","key":"JOEUC.2019040104-12","first-page":"191","article-title":"Current Status, Issues, and Future of Bring Your Own Device (BYOD).","volume":"35","author":"A. M.French","year":"2014","journal-title":"Communications of the Association for Information Systems"},{"key":"JOEUC.2019040104-13","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2015.1010985"},{"key":"JOEUC.2019040104-14","unstructured":"Gartner. (2012). Gartner says the personal cloud will Replace the Personal Computer as the Center of Users\u2019 Digital Lives by 2014. Retrieved from http:\/\/www.gartner.com\/newsroom\/id\/1947315"},{"key":"JOEUC.2019040104-15","first-page":"1","article-title":"It\u2019s my tool, I know how to use it: A theory of the impact of BYOD on device competence and job satisfaction.","author":"L.Giddens","year":"2014","journal-title":"Proceedings of the 20th Americas Conference on Information Systems"},{"key":"JOEUC.2019040104-16","volume":"Vol. 1","author":"B. G.Glaser","year":"1967","journal-title":"The Discovery of Grounded Theory: Strategies for Qualitative Research"},{"key":"JOEUC.2019040104-17","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-016-0789-y"},{"key":"JOEUC.2019040104-18","doi-asserted-by":"publisher","DOI":"10.2307\/1252160"},{"key":"JOEUC.2019040104-19","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280208"},{"key":"JOEUC.2019040104-20","unstructured":"Hackman, J., & Oldman, G. (1980). work redesign. Reading MA: Addison-Wesley."},{"key":"JOEUC.2019040104-21","doi-asserted-by":"publisher","DOI":"10.1037\/a0018556"},{"issue":"3","key":"JOEUC.2019040104-22","first-page":"99","article-title":"IT Consumerization: When Gagets Turn into Enterprise IT Tools.","volume":"11","author":"J.Harris","year":"2012","journal-title":"MIS Quarterly Executive"},{"key":"JOEUC.2019040104-23","doi-asserted-by":"publisher","DOI":"10.1002\/hrm.20279"},{"key":"JOEUC.2019040104-24","doi-asserted-by":"publisher","DOI":"10.1108\/07363760110365796"},{"key":"JOEUC.2019040104-25","doi-asserted-by":"publisher","DOI":"10.1201\/1078.10580530\/45520.22.4.20050901\/90026.2"},{"key":"JOEUC.2019040104-26","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"JOEUC.2019040104-27","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.009"},{"key":"JOEUC.2019040104-28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2006.10.004"},{"key":"JOEUC.2019040104-29","unstructured":"K\u00f6ffer, S., Junglas, I., Chiperi, C., & Niehaves, B. (2014). Dual Use of Mobile IT and Work-to-Life Conflict in the Context of IT Consumerization. In Thirty Fifth International Conference on Information Systems, Auckland, New Zealand (pp. 1\u201319)."},{"key":"JOEUC.2019040104-30","doi-asserted-by":"crossref","first-page":"261","DOI":"10.17705\/1CAIS.03514","article-title":"Exploring the Relationship between IT Consumerization and Job Performance.","volume":"35","author":"S.K\u00f6ffer","year":"2014","journal-title":"Communications of the Association for Information Systems"},{"key":"JOEUC.2019040104-31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvb.2005.07.002"},{"key":"JOEUC.2019040104-32","first-page":"\u2022\u2022\u2022","article-title":"Applied Linear Statistical Models.","volume":"5","author":"M. H.Kutner","year":"1996","journal-title":"Journal of the Royal Statistical Society. Series A (General)"},{"key":"JOEUC.2019040104-33","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-11-2012-0129"},{"key":"JOEUC.2019040104-34","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-02-2014-0053"},{"key":"JOEUC.2019040104-35","unstructured":"Loucks, J., Medcalf, R., Buckalew, L., & Faria, F. (2013). The financial impact of BYOD: A model of BYOD\u2019s benefits to global companies. Retrieved May 4, 2013 from http:\/\/www.cisco.com\/web\/about\/ac79\/docs\/re\/byod\/BYOD-Economics_Econ_Analysis.pdf"},{"key":"JOEUC.2019040104-36","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.93.3.498"},{"key":"JOEUC.2019040104-37","unstructured":"McConnell, J. (2016). Tracking the Trends in Bringing Our Own Devices to Work. Retrieved from https:\/\/hbr.org\/2016\/05\/tracking-the-trends-in-bringing-our-own-devices-to-work"},{"key":"JOEUC.2019040104-38","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.93"},{"key":"JOEUC.2019040104-39","doi-asserted-by":"publisher","DOI":"10.2307\/3250982"},{"key":"JOEUC.2019040104-40","unstructured":"Murdoch, R., Harris, J., & Devore, G. (2010). Can enterprise IT survive the meteor of consumer technology? Accenture. Retrieved January 1, 2015, from http:\/\/www.accenture.com\/SiteCollectionDocuments\/PDF\/Accenture_Can_Enterprise_IT_Survive_the_Meteor.pd"},{"key":"JOEUC.2019040104-41","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.81.4.400"},{"key":"JOEUC.2019040104-42","unstructured":"Nevid, J. (2011). Teaching the millennials. Psychological Science. Retrieved July 11, 2016, from http:\/\/www.psychologicalscience.org\/index.php\/publications\/observer\/2011\/may-june-11\/teaching-the-millennials.html"},{"key":"JOEUC.2019040104-43","article-title":"The effect of private IT use on work performance \u2013 towards an IT consumerization theory.","author":"B.Nievahves","year":"2013","journal-title":"11th International Conference on Wirtschaftsinformatik"},{"key":"JOEUC.2019040104-44","unstructured":"Ortbach, K., K\u00f6ffer, S., M\u00fcller, C. P. F., & Niehaves, B. (2013). How IT consumerization affects the stress level at work: A public sector case study. In PACIS 2013 Proceedings (pp. 1\u201311). Retrieved from http:\/\/aisel.aisnet.org\/pacis2013\/231"},{"key":"JOEUC.2019040104-45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2017.01.006"},{"key":"JOEUC.2019040104-46","unstructured":"Pew Research. (2010). Millennials: A Portrait of Generation Next. Retrieved from http:\/\/www.pewsocialtrends.org\/files\/2010\/10\/millennials-confident-connected-open-to-change.pdf"},{"key":"JOEUC.2019040104-47","first-page":"1","article-title":"The Blurring Boundaries Of Work-Related And Personal Media Use\u202f: A Grounded Theory Study On The Employee\u2019s Perspective.","author":"P. S. R.Schalow","year":"2013","journal-title":"Proceedings of the 21st European Conference on Information Systems"},{"key":"JOEUC.2019040104-48","unstructured":"Sylvia, L. (2013). BYOD 2.0: Addressing Employee Privacy and Enterprise Security. Wired. Retrieved July 11, 2016, from http:\/\/www.wired.com\/insights\/2013\/04\/byod-2-0-addressing-employee-privacy-and-enterprise-security\/"},{"key":"JOEUC.2019040104-49","first-page":"95","article-title":"Work control and employee well-being: A decade review","volume":"Vol. 14","author":"D. J.Terry","year":"1999","journal-title":"International Review of Industrial and Organizational Psychology"},{"key":"JOEUC.2019040104-50","unstructured":"TrendMicro. (2011). The consumerization of IT. Retrieved January 1, 2015, from http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/business\/reports\/rpt_consumerization-of-it.pdf"},{"key":"JOEUC.2019040104-51","doi-asserted-by":"publisher","DOI":"10.2307\/25148660"},{"key":"JOEUC.2019040104-52","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645795"},{"key":"JOEUC.2019040104-53","doi-asserted-by":"publisher","DOI":"10.2307\/1251446"}],"container-title":["Journal of Organizational and End User Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=222699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T20:21:27Z","timestamp":1651868487000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JOEUC.2019040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":54,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"URL":"https:\/\/doi.org\/10.4018\/joeuc.2019040104","relation":{},"ISSN":["1546-2234","1546-5012"],"issn-type":[{"value":"1546-2234","type":"print"},{"value":"1546-5012","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}