forthcoming), BYOD-related innovations and organizational change for entrepreneurs and their employees in SMEs: the identification of a twofold security paradox, Journal of Organizational Change Management ,
, CEOs' Information Security Behavior in SMEs: Does Ownership Matter? Systèmes d'Information et Management, vol.22, pp.7-45, 2017.
Understanding user responses to information technology: A coping model of user adaptation, MIS Quarterly, vol.29, issue.3, pp.493-524, 2005. ,
The other side of acceptance: Studying the direct and indirect effects of emotions on information technology use, MIS Quarterly, vol.34, issue.4, pp.689-710, 2010. ,
Opportunities and Risks of Software-as-a-Service: Findings from a Survey of IT Executives. Decision Support Systems, vol.52, pp.232-246, 2011. ,
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, vol.34, issue.3, pp.523-548, 2010. ,
An extended privacy calculus model for e-commerce transactions, Information Systems Research, vol.17, issue.1, pp.61-80, 2006. ,
Opening the black box of system usage: User adaptation to disruptive IT, European Journal of Information Systems, vol.20, issue.5, pp.589-607, 2011. ,
URL : https://hal.archives-ouvertes.fr/halshs-00641160
Making the case for coping, Personal coping: Theory, research, and application, pp.31-46, 1992. ,
Evaluating structural equation models with unobservable variables and measurement error, Journal of Marketing Research, vol.18, issue.1, pp.39-50, 1981. ,
The privacy-personalization paradox in mHealth services acceptance of different age groups, Electronic Commerce Research and Applications, vol.16, pp.55-65, 2016. ,
An updated and expanded assessment of PLS-SEM in information systems research, Industrial Management & Data Systems, vol.117, issue.3, pp.442-458, 2017. ,
, A primer on partial least squares structural equation modeling (PLS-SEM), 2017.
Advanced issues in partial least squares structural equation modeling, 2018. ,
IT consumerization: When gadgets turn into enterprise IT tools, MIS Quarterly Executive, vol.11, issue.3, pp.99-112, 2012. ,
Using PLS path modeling in new technology research: Updated guidelines. Industrial Management & Data Systems, vol.116, pp.2-20, 2016. ,
DOI : 10.1108/imds-09-2015-0382
URL : https://www.emeraldinsight.com/doi/pdfplus/10.1108/IMDS-09-2015-0382
Internet privacy concerns: An integrated conceptualization and four empirical studies, MIS Quarterly, vol.37, issue.1, pp.275-298, 2013. ,
DOI : 10.25300/misq/2013/37.1.12
Blissfully ignorant: The effects of general privacy concerns, general institutional trust, and affect in the privacy calculus, Information Systems Journal, vol.25, issue.6, pp.607-635, 2015. ,
Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior, International Journal of Human-Computer Studies, vol.71, issue.12, pp.1163-1173, 2013. ,
DOI : 10.1016/j.ijhcs.2013.08.016
Analysis of the Determinants of Software-as-a-Service Adoption in Small Businesses: Risks, Benefits, and Organizational and Environmental Factors, Journal of Small Business Management, vol.55, issue.2, pp.303-325, 2017. ,
ERP Systems Adoption: An Exploratory Study of the Organizational Factors and Impacts of ERP Success, Information and Management, vol.44, issue.4, pp.418-432, 2007. ,
Psychological stress and the coping process, 1966. ,
Stress, appraisal, and coping, 1984. ,
Leaving employees to their own devices: new practices in the workplace, Journal of Business Strategy, vol.36, issue.5, pp.18-24, 2015. ,
Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software, European Journal of Information Systems, vol.18, issue.2, pp.177-187, 2009. ,
DOI : 10.1057/ejis.2009.11
Willing to pay for quality personalization? Trade-off between quality and privacy, European Journal of Information Systems, vol.21, pp.621-642, 2012. ,
DOI : 10.1057/ejis.2012.13
Avoidance of information technology threats: A theoretical perspective, MIS Quarterly, vol.33, issue.1, pp.71-90, 2009. ,
Accounting for common method variance in cross-sectional research designs, Journal of Applied Psychology, vol.86, issue.1, pp.114-121, 2001. ,
DOI : 10.1037//0021-9010.86.1.114
Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model, Information Systems Research, vol.15, issue.4, pp.336-355, 2004. ,
DOI : 10.1287/isre.1040.0032
Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation, Information Systems Research, vol.2, issue.3, pp.192-222, 1991. ,
How people perceive and will cope with risks from the diffusion of ubiquitous information and communication technologies, Risk Analysis, issue.5, pp.832-846, 2011. ,
Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison, Computers in Human Behavior, vol.65, pp.409-419, 2016. ,
DOI : 10.1016/j.chb.2016.09.005
Sources of method bias in social science research and recommendations on how to control it, Annual Review of Psychology, vol.63, issue.1, pp.539-569, 2012. ,
European management research using partial least squares structural equation modeling (PLS-SEM), European Management Journal, vol.34, issue.6, pp.589-597, 2016. ,
DOI : 10.1016/j.emj.2014.12.001
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation, Social psychophysiology: A sourcebook, pp.153-176, 1983. ,
Marker variable choice, reporting, and interpretation in the detection of common method variance: A review and demonstration, Organizational Research Methods, vol.18, issue.3, pp.473-511, 2015. ,
Employees' adherence to information security policies: An exploratory field study, Information & Management, vol.51, issue.2, pp.217-224, 2014. ,
DOI : 10.1016/j.im.2013.08.006
Toward a Theory of Paradox: A Dynamic Equilibrium Model of Organizing, Academy of Management Review, vol.36, pp.381-403, 2011. ,
Charting Your Organization's Bring-Your-OwnDevice Voyage, MIS Quarterly Executive, vol.2, issue.15, pp.85-104, 2016. ,
Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users, MIS Quarterly, vol.37, issue.4, pp.1141-1164, 2013. ,
Factors mediating disclosure in social network sites, Computers in Human Behavior, vol.27, pp.590-598, 2011. ,
DOI : 10.1016/j.chb.2010.10.017
URL : http://fredstutzman.com/papers/ICWSM2010R_Stutzman.pdf
, Coping with BYOD Security Threat: From Management Perspective. Twenty-first Americas Conference on Information Systems, 2015.
Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination, Information & Management, vol.52, issue.4, pp.506-517, 2015. ,
DOI : 10.1016/j.im.2015.03.002
The privacy paradox on social network sites revisited: The role of individual characteristics and group norms, Cyber psychology: Journal of Psychosocial Research on Cyberspace, vol.3, issue.2, 2009. ,
Motivating IS security compliance: Insights from habit and protection motivation theory, Information & Management, vol.49, issue.3-4, pp.190-198, 2012. ,
DOI : 10.1016/j.im.2012.04.002
User Acceptance of Information Technology: Toward a Unified View, MIS Quarterly, vol.27, issue.3, pp.425-478, 2003. ,
It consumerization: BYOD-program acceptance and its impact on employer attractiveness, Journal of Computer Information Systems, vol.56, issue.1, pp.1-10, 2016. ,
DOI : 10.1080/08874417.2015.11645795
Mobile device adaptation efforts: The impact of hedonic and utilitarian value, Journal of Computer Information Systems, vol.55, issue.1, pp.48-58, 2014. ,
IT Innovations from the Consumer Market as a Challenge for Corporate IT, Business & Information Systems Engineering, vol.6, pp.363-366, 2012. ,
Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test, Computers in Human Behavior, vol.24, issue.6, pp.2799-2816, 2008. ,
Integrating TTF and UTAUT to explain mobile banking user adoption, Computers in Human Behavior, vol.26, issue.4, pp.760-767, 2010. ,
DOI : 10.1016/j.chb.2010.01.013