DOI QR코드

DOI QR Code

The Influence on the Information Security Techno-stress on Security Policy Resistance Through Strain: Focusing on the Moderation of Task Technology Fit

정보보안 기술스트레스가 스트레인을 통한 보안정책 저항에 미치는 영향: 업무기술 적합성의 조절 효과 중심

  • Hwang, In-Ho (College of General Education, Kookmin University)
  • Received : 2021.08.11
  • Accepted : 2021.10.17
  • Published : 2021.10.31

Abstract

As information security(IS) is recognized as a critical success factor for organizational growth, organizations are increasing their investment in adopting and operating strict IS policies and technologies. However, when strict IS technology is adopted, IS-related techno-stress may occur in the employees who apply IS technology to their tasks. This study proposes the effect of IS-related techno-stress formed in individuals on IS policy resistance through IS strain and proves that task-technology fit mitigates the negative effect of techno-stress. Research models and hypotheses were presented through previous studies, and the secured samples were used, and structural equation modeling was applied to verify hypothesis. As a result of the study, it was confirmed that IS-related techno-stress (overload, complexity) affected IS policy resistance through IS strain (anxiety, fatigue), and that task-technology fit moderated the relationship between techno-stress and strain. This study suggests a strategic direction for improving the level of internal IS from the viewpoint of suggesting ways to mitigate the stress of employees that may occur when IS policies and technologies are adopted.

정보 관리가 조직의 주요 성공 요인으로 인식되면서, 조직은 엄격한 정보보안 정책 및 기술 도입 및 운영을 위한 투자를 높이고 있다. 그러나, 엄격한 정보보안 기술은 업무에 정보보안을 적용하는 조직원에게 기술스트레스를 발생시킬 수 있다. 본 연구의 목적은 정보보안 기술스트레스가 스트레인을 통해 정보보안 정책 저항에 미치는 영향을 제시하고, 업무기술 적합성이 기술스트레스의 영향을 완화하는 것을 확인하는 것이다. 본 연구는 선행연구를 통해 연구 모델 및 가설을 제시하였으며, 설문 조사를 통해 확보된 표본을 활용하여 구조방정식을 통한 가설검증을 하였다. 연구 결과는 정보보안 기술스트레스(과부하, 복잡성)가 정보보안 스트레인(걱정, 피로)을 통해 정보보안 정책 저항에 영향을 주었으며, 업무기술 적합성이 기술스트레스와 스트레인 간의 관계를 조절하는 것을 확인하였다. 본 연구는 정보보안 정책 및 기술의 적용 시 발생 가능한 조직원의 스트레스와 완화 방법을 제시한 관점에서 내부의 정보보안 수준 향상을 위한 전략적 방향을 제시한다.

Keywords

References

  1. W. Seo, "A study on the optimized balance module of security policy to enhance stability in the service-based information system," J. of the Korea Institute of Electronic Communication Sciences, vol. 13, no. 6, 2018, pp. 1155-1160. https://doi.org/10.13067/JKIECS.2018.13.6.1155
  2. Grandviewresearch, "Cyber security market size, share & trends analysis report by component, by security type, by solution, by services, by deployment, by organization, by application, by region, and segment forecasts, 2021 - 2028," Report, 2021.
  3. Verizon, "2020 data breach investigations report," Report, 2020.
  4. H. Chen, Y. Li, L. Chen, and J. Yin, "Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): The roles of information security-related conflict and fatigue," J. of Enterprise Information Management, vol. 34, no. 3, 2020, pp. 770-792.
  5. I. Hwang, D. Kim, T. Kim, and S. Kim, "Why not comply with information security? An empirical approach for the causes of non-compliance," Online Information Review, vol. 41, no. 1, 2017, pp. 2-18. https://doi.org/10.1108/OIR-11-2015-0358
  6. M. J. Merhi and P. Ahluwalia, "Examining the impact of deterrence factors and norms on resistance to information systems security," Computers in Human Behavior, vol. 92, 2019, pp. 37-46. https://doi.org/10.1016/j.chb.2018.10.031
  7. A. M. Fuglseth and O. Sorebo, "The effects of technostress within the context of employee use of ICT," Computers in Human Behavior, vol. 40, 2014, pp. 161-170. https://doi.org/10.1016/j.chb.2014.07.040
  8. R. K. Jena, "Technostress in ICT enabled collaborative learning environment: An empirical study among Indian academician," Computers in Human Behavior, vol. 51, 2015, pp. 1116-1123. https://doi.org/10.1016/j.chb.2015.03.020
  9. M. Tarafdar, Q. Tu, B. S. Ragu-Nathan, and T. S. Ragu-Nathan, "The impact of technostress on role stress and productivity," J. of Management Information Systems, vol. 24, no. 1, 2007, pp. 301-328. https://doi.org/10.2753/MIS0742-1222240109
  10. J. D'Arcy, T. Herath, and M. K. Shoss, "Understanding employee responses to stressful information security requirements: A coping perspective," J. of Management Information Systems, vol. 31, no. 2, 2014, pp. 285-318. https://doi.org/10.2753/mis0742-1222310210
  11. I. Hwang and O. Cha, "Examining technostress creators and role stress as potential threats to employees' information security compliance," Computers in Human Behavior, vol. 81, 2018, pp. 282-293. https://doi.org/10.1016/j.chb.2017.12.022
  12. S. Oreg, "Personality, context, and resistance to organizational change," European J. of Work and Organizational Psychology, vol. 15, no. 1, 2006, pp. 73-101. https://doi.org/10.1080/13594320500451247
  13. Y. Bao, "Organizational resistance to performance enhancing technological innovations: A motivation threat ability framework," J. of Business & Industrial Marketing, vol. 24, no. 2, 2009, pp. 119-130. https://doi.org/10.1108/08858620910931730
  14. W. Seo, "A study on the application of modularization technique to standard security policy to protect information assets and the securement of confidentiality and integrity," J. of the Korea Institute of Electronic Communication Sciences, vol. 14, no. 1, 2019, pp. 111-118. https://doi.org/10.13067/JKIECS.2019.14.1.111
  15. R. Ayyagari, V. Grover, and R. Purvis, "Technostress: Technological antecedents and implications," MIS Quarterly, vol. 35, no. 4, 2011, pp. 831-858. https://doi.org/10.2307/41409963
  16. V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, "User acceptance of information technology: Toward a unified view," MIS Quarterly, vol. 27, no. 3, 2003, pp. 425-478. https://doi.org/10.2307/30036540
  17. A. Lee, S. Son, and K. Kim, "Information and communication technology overload and social networking service fatigue: A stress perspective," Computers in Human Behavior, vol. 55, 2016, pp. 51-61. https://doi.org/10.1016/j.chb.2015.08.011
  18. T. C. Lin and C. C. Huang, "Understanding knowledge management system usage antecedents: An integration of social cognitive theory and task technology fit," Information & Management, vol. 45, no. 6, 2008, pp. 410-417. https://doi.org/10.1016/j.im.2008.06.004
  19. D. L. Goodhue and R. L. Thompson, "Task-technology fit and individual performance," MIS Quarterly, vol. 19, no. 2, 1995, pp. 213-236. https://doi.org/10.2307/249689
  20. A. Shirish, "Cognitive-affective appraisal of technostressors by ICT-based mobile workers and their impacts on technostrain," Human Systems Management, vol. 40, no. 2, 2021, pp. 265-285. https://doi.org/10.3233/HSM-200979
  21. C. C. Angolano, I. R. Guzman, M. S. Garmon, and C. J. Navarrete, "Information technology security task-technology fit based on the technology-to-performance chain theory," In Proc. of the 50th annual conf. on Computers and People Research (17-26), Milwaukee, Wisconsin, USA, 2012.
  22. H. Kim, "A Study on cloud-based secure file management security," J. of the Korea Institute of Electronic Communication Sciences, vol. 14, no. 1, 2019, pp. 243-250. https://doi.org/10.13067/JKIECS.2019.14.1.243
  23. J. C. Nunnally, Psychometric theory (2nd ed.). New York: McGraw-Hill, 1978.
  24. C. Fornell and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, vol. 18, no. 1, 1981, pp. 39-50. https://doi.org/10.2307/3151312
  25. P. M. Podsakoff, S. B. MacKenzie, J. Lee, and N. P. Podsakoff, "Common method biases in behavioral research: A critical review of the literature and recommended remedies," Journal of Applied Psychology, vol. 88, no. 5, 2003, pp. 879-903. https://doi.org/10.1037/0021-9010.88.5.879
  26. G. C. Lin, Z. Wen, H. W. Marsh, and H. S. Lin, "Structural equation models of latent interactions: Clarification of orthogonalizing and double-mean-centering strategies," Structural Equation Modeling, vol. 17, no. 3, 2010, pp. 374-391. https://doi.org/10.1080/10705511.2010.488999