Does Technostress Trigger Insider Threat? A Conceptual Model and Mitigation Solutions
暂无分享,去创建一个
[1] Jignya Patel,et al. Theorizing the Dual Role of Information Technology in Technostress Research , 2012, AMCIS.
[2] Hsinchun Chen,et al. Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act , 2019, Inf. Syst. Res..
[3] René Riedl,et al. Is the Technostress Creators Inventory Still an Up-To-Date Measurement Instrument? Results of a Large-Scale Interview Study , 2019, Wirtschaftsinformatik.
[4] David P. Biros,et al. An Empirical Validation of Malicious Insider Characteristics , 2016, J. Manag. Inf. Syst..
[5] Mark D. Guido,et al. Insider Threat Program Best Practices , 2013, 2013 46th Hawaii International Conference on System Sciences.
[6] Adela J. Chen,et al. Life Interrupted: The Effects of Technology-Mediated Work Interruptions on Work and Nonwork Outcomes , 2018, MIS Q..
[7] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[8] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[9] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[10] Heng Ngee Mok. Teaching Tip: The Flipped Classroom , 2014, J. Inf. Syst. Educ..
[11] Ramesh Sharda,et al. Decision support system effectiveness: a review and an empirical test , 1988 .
[12] Sven Laumer,et al. Technostress and the hierarchical levels of personality: a two-wave study with multiple data samples , 2019, Eur. J. Inf. Syst..
[13] Kalle Lyytinen,et al. Special Section Introduction - Information, Technology, and the Changing Nature of Work , 2014, Inf. Syst. Res..
[14] Bonnie Brinton Anderson,et al. How users perceive and respond to security messages: a NeuroIS research agenda and empirical study , 2016, Eur. J. Inf. Syst..
[15] Monideepa Tarafdar,et al. Reflecting on the "Dark Side" of Information Technology Use , 2012, Commun. Assoc. Inf. Syst..
[16] Hyunsun Park,et al. Negative Impact of Social Network Services Based on Stressor-Stress-Outcome: The Role of Experience of Privacy Violations , 2019, Future Internet.
[17] Monideepa Tarafdar,et al. Technostress: negative effect on performance and possible mitigations , 2015, Inf. Syst. J..
[18] Richard N. Landers,et al. Gamification of task performance with leaderboards: A goal setting experiment , 2017, Comput. Hum. Behav..
[19] Qiang Tu,et al. Computer-related technostress in China , 2005, CACM.
[20] R. Agnew. Foundation for a General Strain Theory of Crime and Delinquency , 1992, Crime, Inequality and the State.
[21] Alain Pinsonneault,et al. The many faces of information technology interruptions: a taxonomy and preliminary investigation of their performance effects , 2015, Inf. Syst. J..
[22] Patrick McKenzie. Weapons of mass assignment , 2011, CACM.
[23] Jason Bennett Thatcher,et al. Concentration, Competence, Confidence, and Capture: An Experimental Study of Age, Interruption-based Technostress, and Task Performance , 2018, J. Assoc. Inf. Syst..
[24] Humayun Zafar,et al. Current State of Information Security Research In IS , 2009, Commun. Assoc. Inf. Syst..
[25] Björn Niehaves,et al. AIS Electronic , 2017 .
[26] Catherine E. Connelly,et al. Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model , 2011, J. Manag. Inf. Syst..
[27] Stoney L. Brooks,et al. Technology Addictions and Technostress: An Examination of Hong Kong and the U.S , 2016, AMCIS.
[28] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[29] Tom Forester,et al. Computer unreliability and social vulnerability , 1990 .
[30] Varun Grover,et al. Technostress: Technological Antecedents and Implications , 2011, MIS Q..
[31] Monideepa Tarafdar,et al. The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation , 2008, Inf. Syst. Res..
[32] Budi Arief,et al. Computer security impaired by legitimate users , 2004, Comput. Secur..
[33] C. D. Jaidhar,et al. Applicability of machine learning in spam and phishing email filtering: review and approaches , 2020, Artificial Intelligence Review.
[34] Sven Laumer,et al. The Effect of Coping Mechanisms on Technology Induced Stress: Towards a Conceptual Model , 2013, AMCIS.
[35] Qiang Tu,et al. Technostress under different organizational environments: An empirical investigation , 2008, Comput. Hum. Behav..
[36] G. W. Florkowski,et al. HR technologies and HR-staff technostress: an unavoidable or combatable effect? , 2019, Employee Relations: The International Journal.
[37] Huseyin Cavusoglu,et al. Economics of ITSecurity Management: Four Improvements to Current Security Practices , 2004, Commun. Assoc. Inf. Syst..
[38] Jason Bennett Thatcher,et al. NeuroIS - Alternative or Complement to Existing Methods? Illustrating the Holistic Effects of Neuroscience and Self-Reported Data in the Context of Technostress Research , 2014, J. Assoc. Inf. Syst..
[39] Deborah J. Armstrong,et al. Person-Job Cognitive Style Fit for Software Developers: The Effect on Strain and Performance , 2005, J. Manag. Inf. Syst..
[40] Allen C. Johnston,et al. How Much is Too Much: Employee Monitoring, Surveillance, and Strain , 2019, ICIS.
[41] Xiongfei Cao,et al. Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs , 2020, Inf. Syst. Frontiers.
[42] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[43] R. Hudiburg. Psychology of Computer Use: XXXIV. The Computer Hassles Scale: Subscales, Norms, and Reliability , 1995, Psychological reports.
[44] Tamara Dinev,et al. Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture , 2012, Decis. Sci..
[45] Satya Prakash Saraswat,et al. Teaching Business Process Management with Simulation in Graduate Business Programs: An Integrative Approach , 2014, J. Inf. Syst. Educ..
[46] Melissa A. Venable,et al. Technostress: Implications for Adults in the Workforce , 2017 .
[47] Chiao-Chen Chang,et al. Examining users′ intention to continue using social network games: A flow experience perspective , 2013, Telematics Informatics.
[48] Markus Makkonen,et al. Coping with Technostress: When Emotional Responses Fail , 2017, ICIS.
[49] Sudeep Tanwar,et al. Markov Model for Password Attack Prevention , 2020 .
[50] Tianjian Zhang,et al. Psychological Contract Violation and Sharing Intention on Facebook , 2019, HICSS.
[51] Lutz Kolbe,et al. Can Information Systems Reduce Stress? The Impact of Information Systems on Perceived Stress and Attitude , 2014, ICIS.
[52] Saonee Sarker,et al. The Bright and Dark Sides of Technostress: A Mixed-Methods Study Involving Healthcare IT , 2020, MIS Q..
[53] Eric W. T. Ngai,et al. The Double-Edged Nature of Technostress on Work Performance: A Research Model and Research Agenda , 2014, ICIS.
[54] Monideepa Tarafdar,et al. The Impact of Technostress on Role Stress and Productivity , 2007, J. Manag. Inf. Syst..
[55] Lennart E. Nacke,et al. Gamification : Toward a Definition , 2022 .
[56] Shingo Yamaguchi,et al. Petri net-based verification of security protocol implementation in software evolution , 2018, Int. J. Embed. Syst..
[57] Latifa Ben Arfa Rabai,et al. Classification of Security Threats in Information Systems , 2014, ANT/SEIT.
[58] Inho Hwang,et al. Examining technostress creators and role stress as potential threats to employees' information security compliance , 2018, Comput. Hum. Behav..
[59] Julian C. Bradfield,et al. A general definition of malware , 2010, Journal in Computer Virology.
[60] Mikko T. Siponen,et al. Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study , 2010, MIS Q..
[61] U. Ahmad,et al. An Exploration of the Relationship between Technostress, Employee Engagement and Job Design from the Nigerian Banking Employee’s Perspective , 2013 .
[62] Jeffrey R. Edwards,et al. An Examination Of Competing Versions Of The Person-Environment Fit Approach To Stress , 1996 .
[63] Jack Shih-Chieh Hsu,et al. The Influence of Information Security Stress on Security Policy Compliance: A Protection Motivation Theory Perspective , 2018, PACIS.
[64] Vivian Estrada Sentí,et al. Artificial intelligence techniques for information security risk assessment , 2018 .
[65] E. Brynjolfsson,et al. Computing Productivity: Firm-Level Evidence , 2003, Review of Economics and Statistics.
[66] René Riedl,et al. Technostress from a Neurobiological Perspective , 2012, Business & Information Systems Engineering.
[67] William J. Kettinger,et al. A New Open Door: The Smartphone's Impact on Work-to-Life Conflict, Stress, and Resistance , 2012, Int. J. Electron. Commer..
[68] Tao Zhou,et al. Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern , 2014, Comput. Hum. Behav..
[69] Ken H. Guo. Security-related behavior in using information systems in the workplace: A review and synthesis , 2013, Comput. Secur..
[70] Shafique Ahmad Chaudhry,et al. Phishing Attacks and Defenses , 2016 .
[71] René Riedl,et al. Design Blueprint for Stress-Sensitive Adaptive Enterprise Systems , 2017, Bus. Inf. Syst. Eng..
[72] Cary L. Cooper,et al. E-mail load, workload stress and desired e-mail load: a cybernetic approach , 2019, Inf. Technol. People.
[73] Lu Li,et al. Technostress in university students' technology-enhanced learning: An investigation from multidimensional person-environment misfit , 2020, Comput. Hum. Behav..
[74] Rajiv Kohli,et al. Antecedents of B2C Channel Satisfaction and Preference: Validating e-Commerce Metrics , 2002, Inf. Syst. Res..
[75] Qing Hu,et al. Does deterrence work in reducing information security policy abuse by employees? , 2011, Commun. ACM.
[76] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[77] Mark Peterson,et al. Towards a Research Agenda for the Use of Three-Dimensional Virtual Worlds in Language Learning , 2011 .
[78] Edward T. Chen,et al. Implementation of Knowledge Management Systems and Firm Performance: An Empirical Investigation , 2005, J. Comput. Inf. Syst..
[79] Isaac Kofi Nti,et al. A comprehensive evaluation of ensemble learning for stock-market prediction , 2020, Journal of Big Data.
[80] Lorin M. Hitt,et al. Productivity, Business Profitability, and Consumer Surplus: Three Different Measures of Information Technology Value , 1996, MIS Q..
[81] Lori N. K. Leonard,et al. Illegal, Inappropriate, And Unethical Behavior In An Information Technology Context: A Study To Explain Influences , 2001, J. Assoc. Inf. Syst..
[82] Teodor Sommestad,et al. Variables influencing information security policy compliance: A systematic review of quantitative studies , 2014, Inf. Manag. Comput. Secur..
[83] Tejaswini Herath,et al. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..
[84] Robin S. Poston,et al. The impact of enterprise resource planning systems on firm performance , 2000, ICIS.
[85] Paul Benjamin Lowry,et al. Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies , 2015, Inf. Syst. J..
[86] C. Maier,et al. Technostress mitigation: an experimental study of social support during a computer freeze , 2020, Journal of Business Economics.
[87] Michael Workman,et al. Punishment and ethics deterrents: A study of insider security contravention , 2007, J. Assoc. Inf. Sci. Technol..
[88] Detmar W. Straub,et al. Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..
[89] Vern Paxson,et al. A Large-Scale Empirical Study of Security Patches , 2017, CCS.
[90] Jerome Bump,et al. Radical changes in class discussion using networked computers , 1990, Comput. Humanit..
[91] Brian S. Butler,et al. Reliability, Mindfulness, and Information Systems , 2006, MIS Q..
[92] Elaine Mosconi,et al. Understanding digital transformation and disruptive technology impacts on bank managers' routine , 2019, AMCIS.
[93] Robyn Tamblyn,et al. Impacts of Stress, Satisfaction and Behavioral Intention on Continued Usage: Evidence from Physicians Transitioning to a New Drug Management System , 2017, HICSS.
[94] Qing Hu,et al. Future directions for behavioral information security research , 2013, Comput. Secur..
[95] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[96] Ramakrishna Ayyagari. An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights , 2012 .
[97] Sholom Cohen,et al. Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies , 2014, 2014 47th Hawaii International Conference on System Sciences.
[98] Debby Goedknegt. Changing Business Process Management in Project Development , 2015 .
[99] Rajiv Kohli,et al. Information Technology Payoff in the Health-Care Industry: A Longitudinal Study , 2000, J. Manag. Inf. Syst..
[100] Larry D. Rosen,et al. Multitasking across generations: Multitasking choices and difficulty ratings in three generations of Americans , 2009, Comput. Hum. Behav..
[101] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[102] W. Alec Cram,et al. Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance , 2019, MIS Q..
[103] Sunil Mithas,et al. How Information Technology Strategy and Investments Influence Firm Performance: Conjecture and Empirical Evidence , 2016, MIS Q..
[104] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[105] Lionel P. Robert,et al. Emotional Attachment, Performance, and Viability in Teams Collaborating with Embodied Physical Action (EPA) Robots , 2018, J. Assoc. Inf. Syst..
[106] Monideepa Tarafdar,et al. Impact of Technostress on End-User Satisfaction and Performance , 2010, J. Manag. Inf. Syst..
[107] Iqbal H. Sarker,et al. Cybersecurity data science: an overview from machine learning perspective , 2020, Journal of Big Data.
[108] Jaime Lloret,et al. Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[109] R. Baskerville,et al. An information security meta‐policy for emergent organizations , 2002 .
[110] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[111] T. E. Zorn,et al. The emotionality of information and communication technology implementation , 2003 .
[112] Rui Chen,et al. Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model , 2011, Decis. Support Syst..
[113] Lynn Hasher,et al. Age-related differences in cognition: the role of distraction control. , 2008, Neuropsychology.
[114] Merrill Warkentin,et al. Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..
[115] Suchit Ahuja,et al. A Foundation for the Study of Personal Cloud Computing in Organizations , 2015, AMCIS.
[116] Lei-da Chen. Validating the Technostress Instrument using a Sample of Chinese Knowledge Workers , 2015, Journal of International Technology and Information Management.
[117] Fred D. Davis,et al. Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual‐systems perspective , 2015, Inf. Syst. J..