419
Views
8
CrossRef citations to date
0
Altmetric
Articles

Impact of negative emotions on violations of information security policy and possible mitigations

, , &
Pages 2342-2354 | Received 24 Nov 2019, Accepted 19 Apr 2021, Published online: 03 May 2021

References

  • Anderson, C. L., and R. Agarwal. 2010. “Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions.” MIS Quarterly 34 (3): 613–643.
  • Anderson, C., R. L. Baskervill, and M. Kaul. 2017. “Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information.” Journal of Management Information Systems 34 (3): 1082–1112.
  • Armeli, S., R. Eisebverger, P. Fasolo, and P. Lynch. 1998. “Perceived Organizational Support and Police Performance: The Moderating Influence of Socioemotional Needs.” Journal of Applied Psychology 83: 288–297.
  • Baxter, W. L., M. Aurisicchio, and P. R. N. Childs. 2015. “A Psychological Ownership Approach to Designing Object Attachment.” Journal of Engineering Design 26 (4-6): 140–156.
  • Beaudry, A., and A. Pinsonneault. 2010. “The Other Side of Acceptance: Studying the Direct and Indirect Effects of Emotions on Information Technology use.” MIS Quarterly 34 (4): 689–710.
  • Blau, P. M. 1964. Exchange and Power in Social Life. New York: Wiley.
  • Boss, S. R., D. F. Galletta, P. B. Lowry, G. D. Moody, and P. Polak. 2015. “What do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear That Motivate Protective Behaviors.” MIS Quarterly 39 (4): 837–864.
  • Burns, A. J., T. L. Roberts, C. Posey, and P. B. Lowry. 2019. “The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Engagement in Security-Based Precaution Taking.” Information Systems Research 30 (4): 1228–1247.
  • Chen, X., D. Wu, L. Chen, and J. K. L. Teng. 2018. “Sanction Severity and Employees’ Information Security Policy Compliance: Investigating Mediating, Moderating, and Control Variables.” Information & Management 55 (8): 1049–1060.
  • Cheng, L., Y. Li, W. Li, E. Holm, and Q. Zhai. 2013. “Understanding the Violation of is Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory.” Computers & Security 39 (39): 447–459.
  • Chowdhury, N. H., M. T. P. Adam, and G. Skinner. 2019. “The Impact of Time Pressure on Cybersecurity Behaviour: a Systematic Literature Review.” Behaviour & Information Technology 38 (12): 1290–1308.
  • Cram, W. A., J. G. Proudfoot, and J. D’Arcy. 2017. “Organizational Information Security Policies: A Review and Research Framework.” European Journal of Information Systems 26 (6): 605–641.
  • D’Arcy, J., and G. Greene. 2014. “Security Culture and the Employment Relationship as Drivers of Employees’ Security Compliance.” Information Management and Computer Security 22 (5): 474–489.
  • D’Arcy, J., and T. Herath. 2011. “A Review and Analysis of Deterrence Theory in the IS Security Literature: Making Sense of the Disparate Findings.” European Journal of Information Systems 20 (6): 643–658.
  • D’Arcy, J., T. Herath, and M. K. Shoss. 2014. “Understanding Employee Response to Stressful Information Security Requirement: A Coping Perspective.” Journal of Management Information Systems 31 (2): 285–318.
  • D’Arcy, J., and P. B. Lowry. 2019. “Cognitive-Affective Drivers of Employees’ Daily Compliance with Information Security Policies: A Multilevel, Longitudinal Study.” Information Systems Journal 29 (1): 43–69.
  • D’Arcy, J., and P. Teh. 2019. “Predicting Employee Information Security Policy Compliance on a Daily Basis: The Interplay of Security-Related Stress, Emotions, and Neutralization.” Information & Management 56 (7): 1–14.
  • Dawkins, S., A. W. Tian, A. Newman, and A. Martin. 2017. “Psychological Ownership: A Review and Research Agenda.” Journal of Organizational Behavior 38 (2): 163–183.
  • Dyne, L., and J. Pierce. 2004. “Psychological Ownership and Feelings of Possession: Three Field Studies Predicting Employee Attitudes and Organizational Citizenship Behavior.” Journal of Organizational Behavior 25 (4): 439–459.
  • Ehrhart, K. H., and J. C. Ziegert. 2005. “Why are Individuals Attracted to Organizations?” Journal of Management 31 (6): 901–919.
  • Eisenberger, R., S. Armeli, B. Rexwinkel, P. D. Lynch, and L. Rhoades. 2001. “Reciprocation of Perceived Organizational Support.” Journal of Applied Psychology 86 (1): 42–51.
  • Gulenko, I. 2014. “Improving Passwords: Influence of Emotions on Security Behavior.” Information Management & Computer Security 22 (2): 167–178.
  • Hoava, A., and F. F. Putri. 2016. “This is my Device! Why Should I Follow Your Rules? Employees’ Compliance with BYOD Security Policy.” Pervasive and Mobile Computing 32: 35–49.
  • Hsu, S. C., S. P. Shih, Y. W. Hung, and P. B. Lowry. 2015. “The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness.” Information Systems Research 26 (2): 282–300.
  • Izard, C. E. 2002. “Translating Emotion Theory and Research Into Preventive Interventions.” Psychological Bulletin 128 (5): 796–824.
  • Janssen, O., and N. W. Van Yperen. 2004. “Employees’ Goal Orientations, the Quality of Leader-Member Exchange, and the Outcomes of job Performance and job Satisfaction.” The Academy of Management Journal 47 (3): 368–384.
  • Johnston, A. C., M. Warkentin, and M. Siponen. 2015. “An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanction Rhetoric.” MIS Quarterly 39 (1): 113–134.
  • Kim, J., R. Baskerville, and E. Park. 2016. “A Model of Emotion and Computer Abuse.” Information & Management 53 (1): 91–108.
  • Kraimer, M. L., S. E. Seibert, S. J. Wayne, and R. C. Liden. 2011. “Antecedents and Outcomes of Organizational Support for Development: The Critical Role of Career Opportunities.” Journal of Applied Psychology 96 (3): 485–500.
  • Lee, C., C. G. Lee, and S. Kim. 2016. “Understanding Information Security Stress: Focusing on the Type of Information Security Compliance Activity.” Computers & Security 59 (C): 60–70.
  • Li, Y., N. Zhang, and M. Siponen. 2019. “Keeping Secure to the end: A Longterm Perspective to Understand Employees’ Consequence-Delayed Information Security Violation.” Behaviour & Information Technology 38 (5): 435–453.
  • Liang, H., N. Saraf, Q. Hu, and Y. Xue. 2007. “Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of top Management.” MIS Quarterly 31 (1): 59–87.
  • Liang, H., Y. Xue, A. Pinsonneault, and Y. Wu. 2019. “What Users do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective.” MIS Quarterly 43 (2): 373–394.
  • Liang, H., Y. Xue, and L. Wu. 2013. “Ensuring Employees’ IT Compliance: Carrot or Stick?” Information Systems Research 24 (2): 279–294.
  • Malik, P., and P. Garg. 2017. “Learning Organization and Work Engagement: The Mediating Role of Employee Resilience.” The International Journal of Human Resource Management 31 (8): 1071–1094.
  • Menard, P., M. Warkentin, and P. B. Lowry. 2018. “The Impact of Collectivism and Psychological Ownership on Protection Motivation: A Cross-Cultural Examination.” Computers & Security 75: 147–166.
  • Moorman, R. H., and G. L. Blakely. 1995. “Individualism-collectivism as an Individual Difference Predictor of Organizational Citizenship Behavior.” Journal of Organizational Behavior 16 (2): 127–142.
  • Park, C. H., W. Kim, and J. H. Song. 2015. “The Impact of Ethical Leadership on Employees’ in-Role Performance: The Mediating Effect of Employees’ Psychological Ownership.” Human Resource Development Quarterly 26 (4): 385–408.
  • Pham, H., J. EI-den, and J. Richardson. 2016. “Stress-based Security Compliance Model–An Exploratory Study.” Information & Computer Security 24 (4): 326–347.
  • Pierce, J. L., and I. Jussila. 2010. “Collective Psychological Ownership Within the Work and Organizational Context: Construct Introduction and Elaboration.” Journal of Organizational Behavior 31 (6): 810–834.
  • Pierce, J. L., T. Kostova, and K. T. Dirks. 2003. “The State of Psychological Ownership: Integrating and Extending a Century of Research.” Review of General Psychology 7 (1): 84–107.
  • Pierce, J. L., S. A. Rubenfeld, and S. Morgan. 1991. “Employee Ownership: A Conceptual Model of Process and Effects.” The Academy of Management Review 16 (1): 121–144.
  • Qin, X., M. Huang, R. E. Johnson, Q. Hu, and D. Ju. 2018. “The Short-Lived Benefits of Abusive Supervisory Behavior for Actors: An Investigation of Recovery and Work Engagement.” Academy of Management Journal 61 (5): 1951–1975.
  • Rhoades, L., and R. Eisenberger. 2002. “Perceived Organizational Support: A Review of the Literature.” Journal of Applied Psychology 87 (4): 698–714.
  • Salanova, M., S. Agut, and J. M. Peiro. 2005. “Linking Organizational Resources and Work Engagement to Employee Performance and Customer Loyalty: the Mediation of Service Climate.” Journal of Applied Psychology 90 (6): 1217–1227.
  • Schaufeli, W. B., A. B. Bakker, and W. Van Rhenen. 2009. “How Changes in job Demands and Resources Predict Burnout, Work Engagement, and Sickness Absenteeism.” Journal of Organizational Behavior 30 (7): 893–917.
  • Schaufeli, W. B., M. Salanova, V. González-Romá, and A. B. Bakker. 2002. “The Measurement of Burnout and Engagement: A Confirmatory Factor Analytic Approach.” Journal of Happiness Studies 3 (1): 71–92.
  • Shantz, A., K. Alfes, E. Truss, and E. Soane. 2013. “The Role of Employee Engagement in the Relationship Between job Design and Task Performance, Citizenship and Deviant Behaviours.” The International Journal of Human Resource Management 24 (13): 2608–2627.
  • Shropshire, J., M. Warkentin, and S. Sharma. 2015. “Personality, Attitudes, and Intentions: Predicting Initial Adoption of Information Security Behavior.” Computers & Security 49: 177–191.
  • Siponen, M., and A. Vance. 2014. “Guidelines for Improving the Contextual Relevance of Field Surveys: The Case of Information Security Policy Violations.” European Journal of Information Systems 23 (3): 289–305.
  • Son, J. 2011. “Out Fear or Desire? Toward a Better Understanding of Employees’.” motivation to Follow IS Security Policies. Information & Management 48 (7): 296–302.
  • Vance, A., S. J. B. Fellow, M. T. Siponen, and D. W. Straub. 2019. “Effects of Sanctions, Moral Beliefs, and Neutralization on Information Security Policy Violations Across Cultures.” Information & Management 57 (4): 103212.
  • Van Wingerden, J., D. A. J. A. Derks-Theunissen, and A. B. Bakker. 2017. “The Impact of Personal Resources and job Crafting Interventions on Work Engagement and Performance.” Human Resource Management 56 (1): 51–67.
  • Wayne, S. J., L. M. Shore, and R. C. Liden. 1997. “Perceived Organizational Support and Leader-Member Exchange: A Social Exchange Perspective.” The Academy of Management Journal 40 (1): 82–111.
  • Xue, Y., H. Liang, and L. Wu. 2011. “Punishment, Justice, and Compliance with Mandatory IT Usage.” Information Systems Research 22 (2): 400–414.
  • Yoo, C. W., G. L. Sanders, and R. P. Cerveny. 2018. “Exploring the Influence of Flow and Psychological Ownership on Security Education, Training and Awareness Effectiveness and Security Compliance.” Decision Support Systems 108: 107–118.
  • Zhang, X., L. Ma, B. Xu, and F. Xu. 2018. “How Social Media Usage Affects Employees’ job Satisfaction and Turnover Intention: an Empirical Study in China.” Information & Management 56 (6): 1–12.
  • Zhen, J., Z. Xie, and K. Dong. 2020. “Positive Emotions and Employees’ Protection-Motivated Behaviours: A Moderated Mediation Model.” Journal of Business Economics and Management 21 (5): 1466–1485.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.