DOI QR코드

DOI QR Code

The Impact of Information Security(IS) Organizational Justice on Employee IS Value Congruence and IS Voice Behavior: Exploring the Role of Susceptibility to Interpersonal Influence

조직의 정보보안 공정성이 개인의 정보보안 관련 가치 일치 및 제언 행동에 미치는 영향: 대인 간 영향 민감성의 적용

  • Received : 2023.08.21
  • Accepted : 2023.10.14
  • Published : 2023.12.31

Abstract

Purpose Recently, organizations have been allocating significant financial resources toward the implementation of new technologies and stringent information security (IS) policies in order to enhance IS. However, the potential for IS threats from internal sources within organizations remains high. This study proposes a mechanism whereby the organization's IS environment (organizational justice) enhances employees' perception of IS value congruence and encourages their voice behavior. Furthermore, this study validates that an individual's susceptibility to interpersonal influence can reinforce the relationship between the aforementioned factors and voice behavior. Design/methodology/approach We utilized AMOS 22.0 and Process 3.1 to validate the research model and hypotheses. The data was gathered from 435 employees employed in South Korean firms that implemented IS policies in their work. Structural equation modeling was employed to examine the relationship between organizational justice, value congruence, and voice behavior, and the interaction effect was confirmed by incorporating model 1 of Process 3.1 for the hypothesis pertaining to susceptibility to interpersonal influence. Findings The findings of this study indicate that organizational justice has a positive impact on voice behavior, which is further enhanced by value congruence. Furthermore, the influence of organizational justice and value congruence on voice behavior is moderated by susceptibility to information influence, while susceptibility to normative influence only moderates the effect of organizational justice. These results provide valuable insights for organizations in developing customized information systems strategies that effectively promote employees' voice behaviors.

Keywords

References

  1. 과학기술정보통신부, 2021 정보보호 실태조사, 2022.
  2. 박민정, 유지은, 채상미, "ISMS-P와 GDPR 의 개인정보보호 부문 연계 분석," 한국 IT 서비스학회지, 제18권, 제2호, 2019, pp. 55-73.
  3. 박재영, 김범수, "조직의 정보보안 분위기가 조직 구성원의 정보보안 참여 행동에 미치는 영향," 정보시스템연구, 제29권, 제4호, 2020, pp. 57-76.
  4. 오경희, 김호진, "ISO/IEC 정보보호 통제 국제 표준 개정 현황," 정보보호학회지, 제31권, 제4호, 2021, pp. 35-43.
  5. 황인호, 허성호, "조직 내 정보보안 기술스트레스 완화와 준수의도," 정보시스템연구, 제29권, 제1호, 2020, pp. 23-50.
  6. Adams, J. S., Inequity in Social Exchange. In Advances in Experimental Social Psychology (Vol. 2, pp. 267-299). Academic Press, 1965.
  7. Andrews, M. C., Baker, T., and Hunt, T. G., "Values and Person-organization Fit Does Moral Intensity Strengthen Outcomes?," Leadership & Organization Development Journal, Vol. 32, No. 1, 2011, pp. 5-9. https://doi.org/10.1108/01437731111099256
  8. Alshare, K. A., Lane, P. L., and Lane, M. R., "Information Security Policy Compliance: A Higher Education Case Study," Information & Computer Security, Vol. 26, No. 1, 2018, pp. 91-108.
  9. Ambrose, M. L., and Schminke, M., "The Role of Overall Justice Judgments in Organizational Justice Research: A Test of Mediation," Journal of Applied Psychology, Vol. 94, No. 2, 2009, pp. 491-500. https://doi.org/10.1037/a0013203
  10. Bearden, W. O., Netemeyer, R. G., and Teel, J., "Measurement of Consumer Susceptibility to Interpersonal Influence," Journal of Consumer Research, Vol. 15, No. 4, 1989, pp. 473-481. https://doi.org/10.1086/209186
  11. Bharti, M., Suneja, V., and Bharti, M., "Mindfulness as an Antidote to Conspicuous Consumption: The Mediating Roles of Self-esteem, Self-concept Clarity and Normative Influence," Personality and Individual Differences, Vol. 184, 2022, pp. 111215.
  12. Chen, Y., Xia, W., and Cousins, K., "Voluntary and Instrumental Information Security Policy Compliance: An Integrated View of Prosocial Motivation, Self-regulation and Deterrence," Computers & Security, Vol. 113, 2022, pp. 102568.
  13. Cheng, S. Y., "The Mediating Role of Organizational Justice on the Relationship between Administrative Performance Appraisal Practices and Organizational Commitment," The International Journal of Human Resource Management, Vol. 25, No. 8, 2014, pp. 1131-1148. https://doi.org/10.1080/09585192.2013.816864
  14. Chou, T. Y., Chou, S. T., Jiang, J. J., and Klein, G., "The Organizational Citizenship Behavior of IS Personnel: Does Organizational Justice Matter?," Information & Management, Vol. 50, No. 2, 2013, pp. 105-111. https://doi.org/10.1016/j.im.2013.02.002
  15. Colquitt. J. A., "On the Dimensionality of Organizational Justice: A Construct Validation of a Measure," Journal of Applied Psychology, Vol. 86, No. 3, 2001, pp. 386-400. https://doi.org/10.1037//0021-9010.86.3.386
  16. Dahabiyeh, L., "Factors Affecting Organizational Aadoption and Acceptance of Computer-based Security Awareness Training Tools," Information & Computer Security, Vol. 29, No. 5, 2021, pp. 836-849. https://doi.org/10.1108/ICS-12-2020-0200
  17. Dale, K., Fox, M., and MahoneyC., "The Relationship between Supervisor and Subordinate Value Congruence and Role Stress," Journal of Behavioral and Applied Management, Vol. 18, No. 1, 2018, pp. 1-18. https://doi.org/10.21818/jbam.18.1.1
  18. Ding, M. C., and Lii, Y. S., "Handling Online Service Recovery: Effects of Perceived Justice on Online Games," Telematics and Informatics, Vol. 33, No. 4, 2016, pp. 881-895. https://doi.org/10.1016/j.tele.2016.02.001
  19. Edwards, J. R., and Cable, D. M., "The Value of Value Congruence," Journal of Applied Psychology, Vol. 94, No. 3, 2009, pp. 654-677. https://doi.org/10.1037/a0014891
  20. Fornell, C., and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, 1981, pp.39-50. https://doi.org/10.1177/002224378101800104
  21. Hayes, A. F., Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-based Approach. New York: Guilford Publications, 2017.
  22. Hystad, S. W., Mearns, K. J., and Eid, J., "Moral Disengagement as a Mechanism between Perceptions of Organisational Injustice and Deviant Work Behaviours," Safety Science, Vol. 68, 2014, pp. 138-145. https://doi.org/10.1016/j.ssci.2014.03.012
  23. Jaeger, L., Eckhardt, A., and Kroenung, J., "The Role of Deterrability for the Effect of Multi-level Sanctions on Information Security Policy Compliance: Results of a Multigroup Analysis," Information & Management, Vol. 58, No. 3, 2021, pp. 103318.
  24. Jimenez, P., Dunkl, A., and Peissl, S., "Workplace Incivility and Its Effects on Value Congruence, Recovery-stress-state and the Intention to Quit," Psychology, Vol. 6, No. 14, 2015, pp. 1930-1939. https://doi.org/10.4236/psych.2015.614190
  25. Judge, T. A., and Colquitt, J. A., "Organizational Justice and Stress: The Mediating Role of Work-family Conflict," Journal of Applied Psychology, Vol. 89, No. 3, 2004, pp. 395-404. https://doi.org/10.1037/0021-9010.89.3.395
  26. Kajtazi, M., Cavusoglu, H., Benbasat, I., and Haftor, D., "Escalation of Commitment as an Antecedent to Noncompliance with Information Security Policy," Information & Computer Security, Vol. 26, No. 2, 2018, pp. 171-193. https://doi.org/10.1108/ICS-09-2017-0066
  27. Kim, H., and Kiura, M., "The Influences of Social Status and Organizational Justice on Employee Voice: A Case of Customer Care Workers," International Journal of Business Communication, Vol. 60, No. 3, 2023, pp. 802-822. https://doi.org/10.1177/2329488420969776
  28. Iyer, R., Babin, B. J., Eastman, J. K., and Griffin, M., "Drivers of Attitudes toward Luxury and Counterfeit Products: The Moderating Role of Interpersonal Influence," International Marketing Review, Vol. 39, No. 2, 2022, pp. 242-268. https://doi.org/10.1108/IMR-02-2021-0091
  29. Lee, H. W., and Rhee, D. Y., "Effects of Organizational Justice on Employee Satisfaction: Integrating the Exchange and the Value-Based Perspectives," Sustainability, Vol. 15, No. 7, 2003, pp. 5993.
  30. Lee, W. J., and Hwang, I., "Sustainable Information Security Behavior Management: An Empirical Approach for the Causes of Employees' Voice Behavior," Sustainability, Vol. 13, No. 11, 2021, pp. 6077.
  31. Li, H., Sarathy, R., Zhang, J., and Luo, X., "Exploring the Effects of Organizational Justice, Personal Ethics and Sanction on Internet Use Policy Compliance," Information Systems Journal, Vol. 24, No. 6, 2015, pp. 479-502. https://doi.org/10.1111/isj.12037
  32. Lian, J. W., "Understanding Cloud-based BYOD Information Security Protection Behaviour in Smart Business: In Perspective of Perceived Value," Enterprise Information Systems, Vol. 15, No. 9, 2021, pp. 1216-1237. https://doi.org/10.1080/17517575.2020.1791966
  33. Liang, K., Su, X. and Wong, V., "Person-organization Value Congruence Mediates the Relationship between Job Resources and Collective Psychological Ownership: The Case of Social Workers in China," Journal of Social Service Research, Vol. 47, No. 5, 2021, pp. 649-658. https://doi.org/10.1080/01488376.2020.1869669
  34. Liu, W., Zhu, R., and Yang, Y., "I Warn You Because I Like You: Voice Behavior, Employee Identifications, and Transformational Leadership," The Leadership Quarterly, Vol. 21, No. 1, 2010, pp. 189-202. https://doi.org/10.1016/j.leaqua.2009.10.014
  35. Liu, Y., and Berry, C. M., "Identity, Moral, and Equity Perspectives on the Relationship between Experienced Injustice and Time Theft," Journal of Business Ethics, Vol. 118, 2013, pp. 73-83. https://doi.org/10.1007/s10551-012-1554-5
  36. Loch, K. D., Carr, H. H., and Warkentin, M. E., "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly, Vol. 16, No. 2, 1992, pp.173-186. https://doi.org/10.2307/249574
  37. Manoharan, S., Katuk, N., Hassan, S., and Ahmad, R., "To Click or not to Click the Link: The Factors Influencing Internet Banking Users' Intention in Responding to Phishing Emails," Information & Computer Security, Vol. 30, No. 1, 2022, pp. 37-62. https://doi.org/10.1108/ICS-04-2021-0046
  38. Markets and Markets, Cyber Security Market by Component (Software, Hardware, and Services), Software (IAM, Encryption and Tokenization, and Other Software), Security Type, Deployment Mode, Organization Size, Vertical and Region - Global Forecast to 2027, 2022.
  39. Muchinsky P. M., Psychology Applied to Work: An Introduction to Industrial and Organizational Psychology. Wadsworth/Thomson Learning, 2014.
  40. Nunnally, J. C., Psychometric theory (2nd ed.). New York: McGraw-Hill, 1978.
  41. Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P., "Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies," Journal of Applied Psychology, Vol. 88, No. 5, 2003, pp. 879-903. https://doi.org/10.1037/0021-9010.88.5.879
  42. Sarkar, S., Vance, A., Ramesh, B., Demestihas, M., and Wu, D. T., "The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context," Information Systems Research, Vol. 31, No. 4, 2020, pp. 1240-1259. https://doi.org/10.1287/isre.2020.0941
  43. Sharma, V. M., and Klein, A., "Consumer Perceived Value, Involvement, Trust, Susceptibility to Interpersonal Influence, and Intention to Participate in Online Group Buying," Journal of Retailing and Consumer Services, Vol. 52, 2020, pp. 101946.
  44. Shukla, P., "Impact of Interpersonal Influences, Brand Origin and Brand Image on Luxury Purchase Intentions: Measuring Interfunctional Interactions and a Cross-national Comparison," Journal of World Business, Vol. 46, No. 2, 2011, pp. 242-252. https://doi.org/10.1016/j.jwb.2010.11.002
  45. Son, J. Y., "Out of Fear or Desire? Toward a Better Understanding of Employees' Motivation to Follow IS Security Policies," Information & Management, Vol. 48, No. 7, 2011, pp. 296-302. https://doi.org/10.1016/j.im.2011.07.002
  46. Song, J., Wu, J., and Gu, J., "Voice Behavior and Creative Performance Moderated by Stressors," Journal of Managerial Psychology, Vol. 32, No. 2, 2017, pp. 177-192. https://doi.org/10.1108/JMP-03-2016-0078
  47. Svendsen, M., and Joensson, T. S., "Transformational Leadership and Change Related Voice Behavior," Leadership & Organization Development Journal, Vol. 37, No. 3, 2016, pp. 357-368. https://doi.org/10.1108/LODJ-07-2014-0124
  48. Tang, Z., Miller, A. S., Zhou, Z., and Warkentin, M., "Does Government Social Media Promote Users' Information Security Behavior towards COVID-19 Scams? Cultivation Effects and Protective Motivations," Government Information Quarterly, Vol. 38, No. 2, 2012, pp. 101572.
  49. Tsai, M. T., and Cheng, N. C., "Understanding Knowledge Sharing between IT Professionals: An Integration of Social Cognitive and Social Exchange Theory," Behaviour & Information Technology, Vol. 31, No. 11, 2012, pp. 1069-1080. https://doi.org/10.1080/0144929X.2010.550320
  50. Valentine, S., Godkin, L., and Lucero, M., "Ethical Context, Organizational Commitment, and Person-Organization Fit," Journal of Business Ethics, Vol. 41, No. 4, 2002, pp. 349-360. https://doi.org/10.1023/A:1021203017316
  51. Vance, A., Siponen, M. T., and Straub, D. W., "Effects of Sanctions, Moral Beliefs, and Neutralization on Information Security Policy Violations across Cultures," Information & Management, Vol. 57, No. 4, 2020, pp. 103212.
  52. Van Dyne, L., and LePine, J. A., "Helping and Voice Extra-role Behaviors: Evidence of Construct and Predictive Validity," Academy of Management Journal, Vol. 41, No. 1, 1998, pp. 108-119. https://doi.org/10.5465/256902
  53. Verizon, 2021 data breach investigations report, 2021.
  54. West, R., "The Psychology of Security," Communications of the ACM, Vol. 51, No. 4, 2008, pp. 34-40. https://doi.org/10.1145/1330311.1330320
  55. Wixom, B. H., and Watson, H. J., "An Empirical Investigation of the Factors Affecting Data Warehousing Success," MIS Quarterly, Vol. 25, No. 1, 2001, pp. 17-41. https://doi.org/10.2307/3250957
  56. Xue, Y., Liang, H., and Wu, L., "Punishment, Justice, and Compliance in Mandatory IT Settings," Information Systems Research, Vol. 22, No. 2, 2011, pp. 400-414. https://doi.org/10.1287/isre.1090.0266
  57. Yazdanmehr, A., Wang, J., and Yang, Z., "Peers Matter: The Moderating Role of Social Influence on Information Security Policy Compliance," Information Systems Journal, Vol. 30, No. 5, 2020, pp. 791-844. https://doi.org/10.1111/isj.12271
  58. Zhao, H., Peng, Z., and Chen, H. K., "Compulsory Citizenship Behavior and Organizational Citizenship Behavior: The Role of Organizational Identification and Perceived Interactional Justice," The Journal of psychology, Vol. 148, No. 2, 2014, pp. 177-196. https://doi.org/10.1080/00223980.2013.768591
  59. Zonghua, L., Junyun, L., Yulang, G., Ming, Z., and Xu, W., "The Effect of Corporate Social Responsibility on Unethical Pro-organizational Behavior: The Mediation of Moral Identity and Moderation of Supervisor-employee Value Congruence," Current Psychology, Vol. 42, No. 17, 2023, pp. 14283-14296. https://doi.org/10.1007/s12144-022-02722-x