Emotional reactions and coping responses of employees to a cyber-attack: A case study

[1]  Anne Beaudry,et al.  IT-Induced Adaptation and Individual Performance: A Coping Acts Model , 2001, ICIS.

[2]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[3]  M. Becker,et al.  The Health Belief Model: A Decade Later , 1984, Health education quarterly.

[4]  David H. Tobey,et al.  Enhancing the Cybersecurity Workforce , 2011, IT Professional.

[5]  Paul van Schaik,et al.  Persuading end users to act cautiously online: a fear appeals study on phishing , 2018, Inf. Comput. Secur..

[6]  S. Folkman,et al.  Journal of Personality and Social Psychology If It Changes It Must Be a Process: Study of Emotion and Coping during Three Stages of a College Examination , 2022 .

[7]  Kalle Lyytinen,et al.  Design With a Positive Lens: An Affirmative Approach to Designing Information and Organizations , 2006, Commun. Assoc. Inf. Syst..

[8]  Emil C. Lupu,et al.  Organizational cloud security and control: a proactive approach , 2019, Inf. Technol. People.

[9]  James Noble,et al.  Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP).

[10]  Žaklina Spalević Cyber Security as a Global Challenge of The Modern Era , 2014 .

[11]  Deborah J. Armstrong,et al.  The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations , 2018, Int. J. Inf. Manag..

[12]  P. Sheeran,et al.  Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .

[13]  Sue Newell,et al.  Coping with Information Technology: Mixed Emotions, Vacillation, and Nonconforming Use Patterns , 2015, MIS Q..

[14]  C. Argyris Management Information Systems: The Challenge to Rationality and Emotionality , 1971 .

[15]  Watts S. Humphrey,et al.  Software process improvement at Hughes Aircraft , 1991, IEEE Software.

[16]  Gurpreet Dhillon,et al.  Stakeholder perceptions of information security policy: Analyzing personal constructs , 2020, Int. J. Inf. Manag..

[17]  Siew H. Chan,et al.  Insight into hackers' reaction toward information security breach , 2019, Int. J. Inf. Manag..

[18]  Marijn Janssen,et al.  Agile and adaptive governance in crisis response: Lessons from the COVID-19 pandemic , 2020, International Journal of Information Management.

[19]  Soumik Mondal,et al.  TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[20]  Jane Webster,et al.  Are we talking about the task or the computer? An examination of the associated domains of task-specific and computer self-efficacies , 2011, Comput. Hum. Behav..

[21]  David Wastell,et al.  The fetish of technique: methodology as a social defence , 1996 .

[22]  Malcolm Robert Pattinson,et al.  The effect of resilience and job stress on information security awareness , 2018, Inf. Comput. Secur..

[23]  Nicholas Micallef,et al.  Security questions education: exploring gamified features and functionalities , 2018, Inf. Comput. Secur..

[24]  Younghwa Lee,et al.  Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..

[25]  Mark Hall Why people are key to cyber-security , 2016, Netw. Secur..

[26]  Anne Beaudry,et al.  Understanding User Responses to Information Technology: A Coping Model of User Adaption , 2005, MIS Q..

[27]  Cleotilde Gonzalez,et al.  Effects of cyber security knowledge on attack detection , 2015, Comput. Hum. Behav..

[28]  Paul C. van Fenema,et al.  Cocreating Understanding and Value in Distributed Work: How Members of Onsite and Offshore Vendor Teams Give, Make, Demand, and Break Sense , 2008, MIS Q..

[29]  Murat Koyuncu,et al.  Understanding key skills for information security managers , 2018, Int. J. Inf. Manag..

[30]  M. Angela Sasse,et al.  Employee Rule Breakers, Excuse Makers and Security Champions:: Mapping the risk perceptions and emotions that drive security behaviors , 2015, NSPW.

[31]  Andrew D. Brown,et al.  Saying it with feeling: Analysing speakable emotions , 2008 .

[32]  Leandros A. Maglaras,et al.  HEART-IS: A novel technique for evaluating human error-related information security incidents , 2019, Comput. Secur..

[33]  Wanda J. Orlikowski,et al.  Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..

[34]  Alan D. Smith,et al.  Issues in cybersecurity; understanding the potential risks associated with hackers/crackers , 2002, Inf. Manag. Comput. Secur..

[35]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[36]  Andy Koronios,et al.  Information Technology Security and Risk Management , 2006 .

[37]  Carl Colwill,et al.  Human factors in information security: The insider threat - Who can you trust these days? , 2009, Inf. Secur. Tech. Rep..

[38]  R. W. Rogers,et al.  A meta-analysis of research on protection motivation theory. , 2000 .

[39]  Efpraxia D. Zamani,et al.  Generative mechanisms of workarounds, discontinuance and reframing: a study of negative disconfirmation with consumerised IT , 2020, Inf. Syst. J..

[40]  K. Weick,et al.  Collective mind in organizations: Heedful interrelating on flight decks. , 1993 .

[41]  Anne Beaudry,et al.  The Other Side of Acceptance: Studying the Direct and Indirect Effects of Emotions on Information Technology Use , 2010, MIS Q..

[42]  Ana Ortiz de Guinea,et al.  Why break the habit of a lifetime? rethinking the roles of intention, habit, and emotion in continuing information technology use , 2009 .

[43]  Susan Greener,et al.  Business Research Methods , 2008 .

[44]  Monideepa Tarafdar,et al.  Workplace Stress from Actual and Desired Computer‐Mediated Communication Use: A Multi‐Method Study , 2017 .

[45]  Henri Barki,et al.  Interpersonal Conflict and Its Management in Information System Development , 2001, MIS Q..

[46]  Merrill Warkentin,et al.  Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..

[47]  Patrick Stacey,et al.  Designing emotion-centred Product Service Systems: The case of a cancer care facility , 2015 .

[48]  M. Goldberg,et al.  What to Convey in Antismoking Advertisements for Adolescents: The use of Protection Motivation Theory to Identify Effective Message Themes , 2003 .

[49]  Tejaswini Herath,et al.  Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..

[50]  Mahmood Hussain Shah,et al.  Information security management needs more holistic approach: A literature review , 2016, Int. J. Inf. Manag..

[51]  Steven Furnell,et al.  Information security conscious care behaviour formation in organizations , 2015, Comput. Secur..

[52]  Frederick J. Riggins,et al.  The role of emotion in P2P microfinance funding: A sentiment analysis approach , 2020, Int. J. Inf. Manag..

[53]  Mark I. Hwang,et al.  Disentangling the Effect of Top Management Support and Training on Systems Implementation Success: A Meta-Analysis , 2014, Commun. Assoc. Inf. Syst..

[54]  Hennie A. Kruger,et al.  I shall, we shall, and all others will: paradoxical information security behaviour , 2018, Inf. Comput. Secur..

[55]  Michael Rosen COMING TO TERMS WITH THE FIELD: UNDERSTANDING AND DOING ORGANIZATIONAL ETHNOGRAPHY* , 1991 .

[56]  R. Lazarus From psychological stress to the emotions: a history of changing outlooks. , 1993, Annual review of psychology.

[57]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[58]  Joe Nandhakumar,et al.  Responding to games development challenges through mood-mediated improvisation , 2006, ECIS.

[59]  Sylvain Frey,et al.  The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game , 2018, IEEE Transactions on Software Engineering.

[60]  Stephen B. Castleberry,et al.  Effective Interpersonal Listening and Personal Selling , 2013 .

[61]  George M. Giaglis,et al.  Appropriating Information Technology Artefacts through Trial and Error: The Case of the Tablet , 2020, Information systems frontiers : a journal of research and innovation.

[62]  Kim-Kwang Raymond Choo,et al.  The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..

[63]  Karen E. Till,et al.  Ethnography and participant observation , 2010 .

[64]  Yajiong Xue,et al.  Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..

[65]  Steven Furnell,et al.  Guest editorial , 2018, Information and Computer Security.

[66]  K. Scherer The dynamic architecture of emotion: Evidence for the component process model , 2009 .

[67]  Juan-Gabriel Cegarra-Navarro,et al.  Implementing telemedicine through eListening in hospital-in-the-home units , 2010, Int. J. Inf. Manag..

[68]  A. Bandura Self-efficacy mechanism in human agency. , 1982 .

[69]  Cary L. Cooper,et al.  Appraisal of Email Use as A Source of Workplace Stress: A Person-Environment Fit Approach , 2019, J. Assoc. Inf. Syst..

[70]  Joe Nandhakumar,et al.  Designing in the dark: the changing user-developer relationship in information systems development , 1997, ICIS '97.

[71]  Helge Janicke,et al.  Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis , 2019, Enterp. Inf. Syst..