References
- I. Hwang and O. Cha, "Examining technostress creators and role stress as potential threats to employees' information security compliance," Computers in Human Behavior, vol. 81, 2018, pp. 282-293. https://doi.org/10.1016/j.chb.2017.12.022
- Fortune Business Insights, "The global cyber security market size is projected to grow from $172.32$172.32 billion in 2023 to $424.97 billion in 2030, at a CAGR of 13.8%," Report, Apr. 2023.
- Verizon, "2021 data breach investigations report," Report, Dec. 2021.
- Y. Chen, K. Ramamurthy, and K. W. Wen, "Organizations' information security policy compliance: Stick or carrot approach?," J. of Management Information Systems, vol. 29, no. 3, 2012, pp. 157-188. https://doi.org/10.2753/MIS0742-1222290305
- Z. Tang, A. S. Miller, Z. Zhou, and M. Warkentin, "Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations," Government Information Quarterly, vol. 38, no. 2, 2021, pp. 101572.
- P. Ifinedo, "Exploring personal and environmental factors that can reduce nonmalicious information security violations," Information Systems Management, vol. 40, no. 4, 2023, pp. 1-21. https://doi.org/10.1080/10580530.2022.2131944
- M. Tarafdar, Q. Tu, B. S. Ragu-Nathan, and T. S. Ragu-Nathan, "The impact of technostress on role stress and productivity," J. of Management Information Systems, vol. 24, no. 1, 2007, pp. 301-328. https://doi.org/10.2753/MIS0742-1222240109
- Z. Adahman, Z. W. Malik and Z. Anwar, "An analysis of zero-trust architecture and its cost-effectiveness for organizational security," Computers & Security, vol. 122, 2022, pp. 102911.
- Korea Information Security Industry Association, "2021 survey on information security," Report, Jan. 2022.
- I. Hwang, "The influence of competitive psychological climate and IS related anxiety: The role of IS related value dissimilarity," J. of the Korea Institute of Electronic Communication Sciences, vol. 18, no. 4, 2023, pp. 649-660.
- M. Ma and R. Agarwal, "Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities," Information Systems Research, vol. 18, no. 1, 2007, pp. 42-67. https://doi.org/10.1287/isre.1070.0113
- S. M. Farmer, P. Tierney, and K. Kung-McIntyre, "Employee creativity in Taiwan: An application of role identity theory," Academy of Management J., vol. 46, no. 5, 2003, pp. 618-630. https://doi.org/10.5465/30040653
- I. Hwang, "Reinforcement of IS voice behavior within the organization: A perspective on mitigating role stress through organization justice and individual social-identity," J. of the Korea Institute of Electronic Communication Sciences, vol. 17, no. 4, 2022, pp. 649-662.
- O. Ogbanufe, "Enhancing end-user roles in information security: Exploring the setting, situation, and identity," Computers & Security, vol. 108, 2021, pp. 102340.
- P. A. Pavlou, H. Liang, and Y. Xue, "Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective," MIS Quarterly, vol. 31, no. 1, 2007, pp. 105-136. https://doi.org/10.2307/25148783
- I. Hwang, "The influence on the information security techno-stress on security policy resistance through strain: Focusing on the moderation of task technology fit," J. of the Korea Institute of Electronic Communication Sciences, vol. 16, no. 5, 2021, pp. 931-939.
- A. Vedadi, M. Warkentin, and A. Dennis, "Herd behavior in information security decision-making," Information & Management, vol. 58, no. 8, 2021, pp. 103526.
- H. Chen, M. Liu, and T. Lyu, "Understanding employees' information security-related stress and policy compliance intention: The roles of information security fatigue and psychological capital," Information and Computer Security, vol. 30, no. 5, 2022, pp. 751-770. https://doi.org/10.1108/ICS-03-2022-0047
- I. Jo and J. Jo, "Differentiation of uncertainty and ambiguity in communication within the organization: On Antecedent Variables and Influences of Uncertainty and Ambiguity," J. of Communication Research, vol. 49, no. 1, 2012, pp. 220-258. https://doi.org/10.22174/jcr.2012.49.1.220
- J. D'Arcy and P. L. Teh, "Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization," Information & Management, vol. 56, no. 7, 2019, pp. 103151.
- J. D'Arcy, T. Herath, and M. K. Shoss, "Understanding employee responses to stressful information security requirements: A coping perspective," J. of Management Information Systems, vol. 31, no. 2, 2014, pp. 285-318. https://doi.org/10.2753/MIS0742-1222310210
- J. C. Nunnally, Psychometric theory (2nd ed.). New York: McGraw-Hill, 1978.
- C. Fornell and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error," J. of Marketing Research, vol. 18, no. 1, 1981, pp. 39-50. https://doi.org/10.1177/002224378101800104