The future of work, that is working in virtual settings, introduces complex questions of privacy concerns and behaviours related to privacy in virtual environments including with Bring Your Own Devices (BYOD). Based on the Privacy Paradox and Concerns for Information Privacy (CFIP) scale, the study aims to provide an in-depth comprehension of how individuals face privacy concerns in the context of BYOD in virtual settings by analysing privacy through a multifaceted lens. The approach to disseminate the research question of this study included quantitative paradigms. Methods were survey questions, Data sets emerging from these instruments were analysed and presented to comprehend the phenomenon. The use of BYOD in virtual environment showed disparity with stated privacy concerns.
Keywords: Privacy Concerns, Privacy Paradox, Concern for Information Privacy Scale, Privacy Attitude, Privacy Behaviour, BYOD, Hybrid Teams, Working Generation Privacy Behaviour.
Aguboshim, F.C., & Udobi, J.I. (2019). Security issues with mobile IT: a narrative review of bring your own device (BYOD). Information Technology (IT), 8(1).
Ayedh, M., Wahab, A.W.A., & Idris, M.Y.I. (2023). Systematic literature review on security access control policies and techniques based on privacy requirements in a BYOD environment: state of the art and future directions. Applied Sciences, 13: 8048. https://doi.org/10.3390/app13148048.
Cram, W.A., D'Arcy, J., & Proudfoot, J.G. (2019). Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance. MIS Quarterly, 43(2): 525–554.
Degirmenci, K., Breitner, M.H., Nolte, F., & Passlick, J. (2023). Legal and privacy concerns of BYOD adoption. Journal of Computer Information Systems. https://doi.org/10.1080/08874417.2023.2259346.
Downer, K., & Bhattacharya, M. (2022). BYOD security: a study of human dimensions. Informatics, 9(1): 16. https://doi.org/10.3390/informatics9010016.
Gerber, N., Stöver, A., & Marky, K. (2023). Human factors in privacy research. Springer.
Jamin, J., Md Arifin, N., Mokhtar, S., Rosli, N., & Mohd Shukry, A. (2019). Privacy concern of personal information in the ICT usage, internet and social media perspective. Malaysian E-Commerce Journal, 3: 15–17. https://doi.org/10.26480/mecj.02.2019.15.17.
Jaramillo, D., Ackerbauer, M., & Woodburn, S. (2014). A user study on mobile virtualization to measure personal freedom vs. enterprise security. In Proceedings of the IEEE SECON, Pages 1–5.
Kim, Y., Kim, S.H., Peterson, R.A., & Choi, J. (2023). Privacy concern and its consequences: a meta-analysis. Technological Forecasting and Social Change, 196: 122789. https://doi.org/10.1016/j.techfore.2023.122789.
Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Computers & Security, 64: 122–134. https://doi.org/10.1016/j.cose.2015.07.002.
Lam, H., Beckman, T., & Harcourt, M. (2025). Bring your own device (BYOD): organizational control and justice perspectives. Employee Responsibilities and Rights Journal, 37: 473–491. https://doi.org/10.1007/s10672-024- 09498-1.
Lang, P.M. (2021). Privacy concerns and behavioural intentions in the digital age: a review of literature. Cyberpsychology, Behavior, and Social Networking, 24: 338–346. https://doi.org/10.1089/cyber.2021.0052.
Lutz, C., Hoffmann, C.P., & Ranzini, G. (2016). Privacy cynicism: a new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(4): 7. https://doi.org/10.5817/cp2016-4-7.
Mamaghani, F. (2006). Impact of information technology on the workforce of the future: an analysis. International Journal of Management, 23: 845.
Martin, K., & Shilton, K. (2020). Why experience matters to privacy: how context-based experience moderates consumer privacy expectations for mobile applications. Journal of the Association for Information Science and Technology, 71(8): 940–953. https://doi.org/10.1002/asi.23500.
Musarurwa, A., Flowerday, S., & Cilliers, L. (2018). An information security behavioural model for the bring-your-own-device trend. South African Journal of Information Management, 20(1): 1–9. https://doi.org/10.41 02/sajim.v20i1.980.
Oktavia, T., Yanti, H.P., & Meyliana (2016). Security and privacy challenge in bring your own device environment: a systematic literature review. In Proceedings of the International Conference on Information Management and Technology (ICIMTech), Pages 194–199. https://doi.org/10.1109/icimtech.2016.7930328.
Padden, A. (2020). Privacy in the workplace: examining the role of narrative identity and personal data distinctions. Journal of Business Ethics, 165: 657–670. https://doi.org/10.1007/s10551-019-04189-7.
Rosman, M.R.M., Baharuddin, N.S., Alimin, N.A., Rosli, N.N.I.N., Shukry, A.I.M., & Razlan, N.M. (2022). Device (BYOD) and productivity: a conceptual framework. Proceedings, 82(1). https://doi.org/10.3390/proceed ings2022082010.
Saunders, M., Lewis, P., & Thornhill, A. (2009). Research methods for business students (5th Ed.). Pearson Education Limited.
Smith, H.J., Milberg, S.J., & Burke, S.J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2): 167–196. https://doi.org/10.2307/249477.
Stern, M. (2022). The privacy paradox revisited: exploring the relationship between privacy concerns and online behaviour. Journal of Privacy and Confidentiality, 12: 31–46. https://doi.org/10.29012/jpc.2022.12.1.31.
Taddicken, M. (2014). The privacy paradox in the social web: the impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer- Mediated Communication, 19(2): 248–273. https://doi.org/10.1111/jcc4.12052.
Wang, Y., Wei, J., & Vangury, K. (2014). Bring your own device security issues and challenges. In Proceedings of the Consumer Communications and Networking Conference (CCNC), IEEE.
Source of Funding:
This study did not receive any grant from funding agencies in the public, commercial, or not–for–profit sectors.
Competing Interests Statement:
Authors have declared no competing interests.
Consent for publication:
The authors declare that they consented to the publication of this study.
Institutional Review Board Statement:
Not applicable for this study.
Informed Consent:
Not applicable for this study.
A New Issue was published – Volume 8, Issue 4, 2025
10-10-2025 11-07-2025