Browse > Article
http://dx.doi.org/10.13067/JKIECS.2021.16.5.931

The Influence on the Information Security Techno-stress on Security Policy Resistance Through Strain: Focusing on the Moderation of Task Technology Fit  

Hwang, In-Ho (College of General Education, Kookmin University)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.16, no.5, 2021 , pp. 931-940 More about this Journal
Abstract
As information security(IS) is recognized as a critical success factor for organizational growth, organizations are increasing their investment in adopting and operating strict IS policies and technologies. However, when strict IS technology is adopted, IS-related techno-stress may occur in the employees who apply IS technology to their tasks. This study proposes the effect of IS-related techno-stress formed in individuals on IS policy resistance through IS strain and proves that task-technology fit mitigates the negative effect of techno-stress. Research models and hypotheses were presented through previous studies, and the secured samples were used, and structural equation modeling was applied to verify hypothesis. As a result of the study, it was confirmed that IS-related techno-stress (overload, complexity) affected IS policy resistance through IS strain (anxiety, fatigue), and that task-technology fit moderated the relationship between techno-stress and strain. This study suggests a strategic direction for improving the level of internal IS from the viewpoint of suggesting ways to mitigate the stress of employees that may occur when IS policies and technologies are adopted.
Keywords
Information Security; Security Policy Resistance; Strain; Task Technology Fit; Techno-stress;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Seo, "A study on the optimized balance module of security policy to enhance stability in the service-based information system," J. of the Korea Institute of Electronic Communication Sciences, vol. 13, no. 6, 2018, pp. 1155-1160.   DOI
2 Grandviewresearch, "Cyber security market size, share & trends analysis report by component, by security type, by solution, by services, by deployment, by organization, by application, by region, and segment forecasts, 2021 - 2028," Report, 2021.
3 H. Chen, Y. Li, L. Chen, and J. Yin, "Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): The roles of information security-related conflict and fatigue," J. of Enterprise Information Management, vol. 34, no. 3, 2020, pp. 770-792.
4 A. M. Fuglseth and O. Sorebo, "The effects of technostress within the context of employee use of ICT," Computers in Human Behavior, vol. 40, 2014, pp. 161-170.   DOI
5 S. Oreg, "Personality, context, and resistance to organizational change," European J. of Work and Organizational Psychology, vol. 15, no. 1, 2006, pp. 73-101.   DOI
6 R. Ayyagari, V. Grover, and R. Purvis, "Technostress: Technological antecedents and implications," MIS Quarterly, vol. 35, no. 4, 2011, pp. 831-858.   DOI
7 T. C. Lin and C. C. Huang, "Understanding knowledge management system usage antecedents: An integration of social cognitive theory and task technology fit," Information & Management, vol. 45, no. 6, 2008, pp. 410-417.   DOI
8 C. Fornell and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, vol. 18, no. 1, 1981, pp. 39-50.   DOI
9 R. K. Jena, "Technostress in ICT enabled collaborative learning environment: An empirical study among Indian academician," Computers in Human Behavior, vol. 51, 2015, pp. 1116-1123.   DOI
10 Y. Bao, "Organizational resistance to performance enhancing technological innovations: A motivation threat ability framework," J. of Business & Industrial Marketing, vol. 24, no. 2, 2009, pp. 119-130.   DOI
11 J. D'Arcy, T. Herath, and M. K. Shoss, "Understanding employee responses to stressful information security requirements: A coping perspective," J. of Management Information Systems, vol. 31, no. 2, 2014, pp. 285-318.   DOI
12 I. Hwang and O. Cha, "Examining technostress creators and role stress as potential threats to employees' information security compliance," Computers in Human Behavior, vol. 81, 2018, pp. 282-293.   DOI
13 W. Seo, "A study on the application of modularization technique to standard security policy to protect information assets and the securement of confidentiality and integrity," J. of the Korea Institute of Electronic Communication Sciences, vol. 14, no. 1, 2019, pp. 111-118.   DOI
14 A. Shirish, "Cognitive-affective appraisal of technostressors by ICT-based mobile workers and their impacts on technostrain," Human Systems Management, vol. 40, no. 2, 2021, pp. 265-285.   DOI
15 A. Lee, S. Son, and K. Kim, "Information and communication technology overload and social networking service fatigue: A stress perspective," Computers in Human Behavior, vol. 55, 2016, pp. 51-61.   DOI
16 D. L. Goodhue and R. L. Thompson, "Task-technology fit and individual performance," MIS Quarterly, vol. 19, no. 2, 1995, pp. 213-236.   DOI
17 H. Kim, "A Study on cloud-based secure file management security," J. of the Korea Institute of Electronic Communication Sciences, vol. 14, no. 1, 2019, pp. 243-250.   DOI
18 V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, "User acceptance of information technology: Toward a unified view," MIS Quarterly, vol. 27, no. 3, 2003, pp. 425-478.   DOI
19 J. C. Nunnally, Psychometric theory (2nd ed.). New York: McGraw-Hill, 1978.
20 P. M. Podsakoff, S. B. MacKenzie, J. Lee, and N. P. Podsakoff, "Common method biases in behavioral research: A critical review of the literature and recommended remedies," Journal of Applied Psychology, vol. 88, no. 5, 2003, pp. 879-903.   DOI
21 I. Hwang, D. Kim, T. Kim, and S. Kim, "Why not comply with information security? An empirical approach for the causes of non-compliance," Online Information Review, vol. 41, no. 1, 2017, pp. 2-18.   DOI
22 Verizon, "2020 data breach investigations report," Report, 2020.
23 M. J. Merhi and P. Ahluwalia, "Examining the impact of deterrence factors and norms on resistance to information systems security," Computers in Human Behavior, vol. 92, 2019, pp. 37-46.   DOI
24 C. C. Angolano, I. R. Guzman, M. S. Garmon, and C. J. Navarrete, "Information technology security task-technology fit based on the technology-to-performance chain theory," In Proc. of the 50th annual conf. on Computers and People Research (17-26), Milwaukee, Wisconsin, USA, 2012.
25 G. C. Lin, Z. Wen, H. W. Marsh, and H. S. Lin, "Structural equation models of latent interactions: Clarification of orthogonalizing and double-mean-centering strategies," Structural Equation Modeling, vol. 17, no. 3, 2010, pp. 374-391.   DOI
26 M. Tarafdar, Q. Tu, B. S. Ragu-Nathan, and T. S. Ragu-Nathan, "The impact of technostress on role stress and productivity," J. of Management Information Systems, vol. 24, no. 1, 2007, pp. 301-328.   DOI