devices to access organizational information. Users gain convenience, while employers
benefit from increased productivity and reduced IT expense. Security boundaries must
extend to personal devices to mitigate data exfiltration, thereby infringing on employees'
privacy by monitoring their personal devices. These monitoring mechanisms play a critical
role in employee participation in a BYOD program. Our results demonstrate that the BYOD …