References
- W. Seo, "A study on the optimized balance module of security policy to enhance stability in the service-based information system," J. of the Korea Institute of Electronic Communication Sciences, vol. 13, no. 6, 2018, pp. 1155-1160. https://doi.org/10.13067/JKIECS.2018.13.6.1155
- Grandviewresearch, "Cyber security market size, share & trends analysis report by component, by security type, by solution, by services, by deployment, by organization, by application, by region, and segment forecasts, 2021 - 2028," Report, 2021.
- Verizon, "2020 data breach investigations report," Report, 2020.
- H. Chen, Y. Li, L. Chen, and J. Yin, "Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): The roles of information security-related conflict and fatigue," J. of Enterprise Information Management, vol. 34, no. 3, 2020, pp. 770-792.
- I. Hwang, D. Kim, T. Kim, and S. Kim, "Why not comply with information security? An empirical approach for the causes of non-compliance," Online Information Review, vol. 41, no. 1, 2017, pp. 2-18. https://doi.org/10.1108/OIR-11-2015-0358
- M. J. Merhi and P. Ahluwalia, "Examining the impact of deterrence factors and norms on resistance to information systems security," Computers in Human Behavior, vol. 92, 2019, pp. 37-46. https://doi.org/10.1016/j.chb.2018.10.031
- A. M. Fuglseth and O. Sorebo, "The effects of technostress within the context of employee use of ICT," Computers in Human Behavior, vol. 40, 2014, pp. 161-170. https://doi.org/10.1016/j.chb.2014.07.040
- R. K. Jena, "Technostress in ICT enabled collaborative learning environment: An empirical study among Indian academician," Computers in Human Behavior, vol. 51, 2015, pp. 1116-1123. https://doi.org/10.1016/j.chb.2015.03.020
- M. Tarafdar, Q. Tu, B. S. Ragu-Nathan, and T. S. Ragu-Nathan, "The impact of technostress on role stress and productivity," J. of Management Information Systems, vol. 24, no. 1, 2007, pp. 301-328. https://doi.org/10.2753/MIS0742-1222240109
- J. D'Arcy, T. Herath, and M. K. Shoss, "Understanding employee responses to stressful information security requirements: A coping perspective," J. of Management Information Systems, vol. 31, no. 2, 2014, pp. 285-318. https://doi.org/10.2753/mis0742-1222310210
- I. Hwang and O. Cha, "Examining technostress creators and role stress as potential threats to employees' information security compliance," Computers in Human Behavior, vol. 81, 2018, pp. 282-293. https://doi.org/10.1016/j.chb.2017.12.022
- S. Oreg, "Personality, context, and resistance to organizational change," European J. of Work and Organizational Psychology, vol. 15, no. 1, 2006, pp. 73-101. https://doi.org/10.1080/13594320500451247
- Y. Bao, "Organizational resistance to performance enhancing technological innovations: A motivation threat ability framework," J. of Business & Industrial Marketing, vol. 24, no. 2, 2009, pp. 119-130. https://doi.org/10.1108/08858620910931730
- W. Seo, "A study on the application of modularization technique to standard security policy to protect information assets and the securement of confidentiality and integrity," J. of the Korea Institute of Electronic Communication Sciences, vol. 14, no. 1, 2019, pp. 111-118. https://doi.org/10.13067/JKIECS.2019.14.1.111
- R. Ayyagari, V. Grover, and R. Purvis, "Technostress: Technological antecedents and implications," MIS Quarterly, vol. 35, no. 4, 2011, pp. 831-858. https://doi.org/10.2307/41409963
- V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, "User acceptance of information technology: Toward a unified view," MIS Quarterly, vol. 27, no. 3, 2003, pp. 425-478. https://doi.org/10.2307/30036540
- A. Lee, S. Son, and K. Kim, "Information and communication technology overload and social networking service fatigue: A stress perspective," Computers in Human Behavior, vol. 55, 2016, pp. 51-61. https://doi.org/10.1016/j.chb.2015.08.011
- T. C. Lin and C. C. Huang, "Understanding knowledge management system usage antecedents: An integration of social cognitive theory and task technology fit," Information & Management, vol. 45, no. 6, 2008, pp. 410-417. https://doi.org/10.1016/j.im.2008.06.004
- D. L. Goodhue and R. L. Thompson, "Task-technology fit and individual performance," MIS Quarterly, vol. 19, no. 2, 1995, pp. 213-236. https://doi.org/10.2307/249689
- A. Shirish, "Cognitive-affective appraisal of technostressors by ICT-based mobile workers and their impacts on technostrain," Human Systems Management, vol. 40, no. 2, 2021, pp. 265-285. https://doi.org/10.3233/HSM-200979
- C. C. Angolano, I. R. Guzman, M. S. Garmon, and C. J. Navarrete, "Information technology security task-technology fit based on the technology-to-performance chain theory," In Proc. of the 50th annual conf. on Computers and People Research (17-26), Milwaukee, Wisconsin, USA, 2012.
- H. Kim, "A Study on cloud-based secure file management security," J. of the Korea Institute of Electronic Communication Sciences, vol. 14, no. 1, 2019, pp. 243-250. https://doi.org/10.13067/JKIECS.2019.14.1.243
- J. C. Nunnally, Psychometric theory (2nd ed.). New York: McGraw-Hill, 1978.
- C. Fornell and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, vol. 18, no. 1, 1981, pp. 39-50. https://doi.org/10.2307/3151312
- P. M. Podsakoff, S. B. MacKenzie, J. Lee, and N. P. Podsakoff, "Common method biases in behavioral research: A critical review of the literature and recommended remedies," Journal of Applied Psychology, vol. 88, no. 5, 2003, pp. 879-903. https://doi.org/10.1037/0021-9010.88.5.879
- G. C. Lin, Z. Wen, H. W. Marsh, and H. S. Lin, "Structural equation models of latent interactions: Clarification of orthogonalizing and double-mean-centering strategies," Structural Equation Modeling, vol. 17, no. 3, 2010, pp. 374-391. https://doi.org/10.1080/10705511.2010.488999