POSITIVE EMOTIONS AND EMPLOYEES' PROTECTION-MOTIVATED BEHAVIOURS: A MODERATED MEDIATION MODEL

被引:11
作者
Zhen, Jie [1 ]
Xie, Zongxiao [2 ]
Dong, Kunxiang [3 ]
机构
[1] Chongqing Technol & Business Univ, Sch Business Planning, Chongqing, Peoples R China
[2] China Financial Certificat Author, Beijing, Peoples R China
[3] Shandong Univ Finance & Econ, Sch Management Sci & Engn, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
protection-motivated behaviours; positive emotions; information security awareness; self-efficacy; protection motivation theory; broaden-and-build theory; INFORMATION SECURITY AWARENESS; POLICY COMPLIANCE; FEAR APPEALS; SYSTEMS; RESOURCE; INSIGHTS; THREATS; IMPACT; ANTECEDENTS; PERFORMANCE;
D O I
10.3846/jbem.2020.13169
中图分类号
F [经济];
学科分类号
02 ;
摘要
This study explores the relationship between positive emotions and protection-motivated behaviours by focusing on the mediating role of self-efficacy and the moderating role of information security awareness. Based on a sample of 215 full-time employees from various organizations in China, the results of hierarchical regression and moderated path analysis indicate that positive emotions positively influence protection-motivated behaviours, and self-efficacy partially mediates this relationship. In addition, information security awareness has a positive moderating effect on the relationships between positive emotions and self-efficacy and between self-efficacy and protection-motivated behaviours. Furthermore, the findings show that information security awareness has a positive moderating effect on the mediating effect of self-efficacy between positive emotions and protection-motivated behaviours. The theoretical and practical implications of these results, as well as directions for future research, are discussed.
引用
收藏
页码:1466 / 1485
页数:20
相关论文
共 58 条
  • [1] Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures
    Ahlan, Abdul Rahman
    Lubis, Muharman
    Lubis, Arif Ridho
    [J]. THIRD INFORMATION SYSTEMS INTERNATIONAL CONFERENCE 2015, 2015, 72 : 361 - 373
  • [2] Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
    Anderson, Chad
    Baskerville, Richard L.
    Kaul, Mala
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2017, 34 (04) : 1082 - 1112
  • [3] ASSESSING CONSTRUCT-VALIDITY IN ORGANIZATIONAL RESEARCH
    BAGOZZI, RP
    LI, YJ
    PHILLIPS, LW
    [J]. ADMINISTRATIVE SCIENCE QUARTERLY, 1991, 36 (03) : 421 - 458
  • [4] Beaudry A, 2010, MIS QUART, V34, P689
  • [5] Determinants of early conformance with information security policies
    Belanger, France
    Collignon, Stephane
    Enget, Kathryn
    Negangard, Eric
    [J]. INFORMATION & MANAGEMENT, 2017, 54 (07) : 887 - 901
  • [6] Understanding information systems continuance: An expectation-confirmation model
    Bhattacherjee, A
    [J]. MIS QUARTERLY, 2001, 25 (03) : 351 - 370
  • [7] A DYNAMIC PERSPECTIVE ON AFFECT AND CREATIVITY
    Bledow, Ronald
    Rosing, Kathrin
    Frese, Michael
    [J]. ACADEMY OF MANAGEMENT JOURNAL, 2013, 56 (02) : 432 - 450
  • [8] WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS
    Boss, Scott R.
    Galletta, Dennis F.
    Lowry, Paul Benjamin
    Moody, Gregory D.
    Polak, Peter
    [J]. MIS QUARTERLY, 2015, 39 (04) : 837 - U461
  • [9] Bulgurcu B, 2010, MIS QUART, V34, P523
  • [10] The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking
    Burns, A. J.
    Roberts, Tom L.
    Posey, Clay
    Lowry, Paul Benjamin
    [J]. INFORMATION SYSTEMS RESEARCH, 2019, 30 (04) : 1228 - 1247