The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation
Many organizations are considering Bring Your Own Device (BYOD) programs, in which employees are permitted to use personal mobile devices for work-related purposes. Based on the job demands–resources model, this study empirically investigated the effects of BYOD adoption on employees’ motivation and...
| Main Authors: | Doargajudhur, M., Dell, Peter |
|---|---|
| Format: | Journal Article |
| Published: |
IACIS
2018
|
| Online Access: | http://hdl.handle.net/20.500.11937/73979 |
Similar Items
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018)
by: Jamal, Fara, et al.
Published: (2018)
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017)
by: Gooi, Hao Ming
Published: (2017)
Towards BYOD: examining Education student readiness for a policy of Bring Your Own Digital device at ECU
by: Pagram, J., et al.
Published: (2013)
by: Pagram, J., et al.
Published: (2013)
Impact of BYOD on organizational commitment: an empirical investigation
by: Doargajudhur, M., et al.
Published: (2018)
by: Doargajudhur, M., et al.
Published: (2018)
Factors affecting acceptance of “Bring Your Own Device” (BYOD) policy at HeiTech Padu Berhad / Najuwa Aqilah Mohd Muslim
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
Bring your own digital device in teacher education
by: Newhouse, C., et al.
Published: (2015)
by: Newhouse, C., et al.
Published: (2015)
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015)
by: Olalere, Morufu, et al.
Published: (2015)
'Bring Your Own Device': Considering potential risks to student health
by: Merga, Margaret
Published: (2015)
by: Merga, Margaret
Published: (2015)
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016)
by: Morufu, Olalere
Published: (2016)
A Bring-Your-Own-Device Framework over Software Defined Networking
by: Khoo, Wai Lung
Published: (2015)
by: Khoo, Wai Lung
Published: (2015)
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Individual – Organizational Bindpoints: A Design Theory for Bring-Your-Own-System
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Effectiveness of blended active learning framework using Bring Your Own Device Learning (BYODL), Project Based Learning (PPBL) and Gamification Learning (GL)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
Bringing learning to your doorstep
by: The Star
Published: (2018)
by: The Star
Published: (2018)
BYOD public system
by: Lee, Brenda Mun Yee
Published: (2015)
by: Lee, Brenda Mun Yee
Published: (2015)
Make your own disinfectant
by: Goh, Choon Fu, et al.
Published: (2020)
by: Goh, Choon Fu, et al.
Published: (2020)
Ignore It At Your Own Risk
by: New Straits Times,
Published: (2008)
by: New Straits Times,
Published: (2008)
Make your own natural fertilisers
by: Md Jaafar, Noraini
Published: (2023)
by: Md Jaafar, Noraini
Published: (2023)
Do good with your life and bring happiness to others
by: UMP, PNC
Published: (2020)
by: UMP, PNC
Published: (2020)
Build your own social-networking site
Published: (2008)
Published: (2008)
Cut Costs Plant Your Own Vegetables
by: Sunday Star, Rashvinjeet S.Bedia
Published: (2008)
by: Sunday Star, Rashvinjeet S.Bedia
Published: (2008)
Kick-start your own community garden
by: Arif Shah, Jasmin
Published: (2023)
by: Arif Shah, Jasmin
Published: (2023)
QR-map: BYOD indoor map directory service.
by: Ang, Jenn Ning
Published: (2013)
by: Ang, Jenn Ning
Published: (2013)
Avoid making your own disinfectant, warns researcher
by: Asrol, Awang
Published: (2020)
by: Asrol, Awang
Published: (2020)
"You Can't Do It on Your Own": Experiences of a motivational interviewing intervention on physical activity and dietary behaviour
by: Hardcastle, S., et al.
Published: (2011)
by: Hardcastle, S., et al.
Published: (2011)
Acting your age: on-line social interaction and the elderly
by: Dell, Peter, et al.
Published: (2008)
by: Dell, Peter, et al.
Published: (2008)
Use Your Own Device (UYOD) guidelines as a mechanism to enable sustainable mobile learning in a higher education institution
by: Igbrude, Claudia
Published: (2018)
by: Igbrude, Claudia
Published: (2018)
The health benefits and risks of growing-your-own produce in an urban environment
by: Stubberfield, Jonathan
Published: (2018)
by: Stubberfield, Jonathan
Published: (2018)
Managing your feelings at work, for a reason: The role of individual motives in affect regulation for performance-related outcomes at work
by: Bindl, U.K., et al.
Published: (2022)
by: Bindl, U.K., et al.
Published: (2022)
Psycho-geographical Choose Your Own Adventure: A city in the outermost west
by: Fyfe, A., et al.
Published: (2023)
by: Fyfe, A., et al.
Published: (2023)
Total quality management adoption and performance: A study of family owned and non-family owned enterprises in Malaysia
by: Tan, Boon In
Published: (2018)
by: Tan, Boon In
Published: (2018)
An Intelligent Career: Taking Ownership of Your Work and Your Life
by: Arthur, M., et al.
Published: (2017)
by: Arthur, M., et al.
Published: (2017)
“Find One of Your Own Kind”: Auto-ethnography and my Aboriginal Women Ancestors
by: Dowling, Carol Susan
Published: (2017)
by: Dowling, Carol Susan
Published: (2017)
Are Your IT Staff Working Too Hard?
by: Oxley, A.
Published: (2008)
by: Oxley, A.
Published: (2008)
Are Your IT Staff Working Too Hard?
by: Oxley, A.
Published: (2008)
by: Oxley, A.
Published: (2008)
Bringing Your A-Game to Digital Archaeology: Issues with Serious Games and Virtual Heritage and What We Can Do About It
by: Champion, Erik
Published: (2017)
by: Champion, Erik
Published: (2017)
More memory brings a performance boost
Published: (2008)
Published: (2008)
Similar Items
-
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014) -
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020) -
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018) -
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017) -
Towards BYOD: examining Education student readiness for a policy of Bring Your Own Digital device at ECU
by: Pagram, J., et al.
Published: (2013)