1 |
C. Newton and S. Teo, "Identification and occupational stress: A stress buffering perspective," Human Resource Management, vol. 53, no. 1, 2014, pp. 89-113.
DOI
|
2 |
J. D'Arcy and P. L. Teh, "Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization," Information & Management, vol. 56, no. 7, 2019, pp. 103151.
DOI
|
3 |
T. R. Tyler and S. L. Blader, "The group engagement model: Procedural justice, social identity, and cooperative behavior," Personality and Social Psychology Review, vol. 7, no. 4, 2003, pp. 349-361.
DOI
|
4 |
M. L. Ambrose and M. Schminke, "The role of overall justice judgments in organizational justice research: A test of mediation," J. of Applied Psychology, vol. 94, no. 2, 2009, pp. 491-500.
DOI
|
5 |
T. A. Judge and J. A. Colquitt, "Organizational justice and stress: The mediating role of work-family conflict," J. of Applied Psychology, vol. 89, no. 3, 2004, pp. 395-404.
DOI
|
6 |
Y. Zhang, J. A. LePine, B. R. Buckman, and F. Wei, "It's not fair... or is it? The role of justice and leadership in explaining work stressor-job performance relationships," Academy of Management J., vol. 57, no. 3, 2014, pp. 675-697.
DOI
|
7 |
I. Hwang, "The influence on the information security techno-stress on security policy resistance through strain: Focusing on the moderation of task technology fit," J. of the Korea Institute of Electronic Communication Sciences, vol. 16, no. 5, 2021, pp. 931-939.
DOI
|
8 |
K. A. Alshare, P. L. Lane, and M. R. Lane, "Information security policy compliance: A higher education case study," Information & Computer Security, vol. 26 no. 1, 2018, pp. 91-108.
DOI
|
9 |
P. Menard, G. J. Bott, and R. E. Crossler, "User motivations in protecting information security: Protection motivation theory versus self-determination theory," J. of Management Information Systems, vol. 34, no. 4, 2017, pp. 1203-1230.
DOI
|
10 |
L. Van Dyne and J. A. LePine, "Helping and voice extra-role behaviors: Evidence of construct and predictive validity," Academy of Management J., vol. 41, no. 1, 1998, pp. 108-119.
DOI
|
11 |
M. Svendsen and T. S. Joensson, "Transformational leadership and change-related voice behavior," Leadership & Organization Development J., vol. 37, no. 3, 2016, pp. 357-368.
DOI
|
12 |
P. M. Podsakoff, S. B. MacKenzie, J. Lee, and N. P. Podsakoff, "Common method biases in behavioral research: A critical review of the literature and recommended remedies," J. of Applied Psychology, vol. 88, no. 5, 2003, pp. 879-903.
DOI
|
13 |
L. Willis, K. J. Reynolds, and E. Lee, "Being well at work: The impact of organizational climate and social identity on employee stress and self-esteem over time," European J. of Work and Organizational Psychology, vol. 28, no. 3, 2019, pp. 399-413.
DOI
|
14 |
F. O. Walumbwa, D. M. Mayer, P. Wang, H. Wang, K. Workman, and A. L. Christensen, "Linking ethical leadership to employee performance: The roles of leader-member exchange, self-efficacy, and organizational identification," Organizational Behavior and Human Decision Processes, vol. 115, no. 2, 2011, pp. 204-213.
DOI
|
15 |
N. L. Jimmieson, B. M. McKimmie, R. L. Hannam, and J. Gallagher, "An investigation of the stress-buffering effects of social support in the occupational stress process as a function of team identification," Group Dynamics: Theory, Research, and Practice, vol. 14, no. 4, 2010, pp. 350-367.
DOI
|
16 |
J. C. Nunnally, Psychometric theory (2nd ed.). New York: McGraw-Hill, 1978.
|
17 |
C. Fornell and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error," J. of Marketing Research, vol. 18, no. 1, 1981, pp. 39-50.
DOI
|
18 |
A. F. Hayes, Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. New York: Guilford Publications, 2017.
|
19 |
Verizon, "2020 data breach investigations report," Report, 2020.
|
20 |
Y. Duan, Y. Liu, Y. Chen, W. Guo, and L. Yang, "Research on the impact of knowledge sharing on risk control of inclusive finance in rural areas during the post-COVID-19 era," J. of Knowledge Management, vol. 25, no. 6, 2021, pp. 1526-1549.
DOI
|
21 |
W. Lee and I. Hwang, "Sustainable information security behavior management: An empirical approach for the causes of employees' voice behavior," Sustainability, vol. 13, no. 11, 2021, pp. 6077.
DOI
|
22 |
Y. Xue, H. Liang, and L. Wu, "Punishment, justice, and compliance in mandatory IT settings," Information Systems Research, vol. 22, no. 2, 2011, pp. 400-414.
DOI
|
23 |
M. Kajtazi, H. Cavusoglu, I. Benbasat, and D. Haftor, "Escalation of commitment as an antecedent to noncompliance with information security policy," Information & Computer Security, vol. 26, no. 2, 2018, pp. 171-193.
DOI
|
24 |
I. Hwang, "The influence on the information security stressor on information security compliance intention: Focusing on the moderation of authentic leadership," J. of the Korea Institute of Electronic Communication Sciences, vol. 16, no. 6, 2021, pp. 1101-1112.
|
25 |
P. S. Galluch, V. Grover, and J. B. Thatcher, "Interrupting the workplace: Examining stressors in an information technology context," J. of the Association for Information Systems, vol. 16, no. 1, 2015, pp. 1-47.
DOI
|
26 |
S. Trang and I. Nastjuk, "Examining the role of stress and information security policy design in information security compliance behavior: An experimental study of in-task behavior," Computers & Security, vol. 104, 2021, pp. 102222.
DOI
|
27 |
X. Ma, "IS professionals' information security behaviors in Chinese IT organizations for information security protection," Information Processing & Management, vol. 59, no. 1, 2022, pp. 102744.
DOI
|
28 |
S. L. Blader and T. R. Tyler, "Testing and extending the group engagement model: Linkages between social identity, procedural justice, economic outcomes, and extrarole behavior," J. of Applied Psychology, vol. 94, no. 2, 2009, pp. 445-464.
DOI
|
29 |
J. S. Adams, Inequity in social exchange. In Advances in Experimental Social Psychology. New York: Academic Press, 1965.
|
30 |
M. Tarafdar, Q. Tu, B. S. Ragu-Nathan, and T. S. Ragu-Nathan, "The impact of technostress on role stress and productivity," J. of Management Information Systems, vol. 24, no. 1, 2007, pp. 301-328.
DOI
|
31 |
I. Hwang, "The effect on the IS psychological empowerment on the mitigation of IS policy resistance through IS role stress: Focusing on the moderation of IS justice climate," J. of the Korea Institute of Electronic Communication Sciences, vol. 17, no. 1, 2022, pp. 1-12.
|
32 |
L. Avanzi, F. Fraccaroli, G. Sarchielli, J. Ullrich, and R. van Dick, "Staying or leaving: A combined social identity and social exchange approach to predicting employee turnover intentions," Int. J. of Productivity and Performance Management, vol. 63, no. 3, 2014, pp. 272-289.
DOI
|
33 |
H. Li, J. Zhang, and R. Sarathy, "Understanding compliance with internet use policy from the perspective of rational choice theory," Decision Support Systems, vol. 48, no. 4, 2010, pp. 635-645.
DOI
|
34 |
R. E. Johnson, C. H. Chang, and C. C. Rosen, "Who I am depends on how fairly I'm treated": Effects of justice on self identity and regulatory focus," J. of Applied Social Psychology, vol. 40, no. 12, 2010, pp. 3020-3058.
DOI
|
35 |
A. K. Khan, S. Quratulain, and J. R. Crawshaw, "The mediating role of discrete emotions in the relationship between injustice and counterproductive work behaviors: A study in Pakistan," J. of Business and Psychology, vol. 28, no. 1, 2013, pp. 49-61.
DOI
|
36 |
A. Ceylan and S. Sulu, "Work alienation as a mediator of the relationship of procedural injustice to job stress," South East European J. of Economics and Business, vol. 5, no. 2, 2010, pp. 65-74.
|