IT Consumerization and Compliant Use: Do Policies Matter?

Nele Lüker, Till J. Winkler, Thomas Kude

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review


    Facing the ongoing IT consumerization trend, organizations take different strategies that permit or regulate the acquisition and use of consumer-originated IT devices at the workplace. This paper investigates the effect of two types of IT consumerization strategies (‘laissez-faire’ and ‘middle ground’) on the policy-related attitudes of employees and their level of policy-compliant device usage (voice, email, and data) at two higher education institutions. Based on hypotheses derived from two theories – i.e., procedural justice theory and transaction cost theory – and mixed methods interviews with 36 employees, our findings suggest a paradox where middle ground strategies accommodating for IT consumerization are associated with a higher understanding of, but a lower satisfaction with these policies. Differences in compliant behavior are found for voice and data usage on professional devices. Extending the procedural justice view, we conclude that transaction cost theory serves as a complementary lens to explain policy compliance.
    Original languageEnglish
    Title of host publicationPACIS 2016 Proceedings
    EditorsPatrick Y.K. Chau, She-I Chang
    Number of pages15
    Place of PublicationAtlanta, GA
    PublisherAssociation for Information Systems. AIS Electronic Library (AISeL)
    Publication date2016
    Article number32
    ISBN (Print)9789860491029
    ISBN (Electronic)9789860491029
    Publication statusPublished - 2016
    EventThe 20th Pacific Asia Conference on Information Systems. PACIS 2016 - Chiayi, Taiwan, Province of China
    Duration: 27 Jun 20161 Jul 2016
    Conference number: 20


    ConferenceThe 20th Pacific Asia Conference on Information Systems. PACIS 2016
    Country/TerritoryTaiwan, Province of China
    Internet address


    • IT consumerization
    • Bring your own device
    • Shadow IT
    • Procedural justice theory
    • Transaction cost theory
    • Mixed methods

    Cite this