Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective

被引:357
作者
D'Arcy, John [1 ]
Herath, Tejaswini [2 ]
Shoss, Mindy K. [3 ]
机构
[1] Univ Delaware, Newark, DE 19716 USA
[2] Brock Univ, St Catharines, ON L2S 3A1, Canada
[3] St Louis Univ, St Louis, MO 63103 USA
关键词
coping theory; ethical orientation; information security; moral disengagement theory; sanctions; security compliance; security policies; security policy violation; social cognitive theory; technostress; workplace stress; MORAL DISENGAGEMENT; POLICY COMPLIANCE; BEHAVIORAL-RESEARCH; DETERRENCE; TECHNOLOGY; MODEL; JOB; TECHNOSTRESS; CHALLENGE; RESOURCES;
D O I
10.2753/MIS0742-1222310210
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We use coping theory to explore an underlying relationship between employee stress caused by burdensome, complex, and ambiguous information security requirements (termed "security-related stress" or SRS) and deliberate information security policy (ISP) violations. Results from a survey of 539 employee users suggest that SRS engenders an emotion-focused coping response in the form of moral disengagement from ISP violations, which in turn increases one's susceptibility to this behavior. Our multidimensional view of SRS-comprised of security-related overload, complexity, and uncertainty-offers a new perspective on the workplace environment factors that foster noncompliant user behavior and inspire cognitive rationalizations of such behavior. The study extends technostress research to the information systems security domain and provides a theoretical framework for the influence of SRS on user behavior. For practitioners, the results highlight the incidence of SRS in organizations and suggest potential mechanisms to counter the stressful effects of information security requirements.
引用
收藏
页码:285 / 318
页数:34
相关论文
共 75 条
[51]   Differential challenge stressor-hindrance stressor relationships with job attitudes, turnover intentions, turnover, and withdrawal behavior: A meta-analysis [J].
Podsakoff, Nathan P. ;
LePine, Jeffery A. ;
LePine, Marcie A. .
JOURNAL OF APPLIED PSYCHOLOGY, 2007, 92 (02) :438-454
[52]   Common method biases in behavioral research: A critical review of the literature and recommended remedies [J].
Podsakoff, PM ;
MacKenzie, SB ;
Lee, JY ;
Podsakoff, NP .
JOURNAL OF APPLIED PSYCHOLOGY, 2003, 88 (05) :879-903
[53]  
Posey C., 2011, Journal of Information Systems Security, V7, P24
[54]   Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes [J].
Posey, Clay ;
Bennett, Rebecca J. ;
Roberts, Tom L. .
COMPUTERS & SECURITY, 2011, 30 (6-7) :486-497
[55]   Evaluating information security tradeoffs: Restricting access can interfere with user tasks [J].
Post, Gerald V. ;
Kagan, Albert .
COMPUTERS & SECURITY, 2007, 26 (03) :229-237
[56]  
PricewaterhouseCoopers, 2013, GLOB STAT INF SEC SU
[57]  
Puhakainen P, 2010, MIS QUART, V34, P757
[58]   The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation [J].
Ragu-Nathan, T. S. ;
Tarafdar, Monideepa ;
Ragu-Nathan, Bhanu S. ;
Tu, Qiang .
INFORMATION SYSTEMS RESEARCH, 2008, 19 (04) :417-433
[59]   Can "Good" Stressors Spark "Bad" Behaviors? The Mediating Role of Emotions in Links of Challenge and Hindrance Stressors With Citizenship and Counterproductive Behaviors [J].
Rodell, Jessica B. ;
Judge, Timothy A. .
JOURNAL OF APPLIED PSYCHOLOGY, 2009, 94 (06) :1438-1451
[60]   Honesty Requires Time (and Lack of Justifications) [J].
Shalvi, Shaul ;
Eldar, Ori ;
Bereby-Meyer, Yoella .
PSYCHOLOGICAL SCIENCE, 2012, 23 (10) :1264-1270