477
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Work-to-Home Cybersecurity Spillover: Construct Development and Validation

, ORCID Icon &

References

  • Ambulkar, S., Blackhurst, J., & Grawe, S. (2015). Firm’s resilience to supply chain disruptions: Scale development and empirical examination. Journal of Operations Management, 33(1), 111–122. https://doi.org/10.1016/j.jom.2014.11.002
  • Ameen, N., Tarhini, A., Shah, M. H., & Madichie, N. O. (2020). Employees’ behavioural intention to smartphone security: A gender-based, cross-national study. Computers in Human Behavior, 104, 106184. https://doi.org/10.1016/j.chb.2019.106184
  • Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643. https://doi.org/10.2307/25750694
  • Baillette, P., & Barlette, Y. (2020). Coping strategies and paradoxes related to BYOD information security threats in France. Journal of Global Information Management (JGIM), 28(2), 1–28. https://doi.org/10.4018/JGIM.2020040101
  • Barber, L. K., Taylor, S. G., Burton, J. P., & Bailey, S. F. (2017). A self-regulatory perspective of work-to-home undermining spillover/crossover: Examining the roles of sleep and exercise. Journal of Applied Psychology, 102(5), 753. https://doi.org/10.1037/apl0000196
  • Barlette, Y., Jaouen, A, & Baillette, P. (2021). Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers’ coping strategies. International Journal of Information Management, 56, 102212. https://doi.org/10.1016/j.ijinfomgt.2020.102212
  • Berkowsky, R. W. (2013). When you just cannot get away: Exploring the use of information and communication technologies in facilitating negative work/home spillover. Information, Communication & Society, 16(4), 519–541. https://doi.org/10.1080/1369118X.2013.772650
  • Browne, R. (2018). 70% of people globally work remotely at least once a week, study says. https://www.cnbc.com/2018/05/30/70-percent-of-people-globally-work-remotely-at-least-once-a-week-iwg-study.html
  • Carlson, D. S., Kacmar, K. M., Wayne, J. H., & Grzywacz, J. G. (2006). Measuring the positive side of the work–family interface: Development and validation of a work–family enrichment scale. Journal of Vocational Behavior, 68(1), 131–164. https://doi.org/10.1016/j.jvb.2005.02.002
  • Chen, H., Li, Y., Chen, L., & Yin, J. (2020). Understanding employees’ adoption of the bring-your-own-device (BYOD): The roles of information security-related conflict and fatigue. Journal of Enterprise Information Management, 34(3), 770–792. https://doi.org/10.1108/JEIM-10-2019-0318
  • Chen, Z., Powell, G. N., & Greenhaus, J. H. (2009). Work-to-family conflict, positive spillover, and boundary management: A person-environment fit approach. Journal of Vocational Vehavior, 74(1), 82–93. https://doi.org/10.1016/j.jvb.2008.10.009
  • Cho, V., & Ip, W. H. (2018). A study of BYOD adoption from the lens of threat and coping appraisal of its security policy. Enterprise Information Systems, 12(6), 659–673. https://doi.org/10.1080/17517575.2017.1404132
  • Dorik, N. (2019). User Risk Report 2019. https://technology-signals.com/user-risk-report-2018/
  • Edwards, J. R., & Rothbard, N. P. (2000). Mechanisms linking work and family: Clarifying the relationship between work and family constructs. Academy of Management Review, 25(1), 178–199. https://doi.org/10.2307/259269
  • Elf, P., Gatersleben, B., & Christie, I. (2019). Facilitating positive spillover effects: New insights from a mixed-methods approach exploring factors enabling people to live more sustainable lifestyles. Frontiers in Psychology, 9, 2699. https://doi.org/10.3389/fpsyg.2018.02699
  • Ertan, A., Crossland, G., Heath, C., Denny, D., & Jensen, R. (2020). Cyber security behaviour in organisations. https://doi.org/10.48550/arXiv.2004.11768
  • Greenhaus, J. H., & Powell, G. N. (2006). When work and family are allies: A theory of work-family enrichment. Academy of Management Review, 31(1), 72–92. https://doi.org/10.5465/amr.2006.19379625
  • Gregory, R. W., Kaganer, E., Henfridsson, O., & Ruch, T. J. (2018). IT consumerization and the transformation of IT governance. MIS Quarterly, 42(4), 1225–1253. doi:10.25300/MISQ/2018/13703.
  • Grotto, A. R., & Lyness, K. S. (2010). The costs of today’s jobs: Job characteristics and organizational supports as antecedents of negative spillover. Journal of Vocational Behavior, 76(3), 395–405. https://doi.org/10.1016/j.jvb.2009.09.004
  • Hanson, G. C., Colton, C. L., & Hammer, L. B. (2003). Development and validation of a multidimensional scale of work-family positive spillover. In 18th Annual Meeting of SIOP, Orlando (pp. 72–92).
  • Hanus, B., & Wu, Y. A. (2016). Impact of users’ security awareness on desktop security behavior: A protection motivation theory perspective. Information Systems Management, 33(1), 2–16. https://doi.org/10.1080/10580530.2015.1117842
  • Harris, J., Ives, B., & Junglas, I. (2012). IT consumerization: When gadgets turn into enterprise IT tools. MIS Quarterly Executive, 11(3), 99–112.
  • Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106–125. https://doi.org/10.1057/ejis.2009.6
  • Hooper, D., Coughlan, J., & Mullen, M. R. (2008). Structural equation modelling: Guidelines for determining model fit. Electronic Journal of Business Research Methods, 6(1), 53–60.
  • Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83–95. https://doi.org/10.1016/j.cose.2011.10.007
  • Jansen van Rensburg, S. K. (2021). End-user perceptions on information security: Pragmatic lessons on social engineering attacks in the workplace in Gauteng, South Africa. Journal of Global Information Management (JGIM), 29(6), 1–16. https://doi.org/10.4018/JGIM.293290
  • Javaid, M., Haleem, A., Singh, R. P., Haq, M. I. U., Raina, A., & Suman, R. (2020). Industry 5.0: Potential applications in COVID-19. Journal of Industrial Integration and Management, 5(4), 507–530. https://doi.org/10.1142/S2424862220500220
  • Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549–566. https://doi.org/10.2307/25750691
  • Juma’h, A. H., & Alnsour, Y. (2021). How do investors perceive the materiality of data security incidents. Journal of Global Information Management (JGIM), 29(6), 1–32. https://doi.org/10.4018/JGIM.20211101.oa4
  • Kreiner, G. E., Hollensbe, E. C., & Sheep, M. L. (2009). Balancing borders and bridges: Negotiating the work-home interface via boundary work tactics. Academy of Management Journal, 52(4), 704–730. https://doi.org/10.5465/amj.2009.43669916
  • Leiter, M. P., & Durup, M. J. (1996). Work, home, and in-between: A longitudinal study of spillover. The Journal of Applied Behavioral Science, 32(1), 29–47. https://doi.org/10.1177/0021886396321002
  • Lian, J. W. (2021). Understanding cloud-based BYOD information security protection behaviour in smart business: In perspective of perceived value. Enterprise Information Systems, 15(9), 1216–1237. https://doi.org/10.1080/17517575.2020.1791966
  • Liang, H., & Xue, Y. L. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 1. https://doi.org/10.17705/1jais.00232
  • Lin, K. Y., & Burgard, S. A. (2018). Working, parenting and work-home spillover: Gender differences in the work-home interface across the life course. Advances in Life Course Research, 35, 24–36. https://doi.org/10.1016/j.alcr.2017.12.003
  • Littleford, C., Ryley, T. J., & Firth, S. K. (2014). Context, control and the spillover of energy use behaviours between office and home settings. Journal of Environmental Psychology, 40, 157–166. https://doi.org/10.1016/j.jenvp.2014.06.002
  • Lott, Y. (2020). Does flexibility help employees switch off from work? Flexible working-time arrangements and cognitive work-to-home spillover for women and men in Germany. Social Indicators Research, 151(2), 471–494. https://doi.org/10.1007/s11205-018-2031-z
  • MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293–334. https://doi.org/10.2307/23044045
  • Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469–479. https://doi.org/10.1016/0022-1031(83)90023-9
  • Mauno, S., De Cuyper, N., Kinnunen, U., Ruokolainen, M., Rantanen, J., & Mäkikangas, A. (2015). The prospective effects of work–family conflict and enrichment on job exhaustion and turnover intentions: Comparing long-term temporary vs. permanent workers across three waves. Work & Stress, 29(1), 75–94. https://doi.org/10.1080/02678373.2014.1003997
  • McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, 151–156. https://doi.org/10.1016/j.chb.2016.11.065
  • Mennino, S. F., Rubin, B. A., & Brayfield, A. (2005). Home-to-job and job-to-home spillover: The impact of company policies and workplace culture. The Sociological Quarterly, 46(1), 107–135. https://doi.org/10.1111/j.1533-8525.2005.00006.x
  • O’connor, B. P. (2000). SPSS and SAS programs for determining the number of components using parallel analysis and Velicer’s MAP test. Behavior Research Methods, Instruments, & Computers, 32(3), 396–402. https://doi.org/10.3758/BF03200807
  • Palanisamy, R., Norman, A. A., & Mat Kiah, M. L. (2022). BYOD Policy Compliance: Risks and Strategies in Organizations. Journal of Computer Information Systems, 62(1), 61–72. https://doi.org/10.1080/08874417.2019.1703225
  • Piszczek, M. M. (2017). Boundary control and controlled boundaries: Organizational expectations for technology use at the work–family interface. Journal of Organizational Behavior, 38(4), 592–611. https://doi.org/10.1002/job.2153
  • Posey, C., Roberts, T. L., & Lowry, P. B. (2015). The impact of organizational commitment on insiders’ motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179–214. https://doi.org/10.1080/07421222.2015.1138374
  • Posey, C., Roberts, T. L., Lowry, P. B., Bennett, R. J., & Courtney, J. F. (2013). Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quarterly, 37(4), 1189–1210. https://doi.org/10.25300/MISQ/2013/37.4.09
  • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
  • Shih, H., Lai, K., Guo, X., Guo, X., & Cheng, T. C. (2021). Believe it or not: Employees intend to comply with information security policy because of the desire for trade-offs. Journal of Global Information Management (JGIM), 29(6), 1–20. https://doi.org/10.4018/JGIM.294329
  • Sok, J., Blomme, R., & Tromp, D. (2014). Positive and negative spillover from work to home: The role of organizational culture and supportive arrangements. British Journal of Management, 25(3), 456–472. https://doi.org/10.1111/1467-8551.12058
  • Straub, D. W. (2009). Editor’s Comments: Why top journals accept your paper. MIS Quarterly, iii–x.
  • Taber, L., Dominguez, S., & Whittaker, S. (2022). Cats, Kids, and video calls: How working from home affects media self-presentation. Human-Computer Interaction, 37(5), 454–479. https://doi.org/10.1080/07370024.2021.1970557
  • Tsai, H. Y. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59, 138–150. https://doi.org/10.1016/j.cose.2016.02.009
  • van Bavel, R., Rodríguez-Priego, N., Vila, J., & Briggs, P. (2019). Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human-Computer Studies, 123, 29–39. https://doi.org/10.1016/j.ijhcs.2018.11.003
  • Wang, J., Li, Y., Rao, H.R., (2017). Coping responses in phishing detection: an investigation of antecedents and consequences. Information Systems Research, 28(2), 378–396.
  • Warkentin, M., Johnston, A. C., Shropshire, J., & Barnett, W. D. (2016). Continuance of protective security behavior: A longitudinal study. Decision Support Systems, 92, 25–35. https://doi.org/10.1016/j.dss.2016.09.013
  • White, G., Ekin, T., & Visinescu, L. (2017). Analysis of protective behavior and security incidents for home computers. Journal of Computer Information Systems, 57(4), 353–363. https://doi.org/10.1080/08874417.2016.1232991
  • Wolfram, H. J., & Gratton, L. (2014). Spillover between work and home, role importance and life satisfaction. British Journal of Management, 25(1), 77–90. https://doi.org/10.1111/j.1467-8551.2012.00833.x
  • Wu, D. (2020). Empirical study of knowledge withholding in cyberspace: Integrating protection motivation theory and theory of reasoned behavior. Computers in Human Behavior, 105, 106229. https://doi.org/10.1016/j.chb.2019.106229
  • Yang, X., Wang, X., Yue, W. T., Sia, C. L., & Luo, X. (2019). Security policy opt-in decisions in bring-your-own-device (BYOD)–A persuasion and cognitive elaboration perspective. Journal of Organizational Computing and Electronic Commerce, 29(4), 274–293. https://doi.org/10.1080/10919392.2019.1639913
  • Yoo, C. W., Sanders, G. L., & Cerveny, R. P. (2018). Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance. Decision Support Systems, 108, 107–118. https://doi.org/10.1016/j.dss.2018.02.009

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.