Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users.
Paméla BailletteYves BarletteAurélie Leclercq-VandelannoittePublished in: Int. J. Inf. Manag. (2018)
Keyphrases
- end users
- user friendliness
- web applications
- deontic logic
- information technology
- security breaches
- business users
- ubiquitous computing environments
- management tools
- information systems
- user interface
- user communities
- application development
- user requirements
- user experience
- network security
- user acceptance
- information security
- service providers
- decision making
- modal logic
- business applications
- inference rules
- business intelligence
- access control
- internet users
- knowledge workers
- decision support
- digital libraries