An Exploratory Study of the Approach to Bring Your Own Device (BYOD) in Assuring Information Security