Abstract
For security, economic, and efficiency reasons, many businesses supply mobile devices to employees to use both in the workplace and remotely, accompanied by policies governing their appropriate use. Extant research has shown that work-issued mobile devices can disrupt employees’ perceptions of work-life balance (WLB) and, indeed, WLB can impact employees’ job satisfaction and performance. The global COVID-19 pandemic meant that more employees than usual performed their work remotely, but this situation may have not fit the preferred WLB for some. Did this encroachment mean that appropriate use policies were forgotten? We conducted two rounds of surveys, one pre-pandemic and the other mid-pandemic, to determine whether those workplace changes led some employees astray. In other words, which type of WLB perceptions are more likely to lead to policy violations and how does the WLB mismatch cause deviant behaviors before and during the pandemic? The results from cluster analysis and the comparison between the pre and mid-pandemic suggest that policy violators were present in both time periods, but before the pandemic violators were in more compartmentalized work settings and mid-pandemic violators dominated all work settings.

Similar content being viewed by others
References
Adisa TA, Gbadamosi G, Osabutey E (2017) What happened to the border? The role of mobile information technology devices on employees’ work-life balance. Pers Rev 46(8):1651–1671
Ahuja M, Chudoba K, Kacmar C, McKnight DH, George J (2007) IT road warriors: balancing work-family conflict, job autonomy, and work overload to mitigate turnover intentions. MIS Q 31(1):1–17
Alahmari S, Renaud K, Omoronyia I (2023) Moving beyond cyber security awareness and training to engendering security knowledge sharing. Inf Syst e-Bus Manag 21(1):123–158
Althammer SE, Reis D, van der Beek S, Beck L, Michel A (2021) A mindfulness intervention promoting work–life balance: how segmentation preference affects changes in detachment, well-being, and work–life balance. J Occup Organ Psychol 94(2):282–308
Armstrong D, Riemenschneider C, Giddens L (2018) The advancement and persistence of women in the information technology profession: an extension of Ahuja’s gendered theory of IT career stages. Inf Syst J 28(6):1082–1124
Barlow J, Warkentin M, Ormond D, Dennis A (2013) Don’t make excuses! Discouraging neutralization to reduce it policy violation. Comput Secur 39(B):145–159
Beauregard A (2014) Fairness perceptions of work−life balance initiatives: effects on counterproductive work behaviour. Br J Manag 25(4):772–789
Blumstein P, Weinstein E (1969) The redress of distributive injustice. Am J Sociol 74(4):408–418
Brown WS, Palvia PC (2020) Differing perceptions of mobile devices: company-issued devices and bring your own device (BYOD). Int J Mob Comput Multimed Commun 11(3):38–47
Butts M, Becker W, Boswell W (2015) Hot buttons and time sinks: the effects of electronic communication during nonwork time on emotions and work-nonwork conflict. Acad Manag J 58(3):763–788
Cappelli P (2000) A market-driven approach to retaining talent. Harv Bus Rev 78(1):103–111
Carlson D, Thompson M, Crawford W, Boswell W, Whitten D (2018) Your job is messing with mine! The impact of mobile device use for work during family time on the spouse’s work life. J Occup Health Psychol 23(4):471–482
Chaudhury A, Mallick D (2018) Can an ego defense mechanism model help explain dysfunctional is security behavior? Paper presented at the Twenty-fourth Americas Conference on Information Systems, New Orleans, LA
Chen L, Nath R (2008) A socio-technical perspective of mobile work. Inf Knowl Syst Manag 7(1):41–60
Chen Y, Xia W, Cousins K (2022) Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Comput Secur 113:102568
Clark SC (2000) Work/family border theory: a new theory of work/family balance. Hum Relat 53(6):747–770
Colbert A, Yee N, George G (2016) The digital workforce and the workplace of the future. Acad Manag J 59(3):731–739
Colquitt JA, Scott BA, Rodell JB, Long DM, Zapata CP, Conlon DE, Wesson MJ (2013) Justice at the millennium, a decade later: a meta-analytic test of social exchange and affect-based perspectives. J Appl Psychol 98(2):199–236
Cooper JT, Kidwell RE, Eddleston KA (2013) Boss and parent, employee and child: work-family roles and deviant behavior in the family firm. Fam Relat 62(3):457–471
Cresswell JW (1994) Research design: qualitative and quantitative approaches. Sage Publications, Thousand Oaks
Crossler R, Long J, Loraas T, Trinkle B (2014) Understanding compliance with bring your own device policies utilizing protection motivation theory: bridging the intentionbehavior gap. J Inf Syst 28(1):209–226
D’Arcy J, Herath T, Shoss M (2014) Understanding employee responses to stressful information security requirements: a coping perspective. J Manag Inf Syst 31(2):285–318
D’Arcy J, Lowry PB (2019) Cognitive-affective drivers of employees’ daily compliance with information security policies: a multilevel, longitudinal study. Inf Syst J 29(1):43–69
Deery M, Jago L (2015) Revisiting talent management, work-life balance and retention strategies. Int J Contemp Hosp 27(3):453–472
Deloitte (2022) Women at Work 2022: A Global Outlook. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/global/Documents/deloitte-women-at-work-2022-a-global-outlook.pdf
Dén-Nagy I (2014) A double-edged sword?: A critical evaluation of the mobile phone in creating work–life balance. N Technol Work Employ 29(2):193–211
Fan W, Moen P (2022) Working more, less or the same during COVID-19? A mixed method, intersectional analysis of remote workers. Work Occup 49(2):143–186
Field JC, Chan XW (2018) Contemporary knowledge workers and the boundaryless work–life interface: implications for the human resource management of the knowledge workforce. Front Psychol 9:2414
Fischer LH, Baskerville R (2022) Explaining sociotechnical change: an unstable equilibrium perspective. Eur J Inf Syst 32(2023):634–652
Gersick C (1991) Revolutionary change theories: a multilevel exploration of the punctuated equilibrium paradigm. Acad Manag Rev 16(1):10–36
Goel D, Jain AK (2018) Mobile phishing attacks and defence mechanisms: state of art and open research challenges. Comput Secur 73:519–544
Golden A (2009) Employee families and organizations as mutually enacted environments: a sensemaking approach to work–life interrelationships. Manag Commun Q 22(3):385–415
Grand Canyon University (2020) Work-Life Balance Stats Among Business Professionals. Retrieved from https://www.gcu.edu/blog/business-management/work-life-balance-stats-among-business-professionals. Accessed Dec 13, 2022
Greenberg J (1990) Looking fair versus being fair: managing impressions of organizational justice. In: Staw BM, Cummings LL (eds) Research in organizational behavior, vol 12. JAI Press, Greenwich, pp 111–157
Gregor S (2006) The nature of theory in information systems. MIS Q 30(3):611–642
Gregor S, Klein G (2014) Eight obstacles to overcome in the theory testing genre. J Assoc Inf Syst 15(11):5
Griffeth R, Gaertner S, Sager J (1999) Taxonomic model of withdrawal behaviors: the adaptive response model. Hum Resour Manag Rev 9(4):577–590
Han CH, Tyagi S, Kim N, Choi B (2016) Understanding Internet service switching behaviour based on the stage model. IseB 14(3):665–689
Harris KJ, Marett K, Harris RB (2011) Technology-related pressure and work–family conflict: main effects and an examination of moderating variables. J Appl Soc Psychol 41(9):2077–2103
Henle C, Kohut G, Booth R (2009) Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: an empirical test of justice theory. Comput Hum Behav 25:902–910
Hill E, Hawkins A, Ferris M, Weitzman M (2001) Finding an extra day a week: the positive influence of perceived job flexibility on work and family life balance. Fam Relat 50(1):49–58
Hu Q, Xu Z, Dinev T, Ling H (2011) Does deterrence work in reducing information security policy abuse by employees? Commun ACM 54(6):54–60
Igbaria M, Greenhaus JH, Parasuraman S (1991) Career orientations of MIS employees: an empirical analysis. MIS Q 15(2):151–169
Kim S, Christensen A (2017) The dark and bright sides of personal use of technology at work: a job demands–resources model. Hum Resour Dev Rev 16(4):425–447
Koch H, Gonzalez E, Leidner D (2012) Bridging the work/social divide: the emotional response to organizational social networking sites. Eur J Inf Syst 21(6):699–717
König C, Caner de la Guardia M (2014) Exploring the positive side of personal Internet use at work: Does it help in managing the border between work and nonwork? Comput Hum Behav 30:355–360
Kwak D, Holtkamp P, Kim S (2019) Measuring and controlling social desirability Bias: applications in information systems research. J Assoc Inf Syst 20(4):317–345
Lee J, Warkentin M, Crossler R, Otondo R (2017) Implications of monitoring mechanisms on bring your own device adoption. J Comput Inf Syst 57(4):309–318
Li H, Sarathy R, Zhang J, Luo X (2014) Exploring the effects of organizational justice, personal ethics and sanction on Internet use policy compliance. Inf Syst J 24(6):479–502
MacKenzie S, Podsakoff P (2012) Common method bias in marketing: causes, mechanisms, and procedural remedies. J Retail 88(4):542–555
Martinko M, Gundlach M, Douglas S (2002) Toward an integrative theory of counterproductive workplace behavior: a causal reasoning perspective. Int J Sel Assess 10(1/2):36–50
Matusik S, Mickel A (2011) Embracing or embattled by converged mobile devices? Users’ experiences with a contemporary connectivity technology. Hum Relat 64(8):1001–1030
McGrath J (1995) Methodology matters: doing research in the behavioral and social sciences. In: Baecker RM, Grudin J, Buxton W, Greenberg S (eds) Readings in human-computer interaction. Morgan Kaufmann, San Francisco, pp 152–169
Middleton C (2008) Do mobile technologies enable work–life balance? In: Hislop D (ed) Mobility and technology in the workplace. Routledge, Abingdon, pp 209–224
Palvia P, Mao E, Salam A, Soliman K (2003) Management information systems research: What’s there in a methodology? Commun Assoc Inf Syst 11(16):289–309
Pinsonneault A, Kraemer K (1993) Survey research methodology in management information systems: an assessment. J Manag Inf Syst 10(2):75–105
Pitt J, Busquets D, Macbeth S (2014) Distributive justice for self-organised common-pool resource management. ACM Trans Auton Adapt Syst 9(3):14
Polites G, Serrano C, Thatcher J, Matthews K (2018) Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use. Eur J Inf Syst 27(5):600–621
Posey C, Bennett B, Roberts T, Lowry PB (2011) When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse. J Inf Syst Secur 7(1):24–47
Prasopoulou E, Pouloudi A, Panteli N (2006) Enacting new temporal boundaries: the role of mobile phones. Eur J Inf Syst 15(3):277–284
Ramlall SJ (2008) Enhancing employee performance through positive organizational behavior. J Appl Soc Psychol 38(6):1580–1600
Reisinger PP (2022) Through the spying-glass: Data privacy concerns regarding mobile spyware apps. In: Proceedings of the Boston College Intellectual Property and Technology Forum, vol 2022. pp 1–18
Roemer J (1998) Theories of distributive justice. Harvard University Press, Cambridge
Rousseau D, Fried Y (2001) Location, location, location: contextualizing organizational research. J Organ Behav 22(1):1–13
Sarker S, Ahuja M, Sarker S (2018) Work–life conflict of globally distributed software development personnel: an empirical investigation using border theory. Inf Syst Res 29(1):103–126
Sarker S, Sarker S, Xiao X, Ahuja M (2012) Managing employees’ use of mobile technologies to minimize work-life balance impacts. MIS Q Exec 11(4):143–157
Saunders C, Kim J (2007) Editor’s comments: Perspectives on time. MIS Q 31(4):iii–xi
Schieman S, Narisada A (2021) A less objectionable greed? Work-life conflict and unjust pay during a pandemic. Res Soc Stratif Mobil 71:100564
Scholarios D, Marks A (2004) Work-life balance and the software worker. Hum Resour Manag J 14(2):54–74
Stanko T, Beckman C (2015) Watching you watching me: Boundary control and capturing attention in the context of ubiquitous technology use. Acad Manag J 58(3):712–738
Stephens K (2018) Negotiating control: organizations and mobile communication. Oxford University Press, New York
Tams S, Grover V, Thatcher J, Ahuja M (2022) Grappling with modern technology: interruptions mediated by mobile devices impact older workers disproportionately. Inf Syst e-Bus Manag 20(4):635–655
Thakur SJ, Bhatnagar J (2017) Mediator analysis of job embeddedness: relationship between work-life balance practices and turnover intentions. Empl Relat 39(5):718–731
Tu YT, Sulistiawan J, Ekowati D, Rizaldy H (2022) Work-family conflict and salespeople deviant behavior: the mediating role of job stress. Heliyon 8(10):e10881
Vance A, Lowry PB, Eggett D (2013) Using accountability to reduce access policy violations in information systems. J Manag Inf Syst 29(4):263–289
Vance A, Siponen MT, Straub DW (2020) Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Inf Manag 57(4):103212
Vearrier L, Rosenberger K, Weber V (2018) Use of personal devices in healthcare: guidelines from a roundtable discussion. J Mob Technol Med 7(2):27–34
Von Bergen C, Bressler M (2019) Work, non-work boundaries and the right to disconnect. J Appl Bus Econ 21(2):51–69
Whitten D, Hightower R, Sayeed L (2014) Mobile device adaptation efforts: the impact of hedonic and utilitarian value. J Comput Inf Syst 55(1):48–58
Willison R, Warkentin M, Johnston AC (2018) Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Inf Syst J 28(2):266–293
Zedeck S (1992) Work, families, and organizations. Jossey-Bass, San Francisco
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix: Survey Items
Appendix: Survey Items
(responses range from 1: strongly disagree to 5: strongly agree)
Instructions: In this survey, we would like to know about your use of a mobile device that goes to work with you and comes home with you. A mobile device could include cell phones, tablets, or laptops. You may use more than one mobile device, in which case we would like you to think about your primary/main mobile device (the one you use most).
My company has a policy discouraging watching streaming video on this mobile device | |
My company has a policy that discourages me from accessing social media on this mobile device | |
My company has a policy that discourages me from shopping online for personal reasons on this mobile device | |
My company has a policy that discourages me from playing video games on this mobile device | |
My company has a policy that discourages me from browsing websites for personal reasons on this mobile device | |
My company has a policy that prevents my family members from using this mobile device |
Please answer whether you perform the following activities with your primary work-issued mobile device.
I watch streaming video (YouTube, Netflix, etc.) on this mobile device |
I access my social media (Facebook, Instagram, etc.) on this mobile device |
I shop online for personal reasons (not business) with this mobile device |
I play video games on this mobile device |
I browse websites for personal reasons (not business) on this mobile device |
My family members use this mobile device |
Please rate the importance you place on each of the following.
Compensation that fairly rewards the amount of work spillover into my personal life |
Internal satisfaction that I can accomplish both my work requirements and my personal life requirements |
The ability to move seamlessly between my work and personal lives |
Protection from supervisors/managers who may wish to impose their desired work-life balance on others who feel differently |
How did your employer adjust your work-life balance during the COVID-19 outbreak last spring and summer?
(more time working from home / more time in the workplace / no change).
How often is security training provided?
(never / once a year / twice a year / several times a year / other).

Which of the graphics above best represents your current balance between your personal life and your work life?
Open-Ended Questions
Please describe your after-hours work at home, including checking email, completing reports, etc.
What is your job title?
How long have you worked with your current company (please answer with number of years)?
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Marett, K., Xiao, S. & Kim, S. Security compliance and work-issued mobile devices: Out of sight, out of mind?. Inf Syst E-Bus Manage 21, 913–945 (2023). https://doi.org/10.1007/s10257-023-00654-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10257-023-00654-y