IS

Shoss, Mindy K.

Topic Weight Topic Terms
0.292 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.259 research study influence effects literature theoretical use understanding theory using impact behavior insights examine influences
0.109 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

D'Arcy, John 1 Herath, Tejaswini C. 1
coping theory 1 ethical orientation 1 information security 1 moral disengagement theory 1
sanctions 1 security compliance 1 security policies 1 security policy violation 1
social cognitive theory 1 technostress 1 workplace stress 1

Articles (1)

Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective (Journal of Management Information Systems, 2014)
Authors: Abstract:
    We use coping theory to explore an underlying relationship between employee stress caused by burdensome, complex, and ambiguous information security requirements (termed “security-related stress” or SRS) and deliberate information security policy (ISP) violations. Results from a survey of 539 employee users suggest that SRS engenders an emotion-focused coping response in the form of moral disengagement from ISP violations, which in turn increases one’s susceptibility to this behavior. Our multidimensional view of SRS—comprised of security-related overload, complexity, and uncertainty—offers a new perspective on the workplace environment factors that foster noncompliant user behavior and inspire cognitive rationalizations of such behavior. The study extends technostress research to the information systems security domain and provides a theoretical framework for the influence of SRS on user behavior. For practitioners, the results highlight the incidence of SRS in organizations and suggest potential mechanisms to counter the stressful effects of information security requirements.