تعداد نشریات | 161 |
تعداد شمارهها | 6,532 |
تعداد مقالات | 70,501 |
تعداد مشاهده مقاله | 124,104,470 |
تعداد دریافت فایل اصل مقاله | 97,210,357 |
Identifying and Prioritizing Factors Affecting the Adoption of BYOD in Organization Using a Fuzzy Approach | ||
Journal of Information Technology Management | ||
مقاله 4، دوره 7، شماره 4، دی 2015، صفحه 769-788 اصل مقاله (329.66 K) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22059/jitm.2015.55355 | ||
نویسندگان | ||
Khodakaram Salimifard* ؛ Abbas Abbasizad؛ Reza Siavashi | ||
Persian Gulf University | ||
چکیده | ||
In the wake of rapid growth in information technology, modern organizations seeking to increase the access and exchange data with minimal costs. BYOD is an emergent policy under which employees are allowed to use their personal devices such as smart phones, tablets and laptops to perform tasks. In this study, a model to prioritize the factors influencing the organizational adoption of BYOD is proposed. The model has two main criteria, each of which has ten subcriteria. Using ICT experts’ views and Improved Fuzzy Analytical Hierarchy Process technique, the model criteria were weighted. The two main factors, political factors identified as foremost important factor and behavioral intention to use IT were in the second priority. The model can be used as a basis for further research and successful implementation of BYOD by the organizations. | ||
کلیدواژهها | ||
BYOD؛ Technology Acceptance؛ technology adotion؛ Fuzzy Analytical Hierarchy Process | ||
عنوان مقاله [English] | ||
شناسایی و اولویت بندی عوامل موثر بر پذیرش BYOD در سازمان ها با رویکردی فازی | ||
نویسندگان [English] | ||
خداکرم سلیمی فرد؛ عباس عباسی زاد؛ رضا سیاوشی | ||
استادیار گروه مدیریت صنعتی، دانشکدۀ علوم انسانی، دانشگاه خلیج فارس، بوشهر، ایران | ||
چکیده [English] | ||
بهدنبال رشد روزافزون فناوری اطلاعات، سازمانها در پی افزایش قابلیت دسترسی و مبادلۀ دادهها با کمترین هزینهاند. هدف این پژوهش شناسایی و اولویتبندی عوامل مؤثر بر پذیرش BYOD است. BYOD سیاستی است که به کارکنان اجازه میدهد از دستگاههای شخصی مانند گوشی هوشمند، تبلت و لپتاپ برای وظایف سازمانی استفاده کنند. در پژوهش پیش رو بهکمک دیدگاه خبرگان و بازخوانی پژوهشهای پیشین، مدلی نوین برای سنجش اهمیت عاملهای اثرگذار در پیادهسازی BYOD پیشنهاد شد. ساختار مدل پیشنهادشده از دو معیار اصلی تشکیل شده است که هر یک ده زیرمعیار را دربرمیگیرد. برای یافتن وزن هر عامل اثرگذار، روش تحلیل سلسلهمراتبی فازی اصلاحشده بهکار گرفته شد. با بهرهمندی از پرسشنامۀ ویژۀ این روش، دیدگاه خبرگان گردآوری شد و به هر یک از معیارهای مدل وزنی اختصاص یافت. یافتههای پژوهش نشان میدهد عوامل سیاستی در رتبۀ نخست اهمیت قرار دارد و عوامل تمایل رفتاری در استفاده از فناوری در اولویت بعدی جای گرفته است. مدل پیشنهادی این پژوهش، نخستین مدل ارائهشده برای سنجش عاملهای اثرگذار در پیادهسازی BYOD است و میتوان آن را در پیادهسازی موفق BYOD بهکار میرود. | ||
کلیدواژهها [English] | ||
پذیرش فناوری, پیادهسازی فناوری, تحلیل سلسلهمراتبی فازی, BYOD | ||
مراجع | ||
Akman, I. & Mishra, A. (2015). Sector diversity in Green Information Technology practices: Technology Acceptance Model perspective. Computers in Human Behavior, 49: 477-486.
Alirezaee, A., Jabarzadeh, Y., Haji Akhondi, E. & Rahmani Yshanluee, H. (2013). Teleworking Technology Adoption in Organizations: Explaining the Role of Social Influence, Motivation and Facilitating Conditions. Quarterly Journal of Information Technology Management, 5(3): 105-122. (in Persian)
Amoako-Gyampah, K. & Salam, A.F. (2004). An extension of the technology acceptance model in an ERP implementation environment. Information & Management, 41(6): 731–745.
Anderson, N. (2013). Cisco Systems, Inc. (Cisco Bring Your Own Device) Retrieved 12/11/2013, from Cisco Systems, Inc website: http://www.cisco.com.
Asgharpour, M. J. (2009). Multi criteria decision making. Tehran, University of Tehran Press (UTP). (in Persian)
Astani, M., Ready, K. & Tessema, M. (2013). BYOD issues and strategies in organizations. Issues in Information Systems, 14(2): 195-201.
Azar, A. & Faraji, H. (2008). Fuzzy management science. Tehran: Ketabe mehraban nashr institution. (in Persian)
Barnes, S. (2013). Orb Data. Retrieved 1/2/2014, from Orb Data's Blog Site: http://www.blog.orb-data.com.
Berry, M. (2014). Sample BYOD policy template. Retrieved 1/2/ 2014, from http://www.itmanagerdaily.com/
Bradley, J., Luacks, J., Macaulay, J., Medcalf, R. & Buckalew, L. (2012). BYOD: A Global Perspective. Cisco IBSG.
Chen, J. K., & Chen, I. S. (2007). Fuzzy MCDM construct vision developmental indices of tech R&D institutions in Taiwan. Business Renaissance Quarterly, 2(3), 23.
Dedeche, A., Liu, F., Le, M. & Lajami, S. (2013). Emergent BYOD security challenges and mitigation strategy. working paper. University of Melbourne.
Dell Inc. (2012). Mobile and BYOD Solutions for Enterprise Mobility. Retrieved 1/2/2014, from www.Dell.com.
FUJITSU Technology Solutions GmbH. (2013). BYOD Whitepaper. Retrieved 2013, from www.fujitsu.com/fts.
Gagnon, M..P., Ghandour, E., Talla, P.K., Simonyan, D., Godin, G., Labrecque, M., Rousseau, M. (2013). Electronic health record acceptance by physicians: Testing an integrated theoretical model. Journal of Biomedical Informatics, 48: 17-27.
Hashemian, M., Isaai, M.T., Mikaili, F. & Tabatabaee, M. (2012). Effective Factors in Adoption of Electronic Banking by Customers (Saman Bank). Quartely Journal of Information Technology Management, 4(11): 155-174. (in Persian) Hensema, M. (2013). Acceptance of BYOD among Employees at Small to Medium-sized Organizations. 19th Twente Student Conference on IT, Enschede, The Netherlands.
Hu, A.H., Hsu, C.W., Kuo, T.C. & Wu, W.C. (2009). Risk evaluation of green components to hazardous substance using FMEA and FAHP. Expert Systems with Applications, 36(3): 7142-7147.
Ibrahim, H. (2013). 24th DAAAM International Symposium on Intelligent Manufacturing and Automation. Proceedings of a meeting held 23-26 October 2013, Zadar, Croatia.
IDG Enterprise (2014). Consumerization of IT in the Enterprise. IDG Enterprise: an IDG communications company.
Intel Corporation. (2012). BYOD Blueprint, Retrieved 2013, from www.k12blue print.com.
Legris, P., Ingham, J. & Collerette, P. (2003). Why do people use information technology?A critical review of the technology acceptance model. Information & Management, 40(3): 191–204.
Momeni, M. (2010). New Topics In Operations Research. Tehran: M. momeni. (in Persian) Sánchez-Prieto, J., Olmos-Migueláñez, S. & García-Peña, F. (2015). Informal tools in formal contexts: Development of a model to assess the acceptance of mobile technologies among teachers. Computers in Human Behavior, 55(Part A):519-528.
Santhosh Reddy, A. (2012). Perspectives:Making BYOD Work for Your Organization. Retrieved 12 6, 2013, from Cognizant corporation website: www.cognizant.com.
Schulze, H. (2014). BYOD and mobile security. information security community on LinkedIn.
Shams Aliee, F. S., Davoodi, M. R. & Badi, K. (2010). An Approach towards Enterprise Architecture Quality Attribute Assessment based on Fuzzy AHP. Quarterly Journal of Information technology management, 2(4): 78-98. (in Persian) Shoaee, F.S. & Olumi, T. (2007). Investigating the affecting factors in information technology acceptance of librarians in technical faculties of Tehran’s public universities. Journal of Library and Information, 10(3): 9-34. (in Persian)
Son, H., Park, Y., Kim, C. & Chou, J.S. (2012). Toward an understanding of construction professionals' acceptance of mobile computing devices in South Korea: An extension of the technology acceptance model. Automation in Construction, 28: 82-90.
Tajfar, A.H., Mimand, M.M., R. Soltani, F. & R. Soltani, P. (2014). Ranking the barriers of implementing Information Security Management System and Investigation of readiness rate of exploration management. Quarterly Journal of Information technology management. 6(4): 551-556. (in Persian)
Un Jan, A. & Contreras, V. (2011). Technology acceptance model for the use of information technology in universities. Computers in Human Behavior, 27(2): 845–851.
Vignesh, U. & Asha, S. (2015). Modifying security policies towards BYOD. 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15) Procedia computer science. pp. 511 – 516.
VM ware (2013). The BYOD Opportunity. Retrieved 12/6/2013, from VMware, Inc web site: www.vmware.com.
Zanjirchi, S. M. (2011). Fuzzy Analatycal Hierarchy Process. Tehran: Sane’ee Press. (in Persian)
| ||
آمار تعداد مشاهده مقاله: 2,830 تعداد دریافت فایل اصل مقاله: 1,659 |