Impact of negative emotions on violations of information security policy and possible mitigations

被引:13
作者
Zhen, Jie [1 ]
Xie, Zongxiao [2 ]
Dong, Kunxiang [3 ]
Chen, Lin [4 ]
机构
[1] Chongqing Technol & Business Univ, Sch Management Sci & Engn, Chongqing, Peoples R China
[2] China Financial Certificat Author, Beijing, Peoples R China
[3] Shandong Univ Finance & Econ, Sch Management Sci & Engn, Jinan, Peoples R China
[4] Shandong Univ Sci & Technol, Dept Publ Adm, Qingdao, Peoples R China
关键词
Perceived organisational support; psychological ownership; work engagement; negative emotions; intention to violate ISP; PERCEIVED ORGANIZATIONAL SUPPORT; LEADER-MEMBER EXCHANGE; PSYCHOLOGICAL OWNERSHIP; WORK ENGAGEMENT; EMPLOYEES; PERFORMANCE; RESOURCES; THREATS; COLLECTIVISM; CITIZENSHIP;
D O I
10.1080/0144929X.2021.1921029
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security research on the role of employees' negative emotions in their information security policy (ISP) violations is limited. In this study, we examine how employees' negative emotions influence their intention to violate ISP. To understand how to reduce employees' negative emotions, we investigate the effects of perceived organisational support, psychological ownership, and work engagement. We test our hypotheses using survey data of 318 employees from various organisations in China. Results indicate that employees with negative emotions are more likely to violate ISP, while perceived organisational support, psychological ownership, and work engagement can reduce employees' negative emotions. Furthermore, psychological ownership and work engagement partially mediate the relationship between perceived organisational support and negative emotions. The theoretical and practical significance of these results and the direction of future research are discussed.
引用
收藏
页码:2342 / 2354
页数:13
相关论文
共 58 条
[11]   Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory [J].
Cheng, Lijiao ;
Li, Ying ;
Li, Wenli ;
Holm, Eric ;
Zhai, Qingguo .
COMPUTERS & SECURITY, 2013, 39 :447-459
[12]   The impact of time pressure on cybersecurity behaviour: a systematic literature review [J].
Chowdhury, Noman H. ;
Adam, Marc T. P. ;
Skinner, Geoffrey .
BEHAVIOUR & INFORMATION TECHNOLOGY, 2019, 38 (12) :1290-1308
[13]   Organizational information security policies: a review and research framework [J].
Cram, W. Alec ;
Proudfoot, Jeffrey G. ;
D'Arcy, John .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2017, 26 (06) :605-641
[14]  
D'Arcy John, 2014, Information Management & Computer Security, V22, P474, DOI 10.1108/IMCS-08-2013-0057
[15]   Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization [J].
D'Arcy, John ;
Teh, Pei-Lee .
INFORMATION & MANAGEMENT, 2019, 56 (07)
[16]   Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study [J].
D'Arcy, John ;
Lowry, Paul Benjamin .
INFORMATION SYSTEMS JOURNAL, 2019, 29 (01) :43-69
[17]   Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective [J].
D'Arcy, John ;
Herath, Tejaswini ;
Shoss, Mindy K. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2014, 31 (02) :285-318
[18]   A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings [J].
D'Arcy, John ;
Herath, Tejaswini .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2011, 20 (06) :643-658
[19]   Psychological ownership: A review and research agenda [J].
Dawkins, Sarah ;
Tian, Amy Wei ;
Newman, Alexander ;
Martin, Angela .
JOURNAL OF ORGANIZATIONAL BEHAVIOR, 2017, 38 (02) :163-183
[20]   Why are individuals attracted to organizations? [J].
Ehrhart, KH ;
Ziegert, JC .
JOURNAL OF MANAGEMENT, 2005, 31 (06) :901-919