Does Technostress Trigger Insider Threat? A Conceptual Model and Mitigation Solutions

[1]  Jignya Patel,et al.  Theorizing the Dual Role of Information Technology in Technostress Research , 2012, AMCIS.

[2]  Hsinchun Chen,et al.  Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act , 2019, Inf. Syst. Res..

[3]  René Riedl,et al.  Is the Technostress Creators Inventory Still an Up-To-Date Measurement Instrument? Results of a Large-Scale Interview Study , 2019, Wirtschaftsinformatik.

[4]  David P. Biros,et al.  An Empirical Validation of Malicious Insider Characteristics , 2016, J. Manag. Inf. Syst..

[5]  Mark D. Guido,et al.  Insider Threat Program Best Practices , 2013, 2013 46th Hawaii International Conference on System Sciences.

[6]  Adela J. Chen,et al.  Life Interrupted: The Effects of Technology-Mediated Work Interruptions on Work and Nonwork Outcomes , 2018, MIS Q..

[7]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[8]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[9]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[10]  Heng Ngee Mok Teaching Tip: The Flipped Classroom , 2014, J. Inf. Syst. Educ..

[11]  Ramesh Sharda,et al.  Decision support system effectiveness: a review and an empirical test , 1988 .

[12]  Sven Laumer,et al.  Technostress and the hierarchical levels of personality: a two-wave study with multiple data samples , 2019, Eur. J. Inf. Syst..

[13]  Kalle Lyytinen,et al.  Special Section Introduction - Information, Technology, and the Changing Nature of Work , 2014, Inf. Syst. Res..

[14]  Bonnie Brinton Anderson,et al.  How users perceive and respond to security messages: a NeuroIS research agenda and empirical study , 2016, Eur. J. Inf. Syst..

[15]  Monideepa Tarafdar,et al.  Reflecting on the "Dark Side" of Information Technology Use , 2012, Commun. Assoc. Inf. Syst..

[16]  Hyunsun Park,et al.  Negative Impact of Social Network Services Based on Stressor-Stress-Outcome: The Role of Experience of Privacy Violations , 2019, Future Internet.

[17]  Monideepa Tarafdar,et al.  Technostress: negative effect on performance and possible mitigations , 2015, Inf. Syst. J..

[18]  Richard N. Landers,et al.  Gamification of task performance with leaderboards: A goal setting experiment , 2017, Comput. Hum. Behav..

[19]  Qiang Tu,et al.  Computer-related technostress in China , 2005, CACM.

[20]  R. Agnew Foundation for a General Strain Theory of Crime and Delinquency , 1992, Crime, Inequality and the State.

[21]  Alain Pinsonneault,et al.  The many faces of information technology interruptions: a taxonomy and preliminary investigation of their performance effects , 2015, Inf. Syst. J..

[22]  Patrick McKenzie Weapons of mass assignment , 2011, CACM.

[23]  Jason Bennett Thatcher,et al.  Concentration, Competence, Confidence, and Capture: An Experimental Study of Age, Interruption-based Technostress, and Task Performance , 2018, J. Assoc. Inf. Syst..

[24]  Humayun Zafar,et al.  Current State of Information Security Research In IS , 2009, Commun. Assoc. Inf. Syst..

[25]  Björn Niehaves,et al.  AIS Electronic , 2017 .

[26]  Catherine E. Connelly,et al.  Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model , 2011, J. Manag. Inf. Syst..

[27]  Stoney L. Brooks,et al.  Technology Addictions and Technostress: An Examination of Hong Kong and the U.S , 2016, AMCIS.

[28]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[29]  Tom Forester,et al.  Computer unreliability and social vulnerability , 1990 .

[30]  Varun Grover,et al.  Technostress: Technological Antecedents and Implications , 2011, MIS Q..

[31]  Monideepa Tarafdar,et al.  The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation , 2008, Inf. Syst. Res..

[32]  Budi Arief,et al.  Computer security impaired by legitimate users , 2004, Comput. Secur..

[33]  C. D. Jaidhar,et al.  Applicability of machine learning in spam and phishing email filtering: review and approaches , 2020, Artificial Intelligence Review.

[34]  Sven Laumer,et al.  The Effect of Coping Mechanisms on Technology Induced Stress: Towards a Conceptual Model , 2013, AMCIS.

[35]  Qiang Tu,et al.  Technostress under different organizational environments: An empirical investigation , 2008, Comput. Hum. Behav..

[36]  G. W. Florkowski,et al.  HR technologies and HR-staff technostress: an unavoidable or combatable effect? , 2019, Employee Relations: The International Journal.

[37]  Huseyin Cavusoglu,et al.  Economics of ITSecurity Management: Four Improvements to Current Security Practices , 2004, Commun. Assoc. Inf. Syst..

[38]  Jason Bennett Thatcher,et al.  NeuroIS - Alternative or Complement to Existing Methods? Illustrating the Holistic Effects of Neuroscience and Self-Reported Data in the Context of Technostress Research , 2014, J. Assoc. Inf. Syst..

[39]  Deborah J. Armstrong,et al.  Person-Job Cognitive Style Fit for Software Developers: The Effect on Strain and Performance , 2005, J. Manag. Inf. Syst..

[40]  Allen C. Johnston,et al.  How Much is Too Much: Employee Monitoring, Surveillance, and Strain , 2019, ICIS.

[41]  Xiongfei Cao,et al.  Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs , 2020, Inf. Syst. Frontiers.

[42]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[43]  R. Hudiburg Psychology of Computer Use: XXXIV. The Computer Hassles Scale: Subscales, Norms, and Reliability , 1995, Psychological reports.

[44]  Tamara Dinev,et al.  Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture , 2012, Decis. Sci..

[45]  Satya Prakash Saraswat,et al.  Teaching Business Process Management with Simulation in Graduate Business Programs: An Integrative Approach , 2014, J. Inf. Syst. Educ..

[46]  Melissa A. Venable,et al.  Technostress: Implications for Adults in the Workforce , 2017 .

[47]  Chiao-Chen Chang,et al.  Examining users′ intention to continue using social network games: A flow experience perspective , 2013, Telematics Informatics.

[48]  Markus Makkonen,et al.  Coping with Technostress: When Emotional Responses Fail , 2017, ICIS.

[49]  Sudeep Tanwar,et al.  Markov Model for Password Attack Prevention , 2020 .

[50]  Tianjian Zhang,et al.  Psychological Contract Violation and Sharing Intention on Facebook , 2019, HICSS.

[51]  Lutz Kolbe,et al.  Can Information Systems Reduce Stress? The Impact of Information Systems on Perceived Stress and Attitude , 2014, ICIS.

[52]  Saonee Sarker,et al.  The Bright and Dark Sides of Technostress: A Mixed-Methods Study Involving Healthcare IT , 2020, MIS Q..

[53]  Eric W. T. Ngai,et al.  The Double-Edged Nature of Technostress on Work Performance: A Research Model and Research Agenda , 2014, ICIS.

[54]  Monideepa Tarafdar,et al.  The Impact of Technostress on Role Stress and Productivity , 2007, J. Manag. Inf. Syst..

[55]  Lennart E. Nacke,et al.  Gamification : Toward a Definition , 2022 .

[56]  Shingo Yamaguchi,et al.  Petri net-based verification of security protocol implementation in software evolution , 2018, Int. J. Embed. Syst..

[57]  Latifa Ben Arfa Rabai,et al.  Classification of Security Threats in Information Systems , 2014, ANT/SEIT.

[58]  Inho Hwang,et al.  Examining technostress creators and role stress as potential threats to employees' information security compliance , 2018, Comput. Hum. Behav..

[59]  Julian C. Bradfield,et al.  A general definition of malware , 2010, Journal in Computer Virology.

[60]  Mikko T. Siponen,et al.  Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study , 2010, MIS Q..

[61]  U. Ahmad,et al.  An Exploration of the Relationship between Technostress, Employee Engagement and Job Design from the Nigerian Banking Employee’s Perspective , 2013 .

[62]  Jeffrey R. Edwards,et al.  An Examination Of Competing Versions Of The Person-Environment Fit Approach To Stress , 1996 .

[63]  Jack Shih-Chieh Hsu,et al.  The Influence of Information Security Stress on Security Policy Compliance: A Protection Motivation Theory Perspective , 2018, PACIS.

[64]  Vivian Estrada Sentí,et al.  Artificial intelligence techniques for information security risk assessment , 2018 .

[65]  E. Brynjolfsson,et al.  Computing Productivity: Firm-Level Evidence , 2003, Review of Economics and Statistics.

[66]  René Riedl,et al.  Technostress from a Neurobiological Perspective , 2012, Business & Information Systems Engineering.

[67]  William J. Kettinger,et al.  A New Open Door: The Smartphone's Impact on Work-to-Life Conflict, Stress, and Resistance , 2012, Int. J. Electron. Commer..

[68]  Tao Zhou,et al.  Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern , 2014, Comput. Hum. Behav..

[69]  Ken H. Guo Security-related behavior in using information systems in the workplace: A review and synthesis , 2013, Comput. Secur..

[70]  Shafique Ahmad Chaudhry,et al.  Phishing Attacks and Defenses , 2016 .

[71]  René Riedl,et al.  Design Blueprint for Stress-Sensitive Adaptive Enterprise Systems , 2017, Bus. Inf. Syst. Eng..

[72]  Cary L. Cooper,et al.  E-mail load, workload stress and desired e-mail load: a cybernetic approach , 2019, Inf. Technol. People.

[73]  Lu Li,et al.  Technostress in university students' technology-enhanced learning: An investigation from multidimensional person-environment misfit , 2020, Comput. Hum. Behav..

[74]  Rajiv Kohli,et al.  Antecedents of B2C Channel Satisfaction and Preference: Validating e-Commerce Metrics , 2002, Inf. Syst. Res..

[75]  Qing Hu,et al.  Does deterrence work in reducing information security policy abuse by employees? , 2011, Commun. ACM.

[76]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[77]  Mark Peterson,et al.  Towards a Research Agenda for the Use of Three-Dimensional Virtual Worlds in Language Learning , 2011 .

[78]  Edward T. Chen,et al.  Implementation of Knowledge Management Systems and Firm Performance: An Empirical Investigation , 2005, J. Comput. Inf. Syst..

[79]  Isaac Kofi Nti,et al.  A comprehensive evaluation of ensemble learning for stock-market prediction , 2020, Journal of Big Data.

[80]  Lorin M. Hitt,et al.  Productivity, Business Profitability, and Consumer Surplus: Three Different Measures of Information Technology Value , 1996, MIS Q..

[81]  Lori N. K. Leonard,et al.  Illegal, Inappropriate, And Unethical Behavior In An Information Technology Context: A Study To Explain Influences , 2001, J. Assoc. Inf. Syst..

[82]  Teodor Sommestad,et al.  Variables influencing information security policy compliance: A systematic review of quantitative studies , 2014, Inf. Manag. Comput. Secur..

[83]  Tejaswini Herath,et al.  Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..

[84]  Robin S. Poston,et al.  The impact of enterprise resource planning systems on firm performance , 2000, ICIS.

[85]  Paul Benjamin Lowry,et al.  Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies , 2015, Inf. Syst. J..

[86]  C. Maier,et al.  Technostress mitigation: an experimental study of social support during a computer freeze , 2020, Journal of Business Economics.

[87]  Michael Workman,et al.  Punishment and ethics deterrents: A study of insider security contravention , 2007, J. Assoc. Inf. Sci. Technol..

[88]  Detmar W. Straub,et al.  Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..

[89]  Vern Paxson,et al.  A Large-Scale Empirical Study of Security Patches , 2017, CCS.

[90]  Jerome Bump,et al.  Radical changes in class discussion using networked computers , 1990, Comput. Humanit..

[91]  Brian S. Butler,et al.  Reliability, Mindfulness, and Information Systems , 2006, MIS Q..

[92]  Elaine Mosconi,et al.  Understanding digital transformation and disruptive technology impacts on bank managers' routine , 2019, AMCIS.

[93]  Robyn Tamblyn,et al.  Impacts of Stress, Satisfaction and Behavioral Intention on Continued Usage: Evidence from Physicians Transitioning to a New Drug Management System , 2017, HICSS.

[94]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[95]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[96]  Ramakrishna Ayyagari An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights , 2012 .

[97]  Sholom Cohen,et al.  Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies , 2014, 2014 47th Hawaii International Conference on System Sciences.

[98]  Debby Goedknegt Changing Business Process Management in Project Development , 2015 .

[99]  Rajiv Kohli,et al.  Information Technology Payoff in the Health-Care Industry: A Longitudinal Study , 2000, J. Manag. Inf. Syst..

[100]  Larry D. Rosen,et al.  Multitasking across generations: Multitasking choices and difficulty ratings in three generations of Americans , 2009, Comput. Hum. Behav..

[101]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[102]  W. Alec Cram,et al.  Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance , 2019, MIS Q..

[103]  Sunil Mithas,et al.  How Information Technology Strategy and Investments Influence Firm Performance: Conjecture and Empirical Evidence , 2016, MIS Q..

[104]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[105]  Lionel P. Robert,et al.  Emotional Attachment, Performance, and Viability in Teams Collaborating with Embodied Physical Action (EPA) Robots , 2018, J. Assoc. Inf. Syst..

[106]  Monideepa Tarafdar,et al.  Impact of Technostress on End-User Satisfaction and Performance , 2010, J. Manag. Inf. Syst..

[107]  Iqbal H. Sarker,et al.  Cybersecurity data science: an overview from machine learning perspective , 2020, Journal of Big Data.

[108]  Jaime Lloret,et al.  Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[109]  R. Baskerville,et al.  An information security meta‐policy for emergent organizations , 2002 .

[110]  James Backhouse,et al.  Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..

[111]  T. E. Zorn,et al.  The emotionality of information and communication technology implementation , 2003 .

[112]  Rui Chen,et al.  Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model , 2011, Decis. Support Syst..

[113]  Lynn Hasher,et al.  Age-related differences in cognition: the role of distraction control. , 2008, Neuropsychology.

[114]  Merrill Warkentin,et al.  Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..

[115]  Suchit Ahuja,et al.  A Foundation for the Study of Personal Cloud Computing in Organizations , 2015, AMCIS.

[116]  Lei-da Chen Validating the Technostress Instrument using a Sample of Chinese Knowledge Workers , 2015, Journal of International Technology and Information Management.

[117]  Fred D. Davis,et al.  Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual‐systems perspective , 2015, Inf. Syst. J..