https://www.logicalis.com/globalassets/group/pdf-
files/logicalisbyodwhitepaperovum.pdf.
Faul, F., Erdfelder, E., Lang, A. G., & Buchner, A. (2007).
G*Power 3: A flexible statistical power analysis
program for the social, behavioral, and biomedical
sciences. Behavior Research Methods, 39, 175–191.
Field, A. (2018). Discovering statistics using SPSS
statistics (5th ed.), (pp. 334–368). Thousand Oaks, CA:
Sage.
G*Power (2020). G*Power: Statistical power analyses for
Windows and Mac. Retrieved from
https://www.psychologie.hhu.de/arbeitsgruppen/allge
meine-psychologie-und-
arbeitspsychologie/gpower.html.
Grant, R. L. (2017). Exploring effects of organizational
culture upon implementation of information security
awareness and training programs within the defense
industry located in the Tennessee valley region
(Doctoral dissertation). Retrieved from ProQuest
Dissertations and Theses database. (Order No.
10646759).
Johnston, A. C., Warkentin, M., McBride, M., & Carter, L.
(2016). Dispositional and situational factors: Influences
on information security policy violations. European
Journal of Information Systems, 25(3), 231–251.
doi:10.1057/ejis.2015.15.
Klein, A. G., Gerhard, C., Büchner, R. D., Diestel, S., &
Schermelleh-Engel, K. (2016). The detection of
heteroscedasticity in regression models for
psychological data. Psychological Test and Assessment
Modeling, 58(4), 567–592.
Knapp, K. J., & Ferrante, C. J. (2012). Policy awareness,
enforcement, and maintenance: Critical to information
security effectiveness in organizations. Journal of
Management Policy and Practice, 13(5), 66–80.
Retrieved from
http://www.nabusinesspress.com/JMPP/KnappKJ_We
b13_5_.pdf.
Loucks, J., Medcalf, R., Buckalew, L., & Faria, F. (2013).
The financial impact of BYOD: A model of BYOD’s
benefits to global companies. Retrieved from
https://www.cisco.com/c/dam/global/ru_ua/assets/pdf/
byod-economics_econ_analysis.pdf.
Magruder, J. S., Lewis, S. X., Burks, E. J., & Smolinski, C.
(2015). Bring your own device (BYOD): Who is
running organizations? Journal of Accounting and
Finance, 15(1), 55–61. Retrieved from http://www.na-
businesspress.com/JAF/BurksEJ_Web15_1_.pdf
May 2017 National Occupational Employment and Wage
Estimates. (2018, March 30). Retrieved from
https://www.bls.gov/oes/current/oes_nat.htm#15-0000.
Padayachee, K. (2016). An assessment of opportunity-
reducing techniques in information security: An insider
threat perspective. Journal of Decision Support
Systems, 92, 47-56. doi: 10.1016/j.dss.2016.09.012.
Safa, N. S., Maple, C., Watson, T., & Von Solms, R.
(2018). Motivation and opportunity-based model to
reduce information security insider threats in
organisations. Journal of Information Security and
Applications, 40, 247-
257. doi:10.1016/j.jisa.2017.11.001.
Schober, P., Boer, C., & Schwarte, L. A. (2018). Correlation
coefficients: Appropriate use and interpretation.
Anesthesia & Analgesia, 126(5), 1763–1768.
doi:10.1213/ANE.0000000000002864.
Schuessler, J. (2009). General deterrence theory: Assessing
information systems security effectiveness in large
versus small businesses. Ph.D. dissertation, University
of North Texas, United States. (Publication No. AAT
3377466).
Security, R. (2019, November 01). Pros & Cons of Bring
Your Own Device (BYOD). Retrieved from
https://blog.rsisecurity.com/pros-cons-of-bring-your-
own-device-byod/
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014).
Employees’ adherence to information security policies:
An exploratory field study. Information &
Management, 51(2), 217–224.
doi:10.1016/j.im.2013.08.006.
SPSS (2020), IBM SPSS Statistics. Retrieved from
https://www.ibm.com/products/spss-statistics.
SurveyMonkey, (2019). SurveyMonkey Inc., Retrieved
from www.surveymonkey.com, San Mateo, CA:
SurveyMonkey Inc.
Tavakol, M., & Dennick, R. (2011). Making sense of
Cronbach’s alpha. International Journal of Medical
Education, 2, 53-55. doi:10.5116/ijme.4dfb.8dfd
Tech Pro Research (2014). BYOD booming with 74% using
or planning to use. Retrieved from
https://www.techrepublic.com/article/research-byod-
booming-with-74-using-or-planning-to-
use/#:~:text=Tech%20Pro%20Research%20conducted
%20a,what%20part%20they%20are%20playing.
Theoharidou, M., Kokolakis, S., Karyda, M., &
Kiountouzis, E. (2005). The insider threat to
information systems and the effectiveness of
ISO17799. Journal of Computer & Security, 24(6),
472-484. doi: 10.1016/j.cose.2005.05.002.
Turek, M. (2016). Employees say smartphones boost
productivity by 34 percent: Frost & Sullivan research.
Retrieved from
https://insights.samsung.com/2016/08/03/employees-
say-smartphones-boost-productivity-by-34-percent-
frost-sullivan-research/
Varbanov, R. (2014). Applications of the BYOD
conception: Benefits, risks, and approaches. Business
Management / Biznes Upravlenie, 24(2), 80–99.
Retrieved from http://hdl.handle.net/10610/1498
Waterfill, M. R., & Dilworth, C. A. (2014). BYOD: Where
the employee and the enterprise intersect. Employee
Relations Law Journal, 40(2), 26–36. Retrieved from
https://www.jdsupra.com/legalnews/expanded-byod-
where-the-employee-and-34259/
Xu, Z., & Hu, Q. (2018). The role of rational calculus in
controlling individual propensity toward information
security policy non-compliance behavior. Proceedings
of the 51st Hawaii International Conference on System
Sciences. Retrieved from