Anda di halaman 1dari 9

contributed articles

DOI:10.1145/ 3132745
weighs benefits against risks when it
Millennials entering the workforce ignore the comes to intention to use technology
in a business environment.
risks of using privately owned devices on the job. In 2013, we conducted an interna-
tional study involving 402 students in
BY HEIKO GEWALD, XUEQUN WANG, ANDY WEEGER, their final year of undergraduate study
MAHESH S. RAISINGHANI, GERALD GRANT, just before entering the workplace.
OTAVIO SANCHEZ, AND SIDDHI PITTAYACHAWAN We received feedback from students
at Neu-Ulm University of Applied Sci-
ences (Germany), Dongbei University

Millennials’
of Finance & Economics (China), Tex-
as Woman’s University (U.S.), Carleton
University (Canada), Fundação Getu-

Attitudes
lio Vargas (Brazil), and RMIT Univer-
sity (Australia). We found they share
a common set of values regardless of

Toward IT
nationality, including motivational
drivers that would alarm corporate IT
managers, if known. The individuals

Consumerization
in our sample value their own benefit
highly and dramatically neglect the
risks their actions might pose.

in the Workplace
The way we work, think, and behave
is heavily influenced by the Internet,
email, smartphones, and other tech-
nological innovations that have prolif-
erated over the past 20 to 30 years. The
generation of people born after 1980
is the first to grow up with information
everywhere, anytime24 and referred to
as digital natives, or, more commonly,
millennials.15
PEOPLE BORN AFTER 1980, often called “millennials” Many studies have sought to ana-
lyze them.20 For example, in their 2010
by demographic researchers, behave differently literature review, Ng et al.24 character-
from older generations in significant ways. They ized them as “want it all” and “want
are the first “digital natives,” the “always on it now.” It seems generally accepted
in research and practice alike that
generation” that expects to have information millennials are difficult to cope with
instantly and always available at its fingertips. Their
attitudes have been described by previous research key insights
in often unfavorable terms. And when they enter the ˽˽ Members of Generation Y (so-called
millennials) see the use of their privately
workplace, they pose a major challenge to managers owned devices for work as a necessity,
not an option.
from older generations, who, it has been shown,
˽˽ Millennials focus on their personal benefit,
typically follow a different set of values. generally ignoring the risks they may
introduce into corporate networks when
Our research investigates the attitudes of using their own devices and accounting for
millennials who have not yet entered the workforce risk only if it threatens them directly.

toward the use of information technology (IT) in ˽˽ When it comes to weighing risks
against benefits, such behavior is seen
terms of “IT consumerization.” Specifically, we want across developed economies, with no
significant cultural influence across an
to know how this significant part of the population international sample.

62 COM MUNICATIO NS O F TH E AC M | O C TO BER 201 7 | VO L . 60 | NO. 1 0


when entering the workplace from the of IT consumerization. Here come the ness purposes.31 “Ownership” of the
perspective of managers born perhaps cherry pickers. device or service is usually regarded as
decades earlier.32 However, given the a key characteristic of IT consumeriza-
need for talent in today’s technology- Research Background tion,14,25 as possession shifts from em-
driven society, especially in computer Here, we introduce the concept of IT ployer to user/employee.
science, management needs to adapt consumerization, then discuss how We expect IT consumerization to
and offer millennials working condi- national culture was relevant in our have a positive influence on employ-
tions that attract them.37 study: ees’ work performance by increasing
Previous research focused mainly IT consumerization. IT consumer- satisfaction, flexibility, and mobility.14
on millennials’ attitudes toward ization describes the ongoing process It is also demanded by more and more
work.3 Their attitude toward using of blending private and business life employees who want to use their own
technology for work purposes has when it comes to the use of technol- smartphone to, say, access corporate
not yet, however, received sufficient ogy, as driven by employees who push email messages.36 However, using pri-
academic attention.35 There is a IT solutions they use privately into vately owned devices at work involves
striking paucity of research looking the workplace.38 This applies to hard- risks like blurred boundaries between
at how millennials use technology for ware (as in “bring your own device,” or professional and private lives,5,13,25 cre-
professional and personal purposes.35 BYOD) where privately owned laptops, ating additional stress for the employ-
PHOTO BY DEA N DROBOT

To partially close this gap, we con- tablets, and smartphones are used for ee (such as when responding to email
ducted our study on the motivational business tasks but also to software messages on weekends when techni-
factors that shape millennials’ inten- when online email services or cloud- cally not at work). Not only users, but
tion to use technology in the context storage solutions are used for busi- their employers as well, face notable

O C TO B E R 2 0 1 7 | VO L. 6 0 | N O. 1 0 | C OM M U N IC AT ION S OF T HE ACM 63
contributed articles

challenges from this trend. Anecdotal individualism/collectivism; masculin- privately owned devices on the job is
evidence indicates corporate IT de- ity/femininity; uncertainty avoidance; determined by the outcome of weigh-
partments are under pressure to give and long-term orientation. Other re- ing perceived benefits vs. perceived
in to user demands to be allowed to search found that national cultural risks/associated costs, as in Figure 1.
use privately owned IT for work pur- values strongly affect an individual’s Perceived benefits. Perceived ben-
poses. However, granting myriad dif- IT-adoption behavior.12,32 efits “include all benefits which the
ferent consumer devices access to the In order to understand how mil- customer perceives as having been
corporate network is a nightmare for lennials perceive benefits and risks received.”18 In the context of IT use,
anyone concerned about IT security. associated with IT consumerization they reflect the overall positive utility
Consumerization of IT seems to across different cultures, we identi- individuals expect when using a par-
be a key characteristic of millenni- fied uncertainty avoidance (UA) and ticular technology.12 Prior research
als, as their desire to be always on is individualism/collectivism (IC) as demonstrated that perceived benefits
not limited only to the workplace. In the most relevant dimensions. Power significantly affect behavioral inten-
the same vein, they are accustomed to distance, masculinity/femininity, and tion regarding the use of IT.16,19
always using state-of-the-art technol- long-term orientation are important We define perceived benefits as
ogy, something not every work envi- in the more general context of tech- individuals’ assessment of the func-
ronment is able to provide, especially nology adoption but less relevant in tional benefits they associate with us-
because the definition of “state of the understanding the effect of perceived ing a privately owned device for work
art” is subjective. risks and benefits in the context of our purposes. Building on the premises of
Our study focused on mobile de- study. technology acceptance and use mod-
vices as an exemplary technology to “Uncertainty avoidance” refers els,22,29,33 we propose that the benefits
explain millennials’ behavioral inten- to “the extent to which individuals of using a privately owned device for
tions when it comes to the use of tech- feel vulnerable to unpredictable and work purposes are related to the char-
nology. This area is of great concern unknown situations.”9 People with acteristics of the technology and the
to practitioners, including CIOs and strong UA values fear uncertainty. In functional advances it provides.29 We
senior IT managers.31 the context of work-related technol- thus assume perceived benefits as a
To understand the role of such con- ogy, they need the predictability often multidimensional construct compris-
tradictory factors in individual deci- provided by rules, policies, and struc- ing three facets of employment behav-
sion making, social psychology pro- ture in organizations that IT consum- ior: performance expectancy; effort
vides net-valence models (NVMs) that erization contradicts or dilutes. UA expectancy; and compatibility.
assume individuals intend to perform can thus help understand how mil- Employees may realize productiv-
an action only if the perceived benefits lennials perceive the risks associated ity gains when allowed to select de-
outweigh the associated costs.7,26 Prior with IT consumerization. vices on their own.14 Consequently,
research found NVMs help explain the “Individualism/collectivism” is performance expectancy reflects the
adoption of technology-related ser- one of the most widely studied cultur- extent individuals perceive that using
vices.17 Other prominent theories on al values in cross-cultural research,30 privately owned devices supports their
technology adoption (such as Unified referring to “an individual’s prefer- ability to perform better at work.33
Theory of Acceptance and Use of Tech- ence for a social framework where in- Moreover, devices selected by individ-
nology33) do not capture the risks asso- dividuals take care of themselves (in- ual employees are usually perceived as
ciated with technology use and is why dividualism), as opposed to how they easier to use and more intuitive than
we chose NVMs as our theoretical lens expect the group to take care of them those provided by an IT department.25
(see Figure 1). in exchange for their loyalty (collec- We thus define effort expectancy as
Cultural values and IT use behav- tivism).”9 Individuals with individual- the degree of ease an individual as-
ior. Millennials’ use of corporate IT istic values have a more complex and sociates with using a privately owned
involves multiple challenges for IT more frequently sampled private self. device as compared to using a device
executives worldwide. However, the Consequently, their own goals, be- provided by an IT department. Overall
literature suggests behavioral mod- liefs, and values are more salient. Con- benefit perceptions are also formed
els do not apply universally across all sidering technology use at work, they by an individual’s work style and as-
cultures.30 Research by Srite and Kara- are more concerned with the benefits sociated needs and values. To capture
hanna30 showed the significance of they might achieve than the disadvan- these influential factors, Moore and
factors determining technology use tages that could arise for others. IC is Benbasat22 proposed the construct
are notably dependent on espoused thus useful in understanding how mil- “compatibility” as the degree to which
cultural values, particularly those re- lennials perceive benefits associated using a privately owned device for
flecting national culture. National cul- with IT consumerization, especially work purposes fits the individual’s
ture refers to “the collective program- when there could be conflict between work style. Employees who agree to
ming of the mind that distinguishes themselves and their employers. be available for work responsibilities
the members of one group or category (such as to respond to email messag-
of people from another.”11 Hofstede Research Model es) after work hours are more likely to
and Bond10 proposed five dimensions Based on NVMs, it is assumed an in- see the use of their devices for busi-
of national culture: power distance; dividual’s behavioral intention to use ness purposes as beneficial.

64 COMMUNICATIO NS O F TH E AC M | O C TO BER 201 7 | VO L . 60 | NO. 1 0


contributed articles

Following these insights, we hy- Using a device for both private and
pothesize that perceived benefits in- business purposes entails the risk that
fluence individuals’ consumerization personal information is disclosed to
behavior: the employer without the employee’s
Hypothesis 1. The greater the per-
ceived benefits of using privately Granting myriad consent and knowledge.21 Privacy risk,
as defined by Featherman and Pavlou6
owned devices for work purposes, the
greater an individual’s intention to
different consumer as the “potential loss of control over
personal information,”6 encompasses
participate in a BYOD program. devices access this facet of risky behavior. Business
“Perceived risk” reflects negative
utility from a subjective perspective, a
to the corporate data, as well as personal data, is at
risk. The potential for corporate data
concept introduced by Bauer2 as part network is to be exposed to unauthorized third
of his “Perceived Risk Theory,” which
assumes subjective risk perceptions
a nightmare for parties also increases when individu-
als use their private devices for work
directly influence an individual’s in- anyone concerned purposes.25 Information security is
tention to perform a certain action.4
Perceived risk is defined by Cunning- about IT security. one of the most important topics re-
lated to IT consumerization, as 90%
ham4 as “the amount that would be of all corporate data breaches fall into
lost, or that which is at stake, if the four patterns:34 lost and stolen devic-
consequences of an act were not fa- es, user-initiated crimeware, insider
vorable, and the individual’s sub- misuse, and miscellaneous human
jective feeling of certainty that the errors. To capture this facet of risky
consequences will be unfavorable.” behavior, we assume security risk, or
Featherman and Pavlou6 and Hoehle potential loss due to fraud or a hacker
et al.9 found perceived risk plays a sig- compromising corporate information
nificant role in individuals’ IT-use be- security,16 contributes to overall per-
havior. ceived risk.
To reflect the perceived cost as- We thus hypothesize that perceived
sociated with using privately owned risk negatively affects individuals’
devices, we define perceived risk as decisions regarding use of privately
the belief of individuals about the owned devices at work:
potential negative outcomes caused Hypothesis 2. The greater the per-
by using privately owned devices on ceived risk of using privately owned
the job. The negative consequences devices for work purposes, the lower
of such behaviors can be classified an individual’s intention to partici-
into multiple types of loss, indicat- pate in a BYOD program.
ing that, as with perceived benefit, We also assume the perceived risk
perceived risk is a multidimensional associated with IT consumerization
construct.6,16 Based on the arguments influences behavioral intention indi-
discussed earlier regarding consum- rectly by negatively affecting perceived
erization and its effects on corporate benefits. For instance, as a measure of
IT, we hypothesize that using privately safeguarding IT security, firms usu-
owned devices for business purposes ally adopt policies that allow them to
encompasses three facets of risk: per- erase data when an employee’s de-
formance; privacy; and security. vice is lost or stolen. Such “loss of full
Using privately owned devices for ownership” significantly affects the
work purposes generally shifts re- perceived benefits of BYOD.28 We thus
sponsibility from the IT department propose:
to the individual. For instance, the Hypothesis 3. The perceived risk of
individual is, at least psychologically, using privately owned devices for work
accountable for “how well the [device] purposes negatively affects an individ-
will perform relative to expectations.”1 ual’s perception of benefit.
The risk associated with using one’s Cultural values. Research provides
own devices on the job includes the evidence that millennials’ cultural
potential that the device the individ- values influence their technology-use
ual is responsible for is not sufficient behavior.30 However, it remains to be
for its intended business purpose. demonstrated whether the proposed
Performance risk thus reflects the po- NVM holds across the general popu-
tential for not being able to perform lation of millennials who reflect a va-
business activities as expected. riety of cultural values.30 We propose

O C TO B E R 2 0 1 7 | VO L. 6 0 | N O. 1 0 | C OM M U N IC AT ION S OF T HE ACM 65
contributed articles

Table 1. Dataset demographics. of using privately owned devices for


work purposes and hence to be more
Cluster A Cluster B Complete Set C
likely to use their own devices at work.
IC + / UA – IC – / UA +
We also expect perceived risk to be
n 242 160 402
less important for millennials who
espouse lower uncertainty-avoidance
Gender cultural values.
Male 44.2% 37.5% 41.5% We thus propose that there are dis-
Female 55.4% 62.5% 58.2% tinctive subcultures within the overall
Age group of millennials that are deter-
<= 21 years 53.7% 55.6% 54.5% mined by differences regarding their
22 to 25 years 46.3% 44.4% 45.5% UA and IC values. We hypothesize that
the subcultures will take different ap-
Country
proaches toward risk/benefit-assess-
Australia 9.9% 6.3% 8.5%
ment of their intention to participate
Brazil 7.0% 9.4% 8.0%
in a BYOD program:
Canada 6.2% 10.6% 8.0%
Hypothesis 4. The effect of the per-
China 39.7% 27.5% 34.8%
ceived risks of using privately owned
Germany 13.6% 13.8% 13.7%
devices for work purposes differs
U.S. 14.0% 23.8% 17.9%
among millennials with lower UA
Other 9.6% 8.6% 9.1%
scores and millennials with higher UA
scores. The effect of perceived ben-
efits of using privately owned devices
Figure 1. Research model. for work purposes also differs among
millennials with higher IC scores and
millennials with lower IC scores.

Uncertainty
Methodology
Avoidance Here, we discuss our data collection,
Performance Risk sample clustering, data analysis, and
results:
Perceived H4a Data collection. To test our re-
Privacy Risk
Risks
search model, we developed a ques-
H2 (–)
tionnaire with a set of measurement
Security Risk
items for each construct, and to
Behavioral
H3 (–)
Intention
safeguard measurement validity, we
adapted items from prior research, as
Performance Expectancy outlined in the online appendix (dl.
H1 (+)
acm.org/citation.cfm?doid=3132745
Effort Expectancy Perceived &picked=formats).
Benefits H4b
We distributed the questionnaire
among students in their final year of
Compatibility
Individualism/
undergraduate studies and with rel-
Collectivism evant work experience (most respon-
dents worked full time for at least six
months during their studies) using
an online survey tool. Our approach
is consistent with Vodanovich et al.35
that the explanatory power of the the- ing a privately owned device can indi- who suggested conducting surveys
oretical model depends on how dis- cate that individuals are more strongly with students to understand how
tinctively millennials espouse charac- concerned with their own needs than millennials (“digital natives” in their
teristic cultural values. with those of the collective, includ- terminology) use technology. We col-
Based on these arguments, we ex- ing their employers. We thus expect lected data from students with “tech-
pect to see distinctions in individu- individuals who espouse individual- nology-affine” majors—“information
alistic values and perceptions toward istic cultural values to more strongly systems,” “industrial engineering,”
uncertainty. Using their own devices value the benefits of using privately and “business administration”—in a
for work purposes enables millennials owned devices. Likewise, we assume number of universities worldwide. We
to express their sense of self and bet- individuals who experience less diffi- chose countries with different values
ter achieve their own goals and follow culty dealing with uncertainty to put of UA and IC, according to Hofstede.11
their own beliefs and values. Also, us- less emphasis on the potential risks After stripping out incomplete ques-

66 COMMUNICATIO NS O F TH E AC M | O C TO BER 201 7 | VO L . 60 | NO. 1 0


contributed articles

tionnaires, we received a total of 402 The formative measures of “per- and security risk contributed signifi-
valid responses. ceived benefits” were significant, at cantly only to the formative index of
Clustering for espoused cultural least at the .05 level, and path coeffi- the complete dataset. Although not
values. We conducted exploratory fac- cients were greater than .1, suggest- all facets of risky behavior contrib-
tor analysis, a statistical method used ing the chosen characteristics of each uted significantly, VIF was less than 2
to uncover the underlying structure category were relevant for the forma- within all three datasets, confirming
in a large set of variables, to test the tion of the construct (see Table 2). indicator validity. Consequently, low
“unidimensionality” of the measure- Moreover, the variance inflation factor redundancy of indicators’ informa-
ment items for IC and UA. It revealed (VIF) was less than 2, supporting our tion was confirmed.
three items measuring IC and two assumption for indicator validity. The results show performance
items measuring UA load with a high The formative measures of “per- risk contributed significantly to over-
coefficient on the factors they are in- ceived risks” revealed mixed results all risk perception in dataset B and
tended to measure (loadings > 0.79). regarding the risk facets’ contribu- C, while security risk contributed to
Using the factor scores of these items, tion to the formation of the formative overall risk perception in only the
we then conducted a K-means clus- index. We found privacy risk was not complete dataset C. Privacy risk did
tering. Cluster analysis revealed two relevant regardless of dataset used; not significantly contribute to per-
clusters (see Table 1) where the first performance risk was significant only ceived risk, regardless of dataset. And
cluster (referred to as A) encompassed in subset B and the complete dataset; performance expectancy, effort expec-
respondents with high IC scores (clus-
ter center 0.13) and low UA scores Table 2. Formative constructs measurements.
(cluster center −0.61), and the second
cluster (referred to as B) encompassed Construct Facet Cluster A Cluster B Complete Set C

respondents with rather low IC scores Performance 0.740 0.631* 0.713**


Perceived
(cluster center −0.20) and rather high Privacy -0.315 0.133 -0.124
Risks
UA scores (cluster center 0.93). Security 0.668 0.530 0.613*
We characterized the respondents Performance 0.522*** 0.430** 0.491***
Perceived Expectancy
in group A as more individualistic
Benefits Effort Expectancy 0.325* 0.230* 0.292***
and less risk-averse than in group B.
Compatibility 0.349** 0.538*** 0.420***
Although both groups encompass
only millennials, they showed differ- *** p < 0.001; ** p < 0.01; * p < 0.05

ent characteristics when it comes to


the formation of behavioral intention.
One could argue A is the more forth- Figure 2. Structural model assessment.
coming, self-centered, and aggressive,
while B represents the more group-
oriented and considerate.
Measurement model assessment.
We tested our model with partial
least squares using SmartPLS 3.0 with Perceived
1,000 samples bootstrapping, assess- Risks
ing the measurement model with the A –0.058
B –0.079***
complete dataset C, as well as with C –0.062***
clusters A and B.
We measured behavioral intention
reflectively (loadings of the indica- Behavioral
Intention
tors were above 0.95 and significant at A –0.126
B –0.268* A 0.335
the .001 level) and confirmed internal R2 = B 0.419
C –0.178**
consistency by assessing Cronbach’s C 0.368
Alpha (CA) and Composite Reliabil-
ity (CR) measures. Both exceeded the
threshold of 0.90 for all datasets: A 0.568***
A CA=0.90, CR=0.95; B CA=0.92, B 0.621***
CR=0.96; C CA=0.91; and CR=0.96. C 0.593***
The average variance extracted was Perceived *p < 0.05
Benefits **p < 0.01
greater than 0.50 (A 0.91; B 0.93; and ***p < 0.001
C 0.92), demonstrating sufficient
convergent validity. Finally, we used
cross-loading analysis to confirm that
all constructs load highest with their
respective items.

O C TO B E R 2 0 1 7 | VO L. 6 0 | N O. 1 0 | C OM M U N IC AT ION S OF T HE ACM 67
contributed articles

tancy, and compatibility contributed Discussion mediated through perceived benefits.


significantly to perceived benefits in These results confirm our expecta- However, this effect applies only to
all datasets. tions but also point to unanticipated group B.
Structural model assessment. The conclusions. Millennials are egocen- That is, the results show that the
results (see Figure 2) demonstrate the tric, especially when it comes to their espoused cultural values individual-
millennials responding to the survey expectations regarding the work- ism and uncertainty avoidance only
primarily consider the benefits and place.24,27 The respondents in our sur- slightly influenced survey-responding
neglect the risks of using technol- vey expect great benefit from using millennials’ decision making regard-
ogy; in our research context, which in- their own devices, but the related risks ing their IT consumerization behav-
volves taking part in a corporate BYOD are not reflected in their behavioral de- ior. Given these findings, our study
program. cision patterns unless they are person- contributes to theory and practice
Detailed analysis confirmed the ally affected. In our sample, we also alike. First, it provides an NVM that
existence of two distinct groups of found that only those millennials who accounts for the particularities of IT
millennials differentiated by their es- are more strongly oriented toward the consumerization, demonstrating the
poused cultural values in our sample. collective and somehow feel vulner- risks/costs associated with the use of
We named them due to their strong able in unpredictable situations (pru- privately owned devices at work do
characteristics the “narcissists” dent) are influenced to at least some not significantly affect decision mak-
(group A) and the “prudent” (group degree by risk perceptions regarding ing for most millennials. Further evi-
B). Both groups showed intentions the performance of their privately dence is thus given that millennials
expected by millennials: take the ben- owned devices. These findings con- are concerned mainly with their own
efits and ignore the risks. However, firm what research expects23,24,27 and benefit and happy to neglect the risks
the groups also showed different ap- anecdotal evidence underlines. that do not jeopardize them directly.
proaches to acting on their risk-and- What we did not expect was the Privacy risk seems to be of no concern,
benefit perceptions, depending on cross-cultural homogeneity of the as in Vodanovich35
their respective IC/UA scores. sample. Millennials’ values seem Second, the study also enhances
For millennials with high IC scores uniform regardless of cultural back- our knowledge of the role of millen-
and low UA scores—narcissists—risk ground. Throughout our sample we nials’ espoused cultural values, show-
perceptions have no effect, while ben- did not find statistically significant ing for the first time in the academic
efits are weighted comparatively high differences in responses based on in- literature that the formation of tech-
when it comes to technology-adoption terviewee nationality. Investigating nology-use decisions are apparently
decisions. Additionally, perceived further, we used two distinct cultural universal for millennials independent
risks do not significantly affect per- values—IC and UA—to cluster the re- of cultural background.
ceived benefits. For the group with low sponses. We were able to distinguish For corporate IT managers, our
IC scores and high UA scores (prudent) between two groups—narcissist and findings are a warning: Millennials
risk and benefit perceptions are—rel- prudent—that react as typical millen- will quite likely use their private de-
ative to the narcissists—more impor- nials but also differ in tendencies to- vices for work, not necessarily as part
tant for the intention to participate in ward their intention to participate in of an official program, then through
a BYOD program. For these millenni- BYOD programs. Forming their inten- shadow IT. To avoid this, structured
als, we found perceived risk was sig- tion, the prudent (with lower IC and offerings should be made available.
nificantly related to perceived benefits higher UA) seem slightly more risk- IT security managers should thus con-
(medium effect, Cohen’s d=.163), in- sensitive than the narcissists (with sider the implications of millennials’
dicating they are more aware of risk higher IC and lower UA). Contrary to egocentric approach to risk. If users
and react more cautiously. our expectations, the two groups were are not concerned about the risks
Overall, the results show our re- well distributed among all partici- their behavior poses to the company,
search model is capable of explaining pants in our sample; that is, we found then the company itself must be dou-
a good portion of the variance in mil- no significant correlation with nation- bly cautious. To counter this potential
lennials’ behavioral intention to par- ality or any other control factor to de- threat, companies need to create ro-
ticipate in a BYOD program (R²=.37). fine the two clusters. bust BYOD programs that provide em-
The explanatory power of the model is Even if the intention to use private- ployees the benefits of using their own
slightly stronger (R²=.42) for individu- ly owned devices had formed differ- devices and simultaneously safeguard
als categorized as the prudent. ently depending on IC and UA scores, corporate data and networks.
Finally, removing perceived ben- millennials remain millennials first Our findings embrace the typical
efits from the model leads to a sig- and foremost. The proposed facets of limitations of empirical research: We
nificantly stronger path between per- risk do not significantly contribute to had only a limited number of partici-
ceived risk and behavioral intention their risk perceptions, which, in turn, pants from a limited number of coun-
for the prudent (β=−244**) and for the do not show considerable direct effect tries and who cannot be representative
combined dataset (β=−166**). This re- on behavior intention to participate in of the global millennial population.
sult indicates the effect of perceived corporate BYOD programs. Our data As such, our findings represent an
risk on behavioral intention is most implies that risk perceptions influ- indication but are not generalizable
likely mediated by perceived benefits. ence their decision making, which is for all millennials. Additionally, our

68 COMMUNICATIO NS O F TH E AC M | O C TO BER 201 7 | VO L . 60 | NO. 1 0


contributed articles

research subjects were students. References


Media, and Research: Ageism and the Younger Worker.
Palgrave Macmillan, London, U.K., 2017.
Although all participants belonged 1. Aldás-Manzano, J., Lassala-Navarre, C., Ruiz-
24. Ng, E.S.W., Schweitzer, L., and Lyons, S.T. New
Mafe, C., and Sanz-Blas, S. The role of consumer
to the millennial generation and had innovativeness and perceived risk in online banking
generation, great expectations: A field study of
the millennial generation. Journal of Business and
working experience, they were cur- usage. International Journal of Bank Marketing 27, 1
Psychology 25, 2 (June 2010), 281–292.
(2009), 53–75.
rently not all actually working. The 25. Niehaves, B., Köffer, S., and Ortbach, K. IT consumerization:
2. Bauer, R.A. Consumer behavior as risk taking. In
A theory and practice review. In Proceedings of the
part of the millennials population al- Risk Taking and Information Handling in Consumer
18th Americas Conference on Information Systems
Behavior, D.F. Cox, Ed. Harvard University Press,
ready in the active workforce was not (Seattle, WA, Aug. 9–11). Association for Information
Cambridge, MA, 1967, 23–33.
Systems, Atlanta, GA, 2012.
included in our dataset. Even though 3. Breitsohl, H. and Ruhle, S. Differences in work-related
26. Peter, J.P. and Tarpey Sr., L.X. A comparative analysis
attitudes between Millennials and Generation X:
of three consumer decisions strategies. Journal of
we took care, it cannot be ruled out Evidence from Germany. In Managing the New
Consumer Research 2, 1 (June 1975), 29–37.
that the occasional participant lacked Workforce: International Perspective on the Millennial
27. Pew Research. Teens, Social Media, and Privacy.
Generation, E.S.W. Ng, S. Lyons, and L. Schweitzer,
Pew Research, Washington, D.C., 2013; http://
the required work experience. It is Eds. Edward Elgar, Cheltenham, U.K., 2014, 107–129.
www.pewinternet.org/files/2013/05/PIP_
4. Cunningham, S.M. The major dimensions of perceived
thus possible that some participants risk. In Risk Taking and Information Handling in
TeensSocialMediaandPrivacy_PDF.pdf
28. Rapoza, J. The increasing costs of BYOD. Aberdeen
did not fully understand or misin- Consumer Behavior, D.F. Cox, Ed. Harvard University
Group Market Alert, Boston, MA, 2014.
Press, Cambridge, MA, 1967, 21–33.
terpreted the BYOD concept and its 5. Derks, D., Duin, D., Tims, M., and Bakker, A.B.
29. Rogers, E.M. Diffusion of Innovations. Free Press,
New York, 1995.
implication for their future working Smartphone use and work-home interference: The
30. Srite, M. and Karahanna, E. The role of espoused
moderating role of social norms and employee
lives. work engagement. Journal of Occupational and
national cultural values in technology acceptance.
MIS Quarterly 30, 3 (Sept. 2006), 679–704.
Organizational Psychology 88, 1 (Mar. 2015), 155–177.
31. Steelman, Z.R., Lacity, M., and Sabherwal, R. Charting
6. Featherman, M.S. and Pavlou, P.A. Predicting
Conclusion e-services adoption: A perceived risk facets
your organization’s bring-your-own-device voyage.
MIS Quarterly Executive 15, 2 (2016), 85–104.
We conducted an international study perspective. International Journal of Human-
32. Twenge, J.M. The evidence for Generation Me and
Computer Studies 59, 4 (2003), 451–474.
to obtain information about how mil- against Generation We. Emerging Adulthood 1, 1
7. Fishbein, M., Ed. Readings in Attitude Theory and
(2013), 11–16.
lennials about to enter the workforce Measurement. John Wiley & Sons, Inc., New York, 1967. 33. Venkatesh, V., Morris, M., Davis, G., and Davis, F.
8. Gewald, H. and Franke, J. The risks of business User acceptance of information technology: Toward
weigh risks and benefits when it comes process outsourcing: A two-fold assessment in the a unified view. MIS Quarterly 27, 3 (Sept. 2003),
to using privately owned technology German banking industry. International Journal of 425–478.
Electronic Finance 1, 4 (2007), 420–441. 34. Verizon. Data Breach Investigations Report, 2015;
in the workplace. It included 402 stu- 9. Hoehle, H., Zhang, X., and Venkatesh, V. An espoused https://iapp.org/media/pdf/resource_center/Verizon_
dents in their final year of study and cultural perspective to understand continued intention data-breach-investigation-report-2015.pdf
to use mobile applications: A four-country study of 35. Vodanovich, S., Sundaram, D., and Myers, M. Digital
with relevant work experience from mobile social media application usability. European natives and ubiquitous information systems.
Journal of Information Systems 24, 3 (2015), 337–359.
six countries. The results indicate they 10. Hofstede, G. and Bond, M.H. The Confucius
Information Systems Research 21, 4 (2010), 711–723.
36. Weeger, A. and Gewald, H. Factors influencing future
pay a lot of attention to their own ben- connection: From cultural roots to economic growth. employees’ decision making to participate in a BYOD
Organizational Dynamics 16, 4 (Spring 1988), 5–21.
efit and significantly neglect the risks 11. Hofstede, G., Hofstede, G.J., and Minkov, M. Cultures
program: Does risk matter? In Proceedings of the 22nd
European Conference on Information Systems (Tel
associated with using privately owned and Organizations: Software of the Mind. McGraw Hill, Aviv, Israel), 2014.
New York, 2010.
technology on the job. We tested our 12. Kim, D. and Olfman, L. Determinants of corporate Web
37. Weeger, A., Wang, X., and Gewald, H. IT consumerization:
BYOD-program acceptance and its impact on employer
hypothesis by asking them about their services adoption: A survey of companies in Korea. attractiveness. Journal of Computer Information
Communications of the AIS 29, 1 (2011), 1–24.
intention to use privately owned de- 13. Köffer, S., Anlauf, L., Ortbach, K., and Niehaves,
Systems 56, 1 (Fall 2016), 1–10.
38. Weiß, F. and Leimeister, J.M. Consumerization: IT
vices at work by enrolling in a corpo- B. The intensified blurring of boundaries between innovations from the consumer market as a challenge
work and private life through IT consumerization. for corporate IT. Business & Information Systems
rate BYOD program. The responses In Proceedings of the European Conference on Engineering 54, 6 (Dec. 2012), 363–366.
showed they expect to use their private Information Systems (Münster, Germany, 2015).
14. Köffer, S., Ortbach, K., Junglas, I., Niehaves, B., and Harris,
devices for work purposes. They per- J. Innovation through BYOD? Business & Information Heiko Gewald (heiko.gewald@hs-neu-ulm.de) is a
ceive major benefits from using their Systems Engineering 57, 6 (Dec. 2015), 1–13. research professor of information management and
15. Kraut, R. and Burke, M. Internet use and psychological director of the Center for Research on Service Sciences
own devices but pay little attention well-being: Effects of activity and audience. Commun. at Neu-Ulm University of Applied Sciences, Neu-Ulm,
to the risk such use may impose on ACM 58, 12 (Dec. 2015), 94–100. Germany.
16. Lee, M.-C. Factors influencing the adoption of
their employers. These findings have Internet banking: An integration of TAM and TPB Xuequn Wang (xuequnwang1600@gmail.com) is a
with perceived risk and perceived benefit. Electronic lecturer at Murdoch University School of Engineering and
important implications for corporate Commerce Research and Applications 8, 3 (May-June Information Technology, Perth, Australia.
IT managers who must deal with this 2009), 130–141.
Andy Weeger (Andy.Weeger@hs-neu-ulm.de) is a
17. Li, Y., Wang, X., Lin, X., and Hajli, M. Seeking and
new workforce (of cherry pickers). sharing health information on social media: A research assistant at Neu-Ulm University of Applied
Sciences, Neu-Ulm, Germany, and a Ph.D. candidate in the
However, a new generation—born net-valence model and cross-cultural comparison.
University of Bamberg, Bamberg, Germany.
Technological Forecasting and Social Change (July 20,
after 1998, or “Gen-Z”—will itself soon 2016); https://doi.org/10.1016/j.techfore.2016.07.021 Mahesh S. Raisinghani (mraisinghani@twu.edu) is
enter the workforce23 and expected to 18. Liljander, V. and Strandvik, T. Estimating zones of a professor of management information systems in
tolerance in perceived service quality and perceived the MBA (Executive Track) in the College of Business
behave differently—more concerned service value. International Journal of Service Administration at Texas Woman’s University, Denton, TX.
with risk and less on their own person- Industry Management 4, 2 (1993), 6–28.
19. Liu, Y., Yang, Y., and Li, H. A unified risk-benefit analysis Gerald Grant (Gerald.Grant@carleton.ca) is a director of
al benefit.27 This change in employees’ framework for investigating mobile payment adoption. the Centre for Information Technology, Organizations, and
mindset will provide fruitful ground In Proceedings of the 2012 International Conference People and associate professor of information systems
on Mobile Business. AIS Electronic Library, Atlanta, in the Sprott School of Business, Carleton University,
for further research. Further research GA, 2012; http://aisel.aisnet.org/icmb2012/20 Ottawa, Canada.
should also look toward longitudinal 20. Lyons, S. and Kuron, L. Generational differences in the
Otavio P. Sanchez (otavio.sanchez@fgv.br) is a professor
workplace: A review of the evidence and directions for
datasets, as it would be interesting to future research. Journal of Organizational Behavior in the Business Administration Ph.D. Program at Fundação
35, S1 (Feb. 2014), 139–157. Getulio Vargas, Sao Paulo, Brazil.
find out how perceptions change be-
21. Miller, K.W., Voas, J., and Hurlburt, G.F. BYOD: Security Siddhi Pittayachawan (siddhi.pittayachawan@rmit.edu.
fore entering the workplace and then and privacy considerations. IT Professional 14, 5 au) is a senior lecturer of information systems and supply
again after several months and years. (Sept.-Oct. 2012), 53–55. chain management in the School of Business IT and
22. Moore, G.C. and Benbasat, I. Development of an Logistics at RMIT University, Melbourne, Australia.
Maybe IT managers could see cherry instrument to measure the perceptions of adopting
an information technology innovation. Information
pickers evolve into socially minded Systems Research 2, 3 (1991), 192–222. Copyright held by the authors.
corporate citizens over time. 23. Nadler, J.T., Morr, R., and Naumann, S. Millennials, Publication rights licensed to ACM. $15.00

O C TO B E R 2 0 1 7 | VO L. 6 0 | N O. 1 0 | C OM M U N IC AT ION S OF T HE ACM 69
Copyright of Communications of the ACM is the property of Association for Computing
Machinery and its content may not be copied or emailed to multiple sites or posted to a
listserv without the copyright holder's express written permission. However, users may print,
download, or email articles for individual use.

Anda mungkin juga menyukai