Prohibiting Bring Your Own Device (BYOD) in Companies: Effectiveness and Efficiency vs. Satisfaction

  • Andreas AuingerEmail author
  • Werner Wetzlinger
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11589)


Smartphones are the most relevant digital companions that we employ on a daily basis and increasingly used by employees to perform business tasks. However, some companies do not allow the use of personal devices to access their IT infrastructure (BYOD) due to security concerns or for other organizational reasons; thus these employees have to use a smartphone provided by the company. Hence, employees may be confronted with unfamiliar operating systems or applications and which may influence their satisfaction and performance. We analyzed these effects by conducting a usability study that measured efficiency, effectiveness, and satisfaction of iOS and Android users when required to use a company provided device (CPD) in the form of a Nokia Lumia Windows Phone compared to their own device when executing the same tasks on their own device. The study used a within-subjects design and three measurement points, each of which consisted of multiple typical business tasks. The study used a within-subjects design and three measurement points each, which consisted of multiple typical business tasks. Results show that users become accustomed to the Company Provides Devices fast, since efficiency and effectiveness improve rapidly. The satisfaction level also improves, but remains below the personal devices.


Bring Your Own Device (BYOD) IT consumerization IT adoption Mobile devices Usability evaluation 



We would like to thank Eva-Maria Gaumberger from Engel Austria for her supportive work during the evaluation phase in the course of her master thesis in Digital Business Management.


  1. 1.
    Gartner, I.: Gartner Says Worldwide Sales of Smartphones Recorded First Ever Decline During the Fourth Quarter of 2017.
  2. 2.
    Schadler, T., McCarthy, J.C.: Mobile Is the New Face of Engagement – CIOs Must Plan Now for New Systems of Engagement.
  3. 3.
  4. 4.
    Nah, F.F.-H., Siau, K., Sheng, H.: The value of mobile applications. Commun. ACM 48, 85–90 (2005)CrossRefGoogle Scholar
  5. 5.
    Vuolle, M.: Intangible benefits of mobile business services. IJLIC 8, 50 (2011)CrossRefGoogle Scholar
  6. 6.
    York, J., Pendharkar, P.C.: Human–computer interaction issues for mobile computing in a variable work context. Int. J. Hum Comput Stud. 60, 771–797 (2004)CrossRefGoogle Scholar
  7. 7.
  8. 8.
    Pascoe, J., Ryan, N., Morse, D.: Using while moving: HCI issues in fieldwork environments. ACM Trans. Comput.-Hum. Interact. 7, 417–437 (2000)CrossRefGoogle Scholar
  9. 9.
    Streefkerk, J.W., van Esch-Bussemakers, M.P., Neerincx, M.A.: Field evaluation of a mobile location-based notification system for police officers. In: ter Hofte, G.H., Mulder, I., de Ruyter, B.E.R. (eds.) 10th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 101–108. Amsterdam, Netherlands (2008)Google Scholar
  10. 10.
    Vuolle, M.: Productivity impacts of mobile office service. IJSTM 14, 326 (2010)CrossRefGoogle Scholar
  11. 11.
  12. 12.
    Disterer, G., Kleiner, C.: BYOD Bring Your Own Device. Procedia Technol. 9, 43–53 (2013)CrossRefGoogle Scholar
  13. 13.
    McConnell, J.: Tracking the Trends in Bringing Our Own Devices to Work.
  14. 14.
    Willis, D.A.: Bring Your Own Device: The Facts and the Future.
  15. 15.
  16. 16.
    Bradley, J., Loucks, J., Macaulay, J., Medcalf, R., Buckalew, L.: BYOD: A Global PerspectiveGoogle Scholar
  17. 17.
    Köffer, S., Anlauf, L., Ortbach, K., Niehaves, B.: The intensified blurring of boundaries between work and private life though IT consumerisation. In: European Conference on Information Systems, Paper 108, Münster, Germany (2015)Google Scholar
  18. 18.
    Ostermann, U., Wiewiorra, L.: Bring it on(e)! personal preferences and traits as influencing factors to participate in BYOD programs. In: Twenty-Fourth European Conference on Information Systems, Research Paper 47 (2016)Google Scholar
  19. 19.
    Junglas, I., Goel, L., Ives, B., Harris, J.G.: Consumer IT at work: development and test of an IT empowerment model. In: Proceedings of the International Conference on Information Systems, Auckland, New Zealand (2014)Google Scholar
  20. 20.
    Thomson, G.: BYOD: enabling the chaos. Netw. Secur. 2012, 5–8 (2012)CrossRefGoogle Scholar
  21. 21.
    Olalere, M., Abdullah, M.T., Mahmod, R., Abdullah, A.: A review of Bring Your Own Device on security issues. SAGE Open 5, 1–11 (2015)CrossRefGoogle Scholar
  22. 22.
    Wang, Y., Wei, J., Vangury, K.: Bring your own device security issues and challenges. In: Proceedings of the 11th Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, pp. 80–85 (2014)Google Scholar
  23. 23.
    Eslahi, M., Naseri, M.V., Hashim, H., Tahir, N.M., Saad, E.H.M.: BYOD: current state and security challenges. In: Proceedings of the Symposium on Computer Applications & Industrial Electronics (ISCAIE), Penang, Malaysia, pp. 189–192 (2014)Google Scholar
  24. 24.
    Gajar, P.K., Ghosh, A., Rai, S.: Bring your own device (BYOD): security risks and mitigating strategies. J. Glob. Res. Comput. Sci. 4, 62–70 (2013)Google Scholar
  25. 25.
    Harris, J., Ives, B., Junglas, I.: IT consumerization: when gadgets turn into enterprise IT tools. MIS Q. Executive 11, 99–112 (2012)Google Scholar
  26. 26.
    Jaramillo, D., Katz, N., Bodin, B., Tworek, W., Smart, R., Cook, T.: Cooperative solutions for Bring Your Own Device (BYOD). IBM J. Res. Dev. 57, 5:1–5:11 (2013)CrossRefGoogle Scholar
  27. 27.
    Armando, A., Costa, G., Verderame, L., Merlo, A.: Securing the “Bring Your Own Device” Paradigm. Computer 47, 48–56 (2014)CrossRefGoogle Scholar
  28. 28.
    Zahadat, N., Blessner, P., Blackburn, T., Olson, B.A.: BYOD security engineering: a framework and its analysis. Comput. Secur. 55, 81–99 (2015)CrossRefGoogle Scholar
  29. 29.
    Forrester Research: The Expanding Role of Mobility in the WorkplaceGoogle Scholar
  30. 30.
    Miller, K.W., Voas, J., Hurlburt, G.F.: BYOD: security and privacy considerations. IT Prof. 14, 53–55 (2012)CrossRefGoogle Scholar
  31. 31.
    Miller, J., Katz, I., Mack, R., Marks, L., Muller, M.J., McClard, A.: Validating an extension to participatory heuristic evaluation. In: Conference Companion, pp. 115–116Google Scholar
  32. 32.
    PAC: Mobile Device & Application Management in Germany, France, the UK, and Switzerland.
  33. 33.
    Gnewuch, U., Haake, P., Mueller, B., Mädche, A.: The effect of learning on the effective use of enterprise systems. In: Proceedings of the International Conference on Information Systems, Dublin, Ireland (2016)Google Scholar
  34. 34.
    de Kok, A., Lubbers, Y., Helms, R.W.: Mobility and security in the new way of working: employee satisfaction in a Choose Your Own Device (CYOD) environment. In: Proceedings of the 9th Mediterranean Conference on Information Systems (MCIS), Paper 31, Samos, Greece (2015)Google Scholar
  35. 35.
    Niehaves, B., Köffer, S., Ortbach, K.: IT consumerization – a theory and practice review. In: Proceedings of the 18th Americas Conference on Information Systems (AMCIS), Paper 18, Seattle, Washington, USA (2012)Google Scholar
  36. 36.
    Pillet, J.-C., Pigni, F., Vitari, C.: Learning about ambiguous technologies. Conceptualization and research agenda. In: 25th European Conference on Information Systems, Guimaraes, Portugal (2017)Google Scholar
  37. 37.
    Niehaves, B., Köffer, S., Ortbach, K.: The effect of private IT use on work performance - towards an IT consumerization theory. In: Proceedings of the 11th International Conference on Wirtschaftsinformatik, Leipzig, Germany, pp. 39–53 (2013)Google Scholar
  38. 38.
    Köffer, S., Ortbach, K.C., Niehaves, B.: Exploring the relationship between IT consumerization and job performance: a theoretical framework for future research. Commun. Assoc. Inf. Syst. 35, Article 14 (2014)Google Scholar
  39. 39.
    Ostermann, U., Wiewiorra, L., Franzmann, D.: One of two or two for one? - Analyzing employees’ decisions to dual use devices. In: Thirty Eighth International Conference on Information Systems (2017)Google Scholar
  40. 40.
    Ferreira, D., Dey, A.K., Kostakos, V.: Understanding human-smartphone concerns: a study of battery life. In: Lyons, K., Hightower, J., Huang, E.M. (eds.) Pervasive 2011. LNCS, vol. 6696, pp. 19–33. Springer, Heidelberg (2011). Scholar
  41. 41.
    Alghamdi, E., Yunus, F., Househ, M.S.: The impact of mobile phone screen size on user comprehension of health information. In: Mantas, J., Hasman, A. (eds.) Informatics, Management and Technology in Healthcare, pp. 154–156. IOS Press, Amsterdam (2013). Athens, Greece, 5–7 July 2013Google Scholar
  42. 42.
    Alghamdi, E., Yunus, F., Househ, M.S.: Revisiting the impact of mobile phone screen size on user comprehension of health information. In: Mantas, J., Househ, M.S., Hasman, A. (eds.) Integrating Information Technology and Management for Quality of Care, pp. 217–220. IOS Press, Amsterdam (2014)Google Scholar
  43. 43.
    Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Rukzio, E. (ed.) 11th International Conference on Mobile and Ubiquitous Multimedia, Ulm, Germany, pp. 1–10 (2012)Google Scholar
  44. 44.
    Hoggan, E., Brewster, S.A., Johnston, J.: Investigating the effectiveness of tactile feedback for mobile touchscreens. In: Czerwinski, M., Lund, A., Tan, D. (eds.) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Florence, Italy, pp. 1573–1582Google Scholar
  45. 45.
    Page, T.: Usability of text input interfaces in smartphones. J. Des. Res. 11, 39–56 (2013)Google Scholar
  46. 46.
    Nakagawa, T., Uwano, H.: Usability differential in positions of software keyboard on smartphone. In: 2012 IEEE 1st Global Conference on Consumer Electronics (GCCE), Tokyo, Japan, pp. 304–308 (2012)Google Scholar
  47. 47.
    Keijzers, J., den Ouden, E., Lu, Y.: Usability benchmark study of commercially available smart phones: cell phone type platform, PDA type platform and PC type platform. In: ter Hofte, H., Mulder, I. (eds.) Proceedings of the 10th International Conference on Human Computer Interaction with Mobile Devices and Services, Amsterdam, Netherlands, pp. 265–272 (2008)Google Scholar
  48. 48.
    Sheehan, B., Lee, Y., Rodriguez, M., Tiase, V., Schnall, R.: A comparison of usability factors of four mobile devices for accessing healthcare information by adolescents. Appl. Clin. Inform. 3, 356–366 (2012)CrossRefGoogle Scholar
  49. 49.
    Alshehri, F., Freeman, M.: User experience of mobile devices: a three layer method of evaluation. In: Proceedings of the 25th Australasian Conference on Information Systems, Auckland, New Zealand, pp. 1–10 (2014)Google Scholar
  50. 50.
    Chien, C.-F., Lin, K.-Y., Yu, A.P.-I.: User-experience of tablet operating system: an experimental investigation of Windows 8, iOS 6, and Android 4.2. Comput. Ind. Eng. 73, 75–84 (2014)CrossRefGoogle Scholar
  51. 51.
    Galletta, D.F., Dunn, B.K.: Assessing smartphone ease of use and learning from the perspective of novice and expert users: development and illustration of mobile benchmark tasks. AIS Trans. Hum.-Comput. Interact. 6, 74–91 (2014)CrossRefGoogle Scholar
  52. 52.
    Kiljander, H.: Evolution and usability of mobile phone interaction styles. Helsinki University of Technology, Espoo (2004)Google Scholar
  53. 53.
    ISO: Ergonomics of Human–System Interaction - Part 210: Human-Centred Design for Interactive Systems. ISO, Geneva (2010)Google Scholar
  54. 54.
    Lewis, J.R.: Psychometric evaluation of the PSSUQ using data from five years of usability studies. Int. J. Hum.-Comput. Interact. 14, 463–488 (2002)CrossRefGoogle Scholar
  55. 55.
    Sauro, J., Lewis, J.R.: Correlations among prototypical usability metrics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Boston, MA, USA, pp. 1609–1618 (2009)Google Scholar
  56. 56.
    Sauro, J., Lewis, J.R.: Quantifying the User Experience. Practical Statistics for User Research. Elsevier/Morgan Kaufmann, Amsterdam (2012)Google Scholar
  57. 57.
    Leger, P.-M., Riedl, R., Vom Brocke, J.: Emotions and ERP information sourcing. The moderating role of expertise. Industr Manag. Data Syst. 114, 456–471 (2014)CrossRefGoogle Scholar
  58. 58.
    ISO/IEC: Software engineering – Software product Quality Requirements and Evaluation (SQuaRE) – Common Industry Format (CIF) for usability test reports (2006)Google Scholar
  59. 59.
    Lewis, J.R.: IBM computer usability satisfaction questionnaires: Psychometric evaluation and instructions for use. Int. J. Hum.-Comput. Interact. 7, 57–78 (1995)CrossRefGoogle Scholar
  60. 60.
    Nielsen, J.: Quantitative Studies: How Many Users to Test?
  61. 61.
    Cozby, P.C.: Methods in behavioral research. McGraw-Hill Higher Education, Boston (2009)Google Scholar
  62. 62.
    Heiman, G.W.: Research Methods in Psychology. Houghton Mifflin Co., Boston (2002)Google Scholar
  63. 63.
    Giddens, L., Tripp, J.: It’s my tool, i know how to use it: a theory of the impact of IT consumerization on device competence and job satisfaction. In: Proceedings of the 20th Americas Conference on Information Systems, Savannah, Georgia, USA (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Digital Business, School of ManagementUniversity of Applied Sciences Upper AustriaSteyrAustria

Personalised recommendations