Empowerment and BYOx: Towards Improved IS Security Compliance

Maximilian von Welck, Manuel Trenz, Tina Blegind Jensen, Daniel Veit

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review


Non-compliant employees continue to pose a serious threat to information systems security. Most attempts to increase compliant behavior rely on measures that reduce employees’ latitude. However, recent studies suggest that this indeed eventuates in less compliance due to adverse behaviors of frustrated or stressed employees. In this study, we propose a novel approach where increased latitude –by means of permitting BYOx–increases the intention to comply. In order to do so, we first construct a theoretical model that links BYOx with empowerment and abuse intention. Subsequently, we run a feasibility study to assess our experimental design and the general feasibility of our propositions. The results suggest that psychological empowerment can indeed be manipulated with vignettes, and that changes in empowerment influence individuals’ abuse intentions. Based on such initial promising results, we outline how this novel approach to improve IS security compliance can be developed and investigated further.
Original languageEnglish
Title of host publicationICIS 2017 Proceedings
Number of pages11
Place of PublicationAtlanta, GA
PublisherAssociation for Information Systems. AIS Electronic Library (AISeL)
Publication date2017
Publication statusPublished - 2017
Event38th International Conference on Information Systems: Transforming Society with Digital Innovation, ICIS 2017: Transforming Society with Digital Innovation - Coex Convention Center , Seoul, Korea, Republic of
Duration: 10 Dec 201713 Dec 2017
Conference number: 38


Conference38th International Conference on Information Systems: Transforming Society with Digital Innovation, ICIS 2017
LocationCoex Convention Center
Country/TerritoryKorea, Republic of
Internet address
SeriesProceedings of the International Conference on Information Systems


  • Information systems security
  • Compliance
  • Empowerment
  • IT consumerization
  • Shadow IT
  • Bring your own x (BYOx)
  • BYOD
  • BYOS
  • Factorial survey

Cite this