Académique Documents
Professionnel Documents
Culture Documents
Article information:
To cite this document:
Aurelie Leclercq-Vandelannoitte , (2015),"Leaving employees to their own devices: new practices in the workplace", Journal
of Business Strategy, Vol. 36 Iss 5 pp. 18 - 24
Permanent link to this document:
http://dx.doi.org/10.1108/JBS-08-2014-0100
Access to this document was granted through an Emerald subscription provided by emerald-srm:434496 []
For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service
information about how to choose which publication to write for and submission guidelines are available for all. Please visit
www.emeraldinsight.com/authors for more information.
Aurelie Leclercq-Vandelannoitte
Introduction
In the past, organizations, and their information technology (IT) departments in particular,
chose which IT and applications their workers would use, as well as why, how and when
they could use them. In modern organizations, workers instead decide which IT and
applications to use, as well as why, how, and when. That is, in just a few years, traditional
IT equipment and adoption logics have been completely reversed.
Rather than originating in business markets, then becoming dominated over time by higher
volume consumer usage, such new IT emerged first on the consumer market and then
started entering the organizational sphere. This IT consumerization, defined as the
adoption of consumer applications, tools and devices in the workplace (Moschella et al.,
2004; Gens et al., 2011, Vile, 2011; Ortbach et al., 2013), constitutes perhaps the most
significant trend affecting IT in the next 10 years (Gartner, 2012). It parallels some
companies deployments of bring your own device (BYOD) programs, which allow or
encourage employees to use their own personal devices to complete work-related
activities. However, and despite the importance of this growing phenomenon, very few
companies address the implications of IT consumerization and BYOD. Rather, they tend to
develop overly simplistic approaches to BYOD, such as banning or avoiding the trend out
of fear of security threats (DArcy, 2011). Yet, BYOD is neither a fashion nor a new trend; it
is an objective fact that affects organizations and obliges them to rethink some core
processes, models and practices. Thus, it becomes urgent for companies not only to
understand this growing phenomenon but also to anticipate and support it with the most
appropriate strategies, rather than suffering less-than-optimal outcomes due to IT usages
that they have not chosen and cannot control.
The apparent lack of interest among managers and the research gaps instead have left
many questions unanswered (Crowston et al., 2010; Niehaves et al., 2012):
Q1. What are the consequences of renewed and reversed individual IT adoption logics
for organizations?
Q2. How can organizations manage technologies that they have not procured or
provisioned?
Q3. How should IT departments react to potential threats to their information systems
(IS) and networks?
Q4. Should they continue to strive to control all aspects of the companys IS (e.g. data,
hardware, software)?
Q5. To what extent should companies encourage employees to bring their own IT to
work, versus providing employees with professional devices?
VOL. 36 NO. 5 2015, pp. 18-24, Emerald Group Publishing Limited, ISSN 0275-6668
DOI 10.1108/JBS-08-2014-0100
Q6. What kind of innovations might organizations foster? And ultimately, should they
even bother?
We consider the need to understand the business challenges and implications of reversed
adoption logics including the risks and opportunities they present for organizations
pressing. This article offers an overview of this growing but under-researched
phenomenon. Our goal in turn is to move beyond the classic discourse that appears in
practitioner studies about the security threats of BYOD and provide useful insights to both
managers and academic researchers. Accordingly, we undertake an in-depth analysis of
existing literature, from which we identify changes introduced in organizations by reversed
adoption logics. These findings help shed light on the stakes involved in BYOD and IT
consumerization, as well as the changes they imply for organizations. Our ultimate goal
thus is to help organizations understand how to manage this growing trend and address its
implications.
To a boom-up
diusion of IT at the
individual level
PAGE 19
They generally regard their personal tools as more powerful, more useful, more capable,
faster and more fun than the enterprise IT provided by their companies (Harris et al., 2011).
Because of their conviction that their personal devices and applications make them more
effective in carrying out their missions, they expect to be able to use them at work too, to
manage their jobs and connect freely with enterprise IS. These trends and beliefs explain
why more workers now use their own technologies at work, regardless of official company
policies and with or without their managers approval (Harris et al., 2011).
Yet, managers attention to this growing trend appears limited. For example, IT
consumerization mainly has catalyzed concerns about IS security and reliability (DArcy,
2011), as well as employees performance if they get distracted from their work missions by
the use of more fun personal technologies. Accordingly, most studies of BYOD in both
professional and academic outlets adopt IT security and cost-efficiency perspectives. First,
a successful BYOD strategy should incorporate a secure infrastructure (e.g. wireless local
area networks that link all devices to the companys IS; security identity services; data
infrastructure, training, and procedures). Second, managers acknowledge that a reversed
adoption logic could reduce organizational expenditures on IT infrastructure, though the
hidden costs of technology standardization and internal organizational compatibility also
demand consideration (Kaneshige, 2012).
Even in companies that have started to recognize the growing use of consumer IT at work
(Brousell, 2012), many managers tend to regard each initiative as an insular occurrence,
unrelated to other examples (Harris et al., 2011). As a result, few organizations explicitly
address or manage the expanded blending between personal and business uses of
technological devices and applications. To create a cohesive strategy for IT
consumerization, they must first understand the nature and implications of the vast
changes this trend promises for organizations and their IT strategies.
a director can finish a report or respond to e-mails while in a doctors waiting room;
a CEO might use her iPad to present up-to-the-minute results to the board; and
a nurse could use his camera phone to relay images of patient wounds and thereby
enhance patient care.
The changes induced by IT consumerization and BYOD also go deeper, in that they prompt
organizations to become more open, fluid and flexible by creating a new corporate space,
characterized by greater digital freedom. For example, new forms of mobility likely emerge,
because workers can access any information from any location with any chosen device.
With more options than ever before, they work with the device and format that best suits
them, whether in the office, from home or on the move (Choo, 2011). Because they are free
of the rigid methods that IT departments and management might have imposed previously,
workers can decide how to work, when and where it is most convenient for them. For
example, cloud-based e-mail enables workers to access their electronic mailboxes from a
smartphone, tablet, or other device, nearly regardless of time, location, and software, which
means they likely can obtain relevant information, communicate, and work anywhere and
anytime (Choo, 2011). Workers also achieve greater flexibility and empowerment when they
gain greater control over how they can manage the increasing demands of their
professional and personal lives.
In renewed enterprises in motion (Choo, 2011), the static workplace becomes
dynamic. Companies that welcome and support such practices often appeal more to
current and potential employees. To attract the most elite, technologically savvy
employees, companies must give them choice and flexibility in how they work, including
in the devices they use, and ensure comparable experiences, regardless of how they
access the companys IS. Such conditions might enhance organizational productivity
and motivation, which means that IT consumerization and BYOD require strategic
consideration by organizations.
PAGE 21
Specifically, to address growing demands by employees for access to corporate data on the road,
Volvos IT department created a customized service, through which employees may install
corporate applications (e.g. office software) on their personal mobile devices. Employees who
choose to do so can access e-mails, electronic diaries and contact information from a distance;
more than 12,000 devices are thus linked. As an innovation manager in Volvos IT department
explains, There is a real willingness from our employees to centralize their personal and
professional usages on their own device. Yet, this usage remains voluntary; rather than any IT
usage policy being imposed, employees choose whether to use their own device or not to access
corporate data and IS.
Although Volvo acknowledges the importance of corporate data security and network
protection (e.g. if a worker loses a personal device to theft or misplacement, Volvo IT can
remotely delete all corporate data), security is not the top priority. The most important focus
is open innovation, the name Volvo gave its new program. Through open innovation, the
company can identify priorities and involve multiple employees in generating and diffusing
innovative ideas. Numerous improvements, suggested spontaneously by workers, already
have been implemented. In turn, Volvo IT already has decided to expand the service with new
applications to help meet other demands from workers (e.g. booking a taxi, completing
expense accounts, planning).
As the innovation manager further explains, Participative innovation is at the heart of our culture,
and our collaborators are very engaged in idea sharing to help us develop our internal and
external services and strategies. Our approach is very pragmatic: We decided to provide our
workers with access to corporate applications that seemed essential, like the emails and agendas
and then our goal has been to make the service evolve, according to the expectations of the
employees. I think that managing BYOD as a whole from the beginning is not a good tactic; its far
more important to study IT usages closely and anticipate the needs of the future. The result is a
renewed, more strategic role for the IT department. Furthermore, the company can now sell itself
as a highly attractive workplace to prospective employees.
Source: Volvo (2012)
their own devices at work at all. A 2011 study, thus, revealed that 80 per cent of IT
professionals were opposed to the use of consumer technologies in the workplace (Harris
et al., 2011). Yet, 40 per cent of chief information officers also believe that companies will
stop providing employees with physical desktops within five years (Cisco, 2012). Thus, IT
managers face a difficult dilemma between their perceptions of their classic missions, roles
and duties and what they recognize as the ineluctable evolution of the IT environment.
Examples of companies that have successfully tackled this trend and the associated dilemma
are instructive. They offer a resolution, achieved by helping IT departments rethink their mission
in the company (Vignette 1). The idea is to free IT departments from some of their traditional
roles and duties (e.g. provision of and control over IT), leaving them with more time to pursue
innovative, strategic projects. In this view, BYOD and IT consumerization represent unexpected
opportunities for IT departments and information officers to turn their attention to long-term IT
strategies and take a critical, strategic role in their organizations.
Conclusion
Rather than simple fads or trends, IT consumerization and BYOD exert notable impacts on
organizations (Table I).
From . . .
To
Usage
Connectivity
Deployment logic
Limited
Top-down
Organizational initiative
Provision and control of IT
Sovereign territory of enterprise IT
IT department role
Organization
Keywords:
Information technology,
Adoption logics,
BYOD,
CIO,
Consumerization,
Individualization
Short term
Fixity in static workplaces
To address the lack of research on this central topic for organizations (Crowston et al.,
2010; Niehaves et al., 2012), this article analyzes how companies might embrace BYOD, a
decision that will affect not only the technologies used within the company but also the IT
strategies, innovation processes, creativity and well-being of its employees. If successfully
embedded into the strategy of the organization, IT consumerization and BYOD can deliver
tangible business benefits, including efficiency, productivity, cost savings and process
improvements. Companies that successfully redefine their perspective on mobility and
BYOD and IT strategies, thereby adapting to these broader changes, will gain critical
competitive advantages. Not least of all, it will help them attract the best employees to join
their workforce.
References
Baskerville, R. (2011), Individual information systems as a research arena, European Journal of
Information Systems, Vol. 20 No. 3, pp. 251-254.
Brousell, L. (2012), Exclusive research shows CIOs embrace consumerization of IT, CIO.com,
available at: www.cio.com/article/694609/Exclusive_Research_Shows_CIOs_Embrace_
Consumerization_of_IT (accessed 26 September 2012).
Choo, N. (2011), The new mobilitythe enterprise in motion, Network World Asia, Vol. 8 No. 4, p. 42.
Cisco (2012), BYOD: Realising the business benefits, White Paper, Intrinsic Technology.
Crowston, K., Fitzgerald, B., Gloor, P., Schultze, U. and Yoo, Y. (2010), Shifting boundaries: how
should IS researchers study non-organizational uses of ICT?, ICIS 2010 Proceedings, St Louis, MO.
DArcy, P. (2011), CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing, Dell
CIO Insight Series.
Gartner (2012), Gartner says the personal cloud will replace the personal computer as the center of
users digital lives by 2014, available at: www.gartner.com/it/page.jsp?id1947315 (accessed 11
September 2012).
Gens, F., Levitas, D. and Segal, R. (2011), Consumerization of IT Study: Closing the Consumerization
Gap, IDC, Framingham, MA.
Harris, J.G., Ives, B. and Junglas, I. (2011), The genie is out of the bottle: managing the infiltration of
consumer IT into the workforce, Accenture Institute for High Performance, available at: www.
accenture.com/SiteCollectionDocuments/PDF/Accenture-Managing-the-infiltration-of-Consumer-ITinto-the-workforce.pdf (accessed 5 October 2012).
Kaneshige, T. (2012), BYOD: if you think youre saving money, think again, CIO.com, available at:
www.cio.com/article/703511/BYOD_If_You_Think_You_re_Saving_Money_Think_Again (accessed 17
May 2013).
Moschella, D., Neal, D., Opperman, P. and Taylor, J. (2004), The Consumerization of Information
Technology, CSC, El Segundo, CA.
Murdoch, M., Harris, J. and Devore, G. (2010), Can enterprise IT survive the meteor of consumer
technology?, Accenture Institute for High Performance, available at: www.accenture.com/
PAGE 23
SiteCollectionDocuments/PDF/Accenture_Can_Enterprise_IT_Survive_the_Meteor.pdf (accessed 7
December 2013).
Niehaves, B., Ortbach, K. and Koeffer, S. (2012), IT consumerization a theory and practice review,
Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, WA.
Ortbach, K., Bode, M. and Niehaves, B. (2013), What influences technological individualization? An
analysis of antecedents to IT consumerization behavior, Proceedings of the Nineteenth Americas
Conference on Information Systems, Chicago, IL.
Vile, D. (2011), The Consumerisation of IT, Freeform Dynamics, New Milton, Hampshire.
Volvo (2012), Gestion du BYOD, lexemple de Volvo IT, available at: www.volvoit.com/volvoit/france/
fr-fr/_layouts/CWP.Internet.VolvoCom/NewsItem.aspx?News.ItemId123017&News.Languagefr-fr
Corresponding author
For instructions on how to order reprints of this article, please visit our website:
www.emeraldgrouppublishing.com/licensing/reprints.htm
Or contact us for further details: permissions@emeraldinsight.com