메뉴 건너뛰기




Volumn 31, Issue 2, 2014, Pages 285-318

Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective

Author keywords

coping theory; ethical orientation; information security; moral disengagement theory; sanctions; security compliance; security policies; security policy violation; social cognitive theory; technostress; workplace stress

Indexed keywords

BEHAVIORAL RESEARCH; CRYPTOGRAPHY; PERSONNEL; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84926419890     PISSN: 07421222     EISSN: 1557928X     Source Type: Journal    
DOI: 10.2753/MIS0742-1222310210     Document Type: Article
Times cited : (415)

References (74)
  • 1
    • 85047684662 scopus 로고    scopus 로고
    • Effects of computer surveillance on perceptions of privacy and procedural justice
    • Alge, B. J. Effects of computer surveillance on perceptions of privacy and procedural justice. Journal of Applied Psychology, 86, 4 (2001), 797-804.
    • (2001) Journal of Applied Psychology , vol.86 , Issue.4 , pp. 797-804
    • Alge, B.J.1
  • 2
    • 77955039272 scopus 로고    scopus 로고
    • Team size, dispersion, and social loafing in technology-supported teams: A perspective on the theory of moral disengagement
    • Alnuaimi, O. A.; Robert, L. P.; and Maruping, L. M. Team size, dispersion, and social loafing in technology-supported teams: A perspective on the theory of moral disengagement. Journal of Management Information Systems, 27, 1 (Summer 2010), 203-230.
    • (2010) Journal of Management Information Systems , vol.27 , Issue.1 SUMMER , pp. 203-230
    • Alnuaimi, O.A.1    Robert, L.P.2    Maruping, L.M.3
  • 3
    • 77957077814 scopus 로고    scopus 로고
    • Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions
    • Anderson, C. L., and Agarwal, R. Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34, 3, (2010), 613-643.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.L.1    Agarwal, R.2
  • 4
    • 81355153720 scopus 로고    scopus 로고
    • Technostress: Technological antecedents and implications
    • Ayyagari, R.; Grover, V.; and Purvis, R. Technostress: Technological antecedents and implications. MIS Quarterly, 35, 4 (2011), 831-858.
    • (2011) MIS Quarterly , vol.35 , Issue.4 , pp. 831-858
    • Ayyagari, R.1    Grover, V.2    Purvis, R.3
  • 6
    • 0002915827 scopus 로고
    • Social cognitive theory of moral thought and action
    • In W. M. Kurtines and J. L. Gewitz (eds. ) Hillsdale, NJ: Lawrence Erlbaum
    • Bandura, A. Social cognitive theory of moral thought and action. In W. M. Kurtines and J. L. Gewitz (eds. ), Handbook of Moral Behavior and Development, vol. 1. Hillsdale, NJ: Lawrence Erlbaum, 1991, pp. 45-103.
    • (1991) Handbook of Moral Behavior and Development , vol.1 , pp. 45-103
    • Bandura, A.1
  • 11
    • 33645301638 scopus 로고    scopus 로고
    • Understanding user responses to information technology: A coping model of user adaptation
    • Beaudry, A., and Pinsonneault, A. Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29, 3 (2005), 493-524.
    • (2005) MIS Quarterly , vol.29 , Issue.3 , pp. 493-524
    • Beaudry, A.1    Pinsonneault, A.2
  • 13
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcu B.; Cavusoglu, H.; and Benbasat, I. Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34, 3 (2010), 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 14
    • 84877935501 scopus 로고    scopus 로고
    • Organizations' information security policy compliance: Stick or carrot approach
    • Chen, Y.; Ramamurthy, K.; and Wen, K.-W. Organizations' information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29, 3 (Winter 2012-13), 157-188.
    • (2012) Journal of Management Information Systems , vol.29 , Issue.3 WINTER , pp. 157-188
    • Chen, Y.1    Ramamurthy, K.2    Wen, K.-W.3
  • 15
  • 17
    • 77957341507 scopus 로고    scopus 로고
    • Linking job demands and resources to employee engagement and burnout: A theoretical extension and meta-analytic test
    • Crawford, E. R.; LePine, J. A.; and Rich, B. L. Linking job demands and resources to employee engagement and burnout: A theoretical extension and meta-analytic test. Journal of Applied Psychology, 95, 5 (2010), 834-848.
    • (2010) Journal of Applied Psychology , vol.95 , Issue.5 , pp. 834-848
    • Crawford, E.R.1    LePine, J.A.2    Rich, B.L.3
  • 19
    • 84870743776 scopus 로고    scopus 로고
    • Employee misuse of information technology resources: Testing a contemporary deterrence model
    • D'Arcy, J., and Devaraj, S. Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43, 6 (2012), 1091-1124.
    • (2012) Decision Sciences , vol.43 , Issue.6 , pp. 1091-1124
    • D'Arcy, J.1    Devaraj, S.2
  • 20
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence perspective
    • D'Arcy, J.; Hovav, A.; and Galletta, D. G. User awareness of security countermeasures and its impact on information systems misuse: A deterrence perspective. Information Systems Research, 20, 1 (2009), 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.G.3
  • 21
    • 41549124000 scopus 로고    scopus 로고
    • Moral disengagement in ethical decision making: A study of antecedents and outcomes
    • Detert, J. R.; Trevino, L. K.; and Sweitzer, V. L. Moral disengagement in ethical decision making: A study of antecedents and outcomes. Journal of Applied Psychology, 93, 2 (2008), 374-391.
    • (2008) Journal of Applied Psychology , vol.93 , Issue.2 , pp. 374-391
    • Detert, J.R.1    Trevino, L.K.2    Sweitzer, V.L.3
  • 25
    • 43949123279 scopus 로고    scopus 로고
    • A meta-analysis of work demand stressors and job performance: Examining main and moderating effects
    • Gilboa, S.; Shirom, A.; Fried, Y.; and Cooper, G. A meta-analysis of work demand stressors and job performance: Examining main and moderating effects. Personnel Psychology, 61, 2 (2008), 227-271.
    • (2008) Personnel Psychology , vol.61 , Issue.2 , pp. 227-271
    • Gilboa, S.1    Shirom, A.2    Fried, Y.3    Cooper, G.4
  • 27
    • 81255163048 scopus 로고    scopus 로고
    • Understanding non-malicious security violations in the workplace: A composite behavior model
    • Guo, K. H.; Yuan, Y.; Archer, N. P.; and Connelly, C. E. Understanding non-malicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems, 28, 2 (Fall 2011), 203-236.
    • (2011) Journal of Management Information Systems , vol.28 , Issue.2 FALL , pp. 203-236
    • Guo, K.H.1    Yuan, Y.2    Archer, N.P.3    Connelly, C.E.4
  • 29
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Herath, T., and Rao, H. R. Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18, 2 (2009), 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 30
    • 84889663520 scopus 로고    scopus 로고
    • Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service
    • Herath, T.; Chen, R.; Wang, J.; Banjara, K.; Wilbur, J.; and Rao. H. R. Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service. Information Systems Journal, 24, 1 (2014), 61-84.
    • (2014) Information Systems Journal , vol.24 , Issue.1 , pp. 61-84
    • Herath, T.1    Chen, R.2    Wang, J.3    Banjara, K.4    Wilbur, J.5    Rao, H.R.6
  • 31
    • 0024632747 scopus 로고
    • Conservation of resources
    • Hobfoll, S. E. Conservation of resources. American Psychologist, 44, 3 (1989), 513-524.
    • (1989) American Psychologist , vol.44 , Issue.3 , pp. 513-524
    • Hobfoll, S.E.1
  • 32
    • 84863542038 scopus 로고    scopus 로고
    • Managing employee compliance with information security policies: The critical role of top management and organizational culture
    • Hu, Q.; Dinev, T.; Hart, P.; and Cooke, D. Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decision Sciences, 43, 4 (2012), 615-660.
    • (2012) Decision Sciences , vol.43 , Issue.4 , pp. 615-660
    • Hu, Q.1    Dinev, T.2    Hart, P.3    Cooke, D.4
  • 33
    • 79959944364 scopus 로고    scopus 로고
    • Does deterrence work in reducing information security policy abuse by employees
    • Hu, Q.; Zhengchuan, X.; Dinev, T.; and Ling, H. Does deterrence work in reducing information security policy abuse by employees? Communications of the ACM, 54, 6 (2011), 54-60.
    • (2011) Communications of the ACM , vol.54 , Issue.6 , pp. 54-60
    • Hu, Q.1    Zhengchuan, X.2    Dinev, T.3    Ling, H.4
  • 34
    • 0242424963 scopus 로고    scopus 로고
    • A critical review of construct indicators and measurement model misspecification in marketing and consumer research
    • Jarvis, C. B.; MacKenzie, S. B.; and Podsakoff, P. M. A critical review of construct indicators and measurement model misspecification in marketing and consumer research. Journal of Consumer Research, 30, 2 (2003), 199-218.
    • (2003) Journal of Consumer Research , vol.30 , Issue.2 , pp. 199-218
    • Jarvis, C.B.1    MacKenzie, S.B.2    Podsakoff, P.M.3
  • 35
    • 76449087987 scopus 로고    scopus 로고
    • Bad apples, bad cases, and bad barrels: Meta-analytic evidence about sources of unethical decisions at work
    • Kish-Gephart, J. J.; Harrison, D. A.; and Trevino, L. K. Bad apples, bad cases, and bad barrels: Meta-analytic evidence about sources of unethical decisions at work. Journal of Applied Psychology, 95, 1 (2010), 1-31.
    • (2010) Journal of Applied Psychology , vol.95 , Issue.1 , pp. 1-31
    • Kish-Gephart, J.J.1    Harrison, D.A.2    Trevino, L.K.3
  • 36
    • 84898403246 scopus 로고    scopus 로고
    • Healthcare security strategies for information security and regulatory compliance
    • Kwon, J., and Johnson, M. E. Healthcare security strategies for information security and regulatory compliance. Journal of Management Information Systems, 30, 2 (Fall 2013), 41-66.
    • (2013) Journal of Management Information Systems , vol.30 , Issue.2 FALL , pp. 41-66
    • Kwon, J.1    Johnson, M.E.2
  • 39
    • 28744432352 scopus 로고    scopus 로고
    • A meta-analytic test of the challenge stressor-hindrance stressor framework: An explanation for inconsistent relationships among stressors and performance
    • LePine, J. A.; Podsakoff, N. P.; and LePine, M. A. A meta-analytic test of the challenge stressor-hindrance stressor framework: An explanation for inconsistent relationships among stressors and performance. Journal of Applied Psychology, 48, 5 (2005), 764-775.
    • (2005) Journal of Applied Psychology , vol.48 , Issue.5 , pp. 764-775
    • LePine, J.A.1    Podsakoff, N.P.2    LePine, M.A.3
  • 40
    • 75349090403 scopus 로고    scopus 로고
    • Understanding compliance with Internet use policy from the perspective of rational choice theory
    • Li, H.; Zhang, J.; and Sarathy, R. Understanding compliance with Internet use policy from the perspective of rational choice theory. Decision Support Systems, 48, 4 (2010), 635-645.
    • (2010) Decision Support Systems , vol.48 , Issue.4 , pp. 635-645
    • Li, H.1    Zhang, J.2    Sarathy, R.3
  • 41
    • 60649084770 scopus 로고    scopus 로고
    • Avoidance of information technology threats: A theoretical perspective
    • Liang, H., and Xue, Y. Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33, 1 (2009), 71-90.
    • (2009) MIS Quarterly , vol.33 , Issue.1 , pp. 71-90
    • Liang, H.1    Xue, Y.2
  • 42
    • 0142123338 scopus 로고    scopus 로고
    • The IT way of loafing on the job: Cyberloafing, neutralizing, and organizational justice
    • Lim, V. K. G. The IT way of loafing on the job: Cyberloafing, neutralizing, and organizational justice. Journal of Organizational Behavior, 23, 5 (2002), 675-694.
    • (2002) Journal of Organizational Behavior , vol.23 , Issue.5 , pp. 675-694
    • Lim, V.K.G.1
  • 43
    • 80051733015 scopus 로고    scopus 로고
    • Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques
    • MacKenzie, S. B.; Podsakoff, P. M.; and Podsakoff, N. P. Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35, 2 (2011), 293-334.
    • (2011) MIS Quarterly , vol.35 , Issue.2 , pp. 293-334
    • MacKenzie, S.B.1    Podsakoff, P.M.2    Podsakoff, N.P.3
  • 44
    • 84857478874 scopus 로고    scopus 로고
    • Why employees do bad things: Moral disengagement and unethical organizational behavior
    • Moore, C.; Detert, J. R.; Trevino, L. K.; Baker, V. I.; and Mayer, D. M. Why employees do bad things: Moral disengagement and unethical organizational behavior. Personnel Psychology, 65, 1 (2012), 1-48.
    • (2012) Personnel Psychology , vol.65 , Issue.1 , pp. 1-48
    • Moore, C.1    Detert, J.R.2    Trevino, L.K.3    Baker, V.I.4    Mayer, D.M.5
  • 45
    • 0039302410 scopus 로고
    • Individual adjustment during technological innovation: A research framework
    • Nelson, D., and Kletke, M. G. Individual adjustment during technological innovation: A research framework. Behavior and Information Technology, 9, 4 (1995), 257-271.
    • (1995) Behavior and Information Technology , vol.9 , Issue.4 , pp. 257-271
    • Nelson, D.1    Kletke, M.G.2
  • 46
    • 0030521693 scopus 로고    scopus 로고
    • Sanction threats and appeals to morality: Testing a rational choice model of corporate crime
    • Paternoster, R., and Simpson, S. Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law & Society Review, 30, 3 (1996), 549-584.
    • (1996) Law & Society Review , vol.30 , Issue.3 , pp. 549-584
    • Paternoster, R.1    Simpson, S.2
  • 47
    • 64249147797 scopus 로고    scopus 로고
    • Coping with challenge and hindrance stressors in teams: Behavioral, cognitive, and affective outcomes
    • Pearsall, M. J.; Ellis, A. P. J.; and Steinm, J. H. Coping with challenge and hindrance stressors in teams: Behavioral, cognitive, and affective outcomes. Organizational Behavior and Human Decision Processes, 109, 1 (2009), 18-28.
    • (2009) Organizational Behavior and Human Decision Processes , vol.109 , Issue.1 , pp. 18-28
    • Pearsall, M.J.1    Ellis, A.P.J.2    Steinm, J.H.3
  • 48
    • 0033442650 scopus 로고    scopus 로고
    • An examination of attributions and emotions in the transactional approach to organizational stress process
    • Perrewe, P. L., and Zellars, K. L. An examination of attributions and emotions in the transactional approach to organizational stress process. Journal of Organizational Behavior, 20, 5 (1999), 739-752.
    • (1999) Journal of Organizational Behavior , vol.20 , Issue.5 , pp. 739-752
    • Perrewe, P.L.1    Zellars, K.L.2
  • 49
    • 33947416694 scopus 로고    scopus 로고
    • Differential challenge stressor-hindrance stressor relationships with job attitudes, turnover intentions, turnover, and withdrawal behavior: A meta-analysis
    • Podsakoff, N. P.; LePine, J. A.; and LePine, M. A. Differential challenge stressor-hindrance stressor relationships with job attitudes, turnover intentions, turnover, and withdrawal behavior: A meta-analysis. Journal of Applied Psychology, 92, 2 (2007), 438-454.
    • (2007) Journal of Applied Psychology , vol.92 , Issue.2 , pp. 438-454
    • Podsakoff, N.P.1    LePine, J.A.2    LePine, M.A.3
  • 50
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • Podsakoff, P. M.; MacKenzie, S. B.; Lee, J. Y.; and Podsakoff, N. P. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 5 (2003), 879-903.
    • (2003) Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    MacKenzie, S.B.2    Lee, J.Y.3    Podsakoff, N.P.4
  • 51
    • 80051795854 scopus 로고    scopus 로고
    • Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes
    • Posey, C.; Bennett, R. J.; and Roberts, T. L. Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes. Computers & Security, 30, 6 (2011), 486-497.
    • (2011) Computers & Security , vol.30 , Issue.6 , pp. 486-497
    • Posey, C.1    Bennett, R.J.2    Roberts, T.L.3
  • 52
    • 84875487357 scopus 로고    scopus 로고
    • When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse
    • Posey, C.; Bennett, R. J.; Roberts, T. L.; and Lowry, P. B. When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse. Journal of Information Systems Security, 7, 1 (2011), 24-47.
    • (2011) Journal of Information Systems Security , vol.7 , Issue.1 , pp. 24-47
    • Posey, C.1    Bennett, R.J.2    Roberts, T.L.3    Lowry, P.B.4
  • 53
    • 34248334263 scopus 로고    scopus 로고
    • Evaluating information security tradeoffs: Restricting access can interfere with user tasks
    • Post, G. V., and Kagan, A. Evaluating information security tradeoffs: Restricting access can interfere with user tasks. Computers & Security, 26, 3 (2007), 229-237.
    • (2007) Computers & Security , vol.26 , Issue.3 , pp. 229-237
    • Post, G.V.1    Kagan, A.2
  • 55
    • 78650770842 scopus 로고    scopus 로고
    • Improving employees' compliance through information systems security training: An action research study
    • Puhakainen, P., and Siponen, M. Improving employees' compliance through information systems security training: An action research study. MIS Quarterly, 34, 4 (2010), 757-778.
    • (2010) MIS Quarterly , vol.34 , Issue.4 , pp. 757-778
    • Puhakainen, P.1    Siponen, M.2
  • 56
    • 61349088062 scopus 로고    scopus 로고
    • The consequences of technostress for end users in organizations: Conceptual development and empirical validation
    • Ragu-Nathan, T. S.; Tarafdar, M.; and Ragu-Nathan, B. S. The consequences of technostress for end users in organizations: Conceptual development and empirical validation. Information Systems Research, 19, 4 (2008), 417-433.
    • (2008) Information Systems Research , vol.19 , Issue.4 , pp. 417-433
    • Ragu-Nathan, T.S.1    Tarafdar, M.2    Ragu-Nathan, B.S.3
  • 57
    • 72249121847 scopus 로고    scopus 로고
    • Can "good" stressors spark "bad" behaviors? the mediating role of emotions in links of challenge and hindrance stressors with citizenship and counterproductive behaviors
    • Rodell, J. B., and Judge, T. A. Can "good" stressors spark "bad" behaviors? The mediating role of emotions in links of challenge and hindrance stressors with citizenship and counterproductive behaviors. Journal of Applied Psychology, 94, 6 (2009), 1438-1451.
    • (2009) Journal of Applied Psychology , vol.94 , Issue.6 , pp. 1438-1451
    • Rodell, J.B.1    Judge, T.A.2
  • 58
    • 84867631863 scopus 로고    scopus 로고
    • Honesty requires time (and lack of justifications)
    • Shalvi, S.; Eldar, O.; and Bereby-Meyer, Y. Honesty requires time (and lack of justifications). Psychological Science, 23, 10 (2012), 1264-1270.
    • (2012) Psychological Science , vol.23 , Issue.10 , pp. 1264-1270
    • Shalvi, S.1    Eldar, O.2    Bereby-Meyer, Y.3
  • 59
    • 79751492511 scopus 로고    scopus 로고
    • Dishonest deed, clear conscience: When cheating leads to moral disengagement and motivated forgetting
    • Shu, L. L.; Gino, F.; and Bazerman, M. H. Dishonest deed, clear conscience: When cheating leads to moral disengagement and motivated forgetting. Personality and Social Psychology Bulletin, 37, 3 (2011), 330-349.
    • (2011) Personality and Social Psychology Bulletin , vol.37 , Issue.3 , pp. 330-349
    • Shu, L.L.1    Gino, F.2    Bazerman, M.H.3
  • 60
    • 8744290801 scopus 로고    scopus 로고
    • Critical analysis of different approaches to minimizing user-related faults in information systems security: Implications for research and practice
    • Siponen, M. Critical analysis of different approaches to minimizing user-related faults in information systems security: Implications for research and practice. Information Management & Computer Security, 8, 5 (2000), 197-209.
    • (2000) Information Management & Computer Security , vol.8 , Issue.5 , pp. 197-209
    • Siponen, M.1
  • 61
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • Siponen, M., and Vance, A. Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34, 3 (2010), 487-502.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 62
    • 84901290529 scopus 로고    scopus 로고
    • Guidelines for improving the contextual relevance of field surveys: The case of information security policy violations
    • Siponen, M., and Vance, A. Guidelines for improving the contextual relevance of field surveys: The case of information security policy violations. European Journal of Information Systems, 23, 3 (2014), 289-305.
    • (2014) European Journal of Information Systems , vol.23 , Issue.3 , pp. 289-305
    • Siponen, M.1    Vance, A.2
  • 63
    • 77957070672 scopus 로고    scopus 로고
    • User participation in information systems security risk management
    • Spears, J. L., and Barki, H. User participation in information systems security risk management. MIS Quarterly, 34, 3, (2010), 503-522.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 503-522
    • Spears, J.L.1    Barki, H.2
  • 65
    • 79953303602 scopus 로고    scopus 로고
    • Time and moral judgment
    • Suter, R. S., and Hertwig, R. Time and moral judgment. Cognition, 119, 3 (2011), 454-458.
    • (2011) Cognition , vol.119 , Issue.3 , pp. 454-458
    • Suter, R.S.1    Hertwig, R.2
  • 66
    • 0001155759 scopus 로고
    • Techniques of neutralization: A theory of delinquency
    • Sykes, G., and Matza, D. Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 6 (1957), 664-670.
    • (1957) American Sociological Review , vol.22 , Issue.6 , pp. 664-670
    • Sykes, G.1    Matza, D.2
  • 67
    • 79951919849 scopus 로고    scopus 로고
    • Impact of technostress on end-user satisfaction and performance
    • Tarafdar, M.; Tu, Q.; and Ragu-Nathan, T. S. Impact of technostress on end-user satisfaction and performance. Journal of Management Information Systems, 27, 3 (Winter 2010-11), 303-334.
    • (2010) Journal of Management Information Systems , vol.27 , Issue.3 WINTER , pp. 303-334
    • Tarafdar, M.1    Tu, Q.2    Ragu-Nathan, T.S.3
  • 69
    • 84876717966 scopus 로고    scopus 로고
    • Organizational security and the insider threat: Malicious, negligent, and wellmeaning insiders
    • Mountain View, CA
    • Wall, D. S. Organizational security and the insider threat: Malicious, negligent, and wellmeaning insiders. Symantec Research Report, Mountain View, CA, 2011.
    • (2011) Symantec Research Report
    • Wall, D.S.1
  • 70
    • 79955622246 scopus 로고    scopus 로고
    • The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
    • Warkentin, M.; Johnston, A. C.; and Shropshire, J. The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 20, 3 (2011), 267-284.
    • (2011) European Journal of Information Systems , vol.20 , Issue.3 , pp. 267-284
    • Warkentin, M.1    Johnston, A.C.2    Shropshire, J.3
  • 71
    • 84873974226 scopus 로고    scopus 로고
    • Beyond deterrence: An expanded view of employee computer abuse
    • Willison, R., and Warkentin, M. Beyond deterrence: An expanded view of employee computer abuse. MIS Quarterly, 37, 1 (2013), 1-20.
    • (2013) MIS Quarterly , vol.37 , Issue.1 , pp. 1-20
    • Willison, R.1    Warkentin, M.2
  • 74
    • 84883204511 scopus 로고    scopus 로고
    • Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements
    • Zhao, X.; Xue, L.; and Whinston, A. Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements. Journal of Management Information Systems, 30, 1 (Summer 2013), 123-152.
    • (2013) Journal of Management Information Systems , vol.30 , Issue.1 SUMMER , pp. 123-152
    • Zhao, X.1    Xue, L.2    Whinston, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.