P. Baillette and Y. Barlette, forthcoming), BYOD-related innovations and organizational change for entrepreneurs and their employees in SMEs: the identification of a twofold security paradox, Journal of Organizational Change Management

Y. Barlette, K. Gundolf, and A. Jaouen, CEOs' Information Security Behavior in SMEs: Does Ownership Matter? Systèmes d'Information et Management, vol.22, pp.7-45, 2017.

A. Beaudry and A. Pinsonneault, Understanding user responses to information technology: A coping model of user adaptation, MIS Quarterly, vol.29, issue.3, pp.493-524, 2005.

A. Beaudry and A. Pinsonneault, The other side of acceptance: Studying the direct and indirect effects of emotions on information technology use, MIS Quarterly, vol.34, issue.4, pp.689-710, 2010.

A. Benlian and T. Hess, Opportunities and Risks of Software-as-a-Service: Findings from a Survey of IT Executives. Decision Support Systems, vol.52, pp.232-246, 2011.

B. Bulgurcu, H. Cavusoglu, and I. Benbasat, Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, vol.34, issue.3, pp.523-548, 2010.

T. Dinev and P. Hart, An extended privacy calculus model for e-commerce transactions, Information Systems Research, vol.17, issue.1, pp.61-80, 2006.

C. M. Elie-dit-cosaque and D. W. Straub, Opening the black box of system usage: User adaptation to disruptive IT, European Journal of Information Systems, vol.20, issue.5, pp.589-607, 2011.
URL : https://hal.archives-ouvertes.fr/halshs-00641160

S. Folkman, Making the case for coping, Personal coping: Theory, research, and application, pp.31-46, 1992.

C. Fornell and D. F. Larcker, Evaluating structural equation models with unobservable variables and measurement error, Journal of Marketing Research, vol.18, issue.1, pp.39-50, 1981.

X. Guo, X. Zhang, and Y. Sun, The privacy-personalization paradox in mHealth services acceptance of different age groups, Electronic Commerce Research and Applications, vol.16, pp.55-65, 2016.

J. Hair, C. L. Hollingsworth, A. B. Randolph, and A. Y. Chong, An updated and expanded assessment of PLS-SEM in information systems research, Industrial Management & Data Systems, vol.117, issue.3, pp.442-458, 2017.

J. F. Hair, G. T. Hult, C. M. Ringle, and M. Sarstedt, A primer on partial least squares structural equation modeling (PLS-SEM), 2017.

J. F. Hair, M. Sarstedt, C. M. Ringle, and S. P. Gudergan, Advanced issues in partial least squares structural equation modeling, 2018.

J. Harris, B. Ives, and I. Junglas, IT consumerization: When gadgets turn into enterprise IT tools, MIS Quarterly Executive, vol.11, issue.3, pp.99-112, 2012.

J. Henseler, G. Hubona, and P. A. Ray, Using PLS path modeling in new technology research: Updated guidelines. Industrial Management & Data Systems, vol.116, pp.2-20, 2016.
DOI : 10.1108/imds-09-2015-0382

URL : https://www.emeraldinsight.com/doi/pdfplus/10.1108/IMDS-09-2015-0382

W. Hong and J. Thong, Internet privacy concerns: An integrated conceptualization and four empirical studies, MIS Quarterly, vol.37, issue.1, pp.275-298, 2013.
DOI : 10.25300/misq/2013/37.1.12

F. Kehr, T. Kowatsch, D. Wentzel, and E. Fleisch, Blissfully ignorant: The effects of general privacy concerns, general institutional trust, and affect in the privacy calculus, Information Systems Journal, vol.25, issue.6, pp.607-635, 2015.

M. J. Keith, S. C. Thompson, J. Hale, P. B. Lowry, and C. Greer, Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior, International Journal of Human-Computer Studies, vol.71, issue.12, pp.1163-1173, 2013.
DOI : 10.1016/j.ijhcs.2013.08.016

S. H. Kim, S. Y. Jang, and K. H. Yang, Analysis of the Determinants of Software-as-a-Service Adoption in Small Businesses: Risks, Benefits, and Organizational and Environmental Factors, Journal of Small Business Management, vol.55, issue.2, pp.303-325, 2017.

C. C. Law and E. W. Ngai, ERP Systems Adoption: An Exploratory Study of the Organizational Factors and Impacts of ERP Success, Information and Management, vol.44, issue.4, pp.418-432, 2007.

R. S. Lazarus, Psychological stress and the coping process, 1966.

R. S. Lazarus and S. Folkman, Stress, appraisal, and coping, 1984.

A. Leclercq-vandelannoitte, Leaving employees to their own devices: new practices in the workplace, Journal of Business Strategy, vol.36, issue.5, pp.18-24, 2015.

Y. Lee and K. R. Larsen, Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software, European Journal of Information Systems, vol.18, issue.2, pp.177-187, 2009.
DOI : 10.1057/ejis.2009.11

T. Li and T. Unger, Willing to pay for quality personalization? Trade-off between quality and privacy, European Journal of Information Systems, vol.21, pp.621-642, 2012.
DOI : 10.1057/ejis.2012.13

H. Liang and Y. Xue, Avoidance of information technology threats: A theoretical perspective, MIS Quarterly, vol.33, issue.1, pp.71-90, 2009.

M. K. Lindell and D. J. Whitney, Accounting for common method variance in cross-sectional research designs, Journal of Applied Psychology, vol.86, issue.1, pp.114-121, 2001.
DOI : 10.1037//0021-9010.86.1.114

N. K. Malhotra, S. S. Kim, and J. Agarwal, Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model, Information Systems Research, vol.15, issue.4, pp.336-355, 2004.
DOI : 10.1287/isre.1040.0032

G. C. Moore and I. Benbasat, Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation, Information Systems Research, vol.2, issue.3, pp.192-222, 1991.

S. Moser, S. E. Bruppacher, and H. Mosler, How people perceive and will cope with risks from the diffusion of ubiquitous information and communication technologies, Risk Analysis, issue.5, pp.832-846, 2011.

I. Pentina, L. Zhang, H. Bata, and Y. Chen, Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison, Computers in Human Behavior, vol.65, pp.409-419, 2016.
DOI : 10.1016/j.chb.2016.09.005

P. M. Podsakoff, S. B. Mackenzie, and N. P. Podsakoff, Sources of method bias in social science research and recommendations on how to control it, Annual Review of Psychology, vol.63, issue.1, pp.539-569, 2012.

N. F. Richter, G. Cepeda, J. L. Roldán, and C. M. Ringle, European management research using partial least squares structural equation modeling (PLS-SEM), European Management Journal, vol.34, issue.6, pp.589-597, 2016.
DOI : 10.1016/j.emj.2014.12.001

R. W. Rogers, Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation, Social psychophysiology: A sourcebook, pp.153-176, 1983.

M. J. Simmering, C. M. Fuller, H. A. Richardson, Y. Ocal, and G. M. Atinc, Marker variable choice, reporting, and interpretation in the detection of common method variance: A review and demonstration, Organizational Research Methods, vol.18, issue.3, pp.473-511, 2015.

M. Siponen, M. A. Mahmood, and S. Pahnila, Employees' adherence to information security policies: An exploratory field study, Information & Management, vol.51, issue.2, pp.217-224, 2014.
DOI : 10.1016/j.im.2013.08.006

W. K. Smith and M. W. Lewis, Toward a Theory of Paradox: A Dynamic Equilibrium Model of Organizing, Academy of Management Review, vol.36, pp.381-403, 2011.

Z. R. Steelman, M. Lacity, and R. Sabherwal, Charting Your Organization's Bring-Your-OwnDevice Voyage, MIS Quarterly Executive, vol.2, issue.15, pp.85-104, 2016.

J. Sutanto, E. Palme, C. Tan, and C. W. Phang, Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users, MIS Quarterly, vol.37, issue.4, pp.1141-1164, 2013.

F. Stutzman, R. Capra, and J. Thompson, Factors mediating disclosure in social network sites, Computers in Human Behavior, vol.27, pp.590-598, 2011.
DOI : 10.1016/j.chb.2010.10.017

URL : http://fredstutzman.com/papers/ICWSM2010R_Stutzman.pdf

Z. Tu and Y. Yuan, Coping with BYOD Security Threat: From Management Perspective. Twenty-first Americas Conference on Information Systems, 2015.

Z. Tu, O. Turel, Y. Yuan, and N. Archer, Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination, Information & Management, vol.52, issue.4, pp.506-517, 2015.
DOI : 10.1016/j.im.2015.03.002

S. Utz and N. C. Krämer, The privacy paradox on social network sites revisited: The role of individual characteristics and group norms, Cyber psychology: Journal of Psychosocial Research on Cyberspace, vol.3, issue.2, 2009.

A. Vance, M. Siponen, and S. Pahnila, Motivating IS security compliance: Insights from habit and protection motivation theory, Information & Management, vol.49, issue.3-4, pp.190-198, 2012.
DOI : 10.1016/j.im.2012.04.002

V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, User Acceptance of Information Technology: Toward a Unified View, MIS Quarterly, vol.27, issue.3, pp.425-478, 2003.

A. Weeger, X. Wang, and H. Gewald, It consumerization: BYOD-program acceptance and its impact on employer attractiveness, Journal of Computer Information Systems, vol.56, issue.1, pp.1-10, 2016.
DOI : 10.1080/08874417.2015.11645795

D. Whitten, R. Hightower, and L. Sayeed, Mobile device adaptation efforts: The impact of hedonic and utilitarian value, Journal of Computer Information Systems, vol.55, issue.1, pp.48-58, 2014.

F. Weiss and J. M. Leimeister, IT Innovations from the Consumer Market as a Challenge for Corporate IT, Business & Information Systems Engineering, vol.6, pp.363-366, 2012.

M. Workman, W. H. Bommer, and D. Straub, Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test, Computers in Human Behavior, vol.24, issue.6, pp.2799-2816, 2008.

T. Zhou, Y. B. Lu, and B. Wang, Integrating TTF and UTAUT to explain mobile banking user adoption, Computers in Human Behavior, vol.26, issue.4, pp.760-767, 2010.
DOI : 10.1016/j.chb.2010.01.013