4.5 Article

Association between stress and information security policy non-compliance behavior: A meta-analysis

Related references

Note: Only part of the references are listed.
Article Business

Organizational science and cybersecurity: abundant opportunities for research at the interface

Reeshad S. Dalal et al.

Summary: This article introduces the current status of organizational science research in the field of cybersecurity, emphasizes the importance of human factors in cybersecurity research, and proposes an agenda for future organizational science research in the field of cybersecurity.

JOURNAL OF BUSINESS AND PSYCHOLOGY (2022)

Article Information Science & Library Science

Technostress and its influence on employee information security policy compliance

Forough Nasirpouri Shadbad et al.

Summary: Technostress resulting from IT use can have negative impacts on employee compliance with information security policies, leading to rationalization of violations and engagement in non-compliant behaviors. Employing structural equation modeling techniques, this study reveals that techno-complexity, techno-invasion, and techno-insecurity are major factors contributing to higher levels of non-compliance with information security policies.

INFORMATION TECHNOLOGY & PEOPLE (2022)

Article Computer Science, Information Systems

Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour

Simon Trang et al.

Summary: This study explores the relationship between occupational stress, information security policy designs, and security behavior, finding that time constraints can lead to non-compliance with ISP and that punishment can mitigate the effects of stress on ISP non-compliance. Additionally, the study extends previous findings by examining how stressful work environments and ISP designs shape compliance behavior.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

A meta-analysis of the deterrence theory in security-compliant and security-risk behaviors

Kuang-Ming Kuo et al.

COMPUTERS & SECURITY (2020)

Article Information Science & Library Science

Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study

John D'Arcy et al.

INFORMATION SYSTEMS JOURNAL (2019)

Article Computer Science, Information Systems

Correlating human traits and cyber security behavior intentions

Margaret Gratian et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Enhancing security behaviour by supporting the user

Steven Furnell et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE

Gregory D. Moody et al.

MIS QUARTERLY (2018)

Article Computer Science, Information Systems

The effect of resilience and job stress on information security awareness

Agata McCormac et al.

INFORMATION AND COMPUTER SECURITY (2018)

Article Psychology, Multidisciplinary

Examining technostress creators and role stress as potential threats to employees' information security compliance

Inho Hwang et al.

COMPUTERS IN HUMAN BEHAVIOR (2018)

Article Computer Science, Information Systems

Organizational information security as a complex adaptive system: insights from three agent-based models

A. J. Burns et al.

INFORMATION SYSTEMS FRONTIERS (2017)

Article Computer Science, Information Systems

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric

Allen C. Johnston et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Towards analysing the rationale of information security noncompliance: Devising a Value-Based Compliance analysis method

Ella Kolkowska et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2017)

Article Mathematical & Computational Biology

Introduction, comparison, and validation of Meta-Essentials: A free and simple tool for meta-analysis

Robert Suurmond et al.

RESEARCH SYNTHESIS METHODS (2017)

Article Computer Science, Information Systems

Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study

Puhakainen et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Technostress: Technological Antecedents and Implications

Ayyagari et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Beyond Deterrence: An Expanded View of Employee Computer Abuse

Robert Willison et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Understanding information security stress: Focusing on the type of information security compliance activity

Chunghun Lee et al.

COMPUTERS & SECURITY (2016)

Article Psychology, Multidisciplinary

Anxiety about internet hacking: Results from a community sample

Jon D. Elhai et al.

COMPUTERS IN HUMAN BEHAVIOR (2016)

Article Psychology, Multidisciplinary

An information security knowledge sharing model in organizations

Nader Sohrabi Safa et al.

COMPUTERS IN HUMAN BEHAVIOR (2016)

Article Hospitality, Leisure, Sport & Tourism

Impact of Job Burnout on Satisfaction and Turnover Intention: Do Generational Differences Matter?

Allan Cheng Chieh Lu et al.

JOURNAL OF HOSPITALITY & TOURISM RESEARCH (2016)

Article Psychology, Multidisciplinary

Cyberloafing and job burnout: An investigation in the knowledge-intensive sector

Asal Aghaz et al.

COMPUTERS IN HUMAN BEHAVIOR (2016)

Article Computer Science, Information Systems

Information security conscious care behaviour formation in organizations

Nader Sohrabi Safa et al.

COMPUTERS & SECURITY (2015)

Article Business

Workplace Dignity: Communicating Inherent, Earned, and Remediated Dignity

Kristen Lucas

JOURNAL OF MANAGEMENT STUDIES (2015)

Article Computer Science, Information Systems

Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations

Mikko Siponen et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2014)

Article Computer Science, Information Systems

Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective

John D'Arcy et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2014)

Article Computer Science, Information Systems

Future directions for behavioral information security research

Robert E. Crossler et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Information Systems

Motivating IS security compliance: Insights from Habit and Protection Motivation Theory

Anthony Vance et al.

INFORMATION & MANAGEMENT (2012)

Article Computer Science, Information Systems

Organizations' Information Security Policy Compliance: Stick or Carrot Approach?

Yan Chen et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2012)

Article Communication

Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email

Jingguo Wang et al.

IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION (2012)

Article Computer Science, Hardware & Architecture

Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?

Qing Hu et al.

COMMUNICATIONS OF THE ACM (2011)

Article Computer Science, Information Systems

The influence of the informal social learning environment on information privacy policy compliance efficacy and intention

Merrill Warkentin et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2011)

Article Computer Science, Information Systems

Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies

Jai-Yeol Son

INFORMATION & MANAGEMENT (2011)

Article Computer Science, Information Systems

Impact of Technostress on End-User Satisfaction and Performance

Monideepa Tarafdar et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2010)

Article Computer Science, Artificial Intelligence

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

Tejaswini Herath et al.

DECISION SUPPORT SYSTEMS (2009)

Article Computer Science, Information Systems

If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security

Scott R. Boss et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Review Information Science & Library Science

The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation

T. S. Ragu-Nathan et al.

INFORMATION SYSTEMS RESEARCH (2008)

Article Computer Science, Information Systems

The impact of technostress on role stress and productivity

Monideepa Tarafdar et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2007)

Article Computer Science, Information Systems

Analysis of end user security behaviors

JM Stanton et al.

COMPUTERS & SECURITY (2005)

Article Psychology, Applied

Job burnout

JM Angerer

JOURNAL OF EMPLOYMENT COUNSELING (2003)

Review Psychology

Job burnout

C Maslach et al.

ANNUAL REVIEW OF PSYCHOLOGY (2001)