1
|
N AJ, David R, A K S, Singh S, Nigoti U. The moderating effects of perceived social worth and organizational virtuousness on the relationship between emotional labor, precarious work, and organizational commitment among ASHA workers in India. Acta Psychol (Amst) 2024; 248:104384. [PMID: 38981311 DOI: 10.1016/j.actpsy.2024.104384] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/17/2024] [Revised: 06/27/2024] [Accepted: 07/01/2024] [Indexed: 07/11/2024] Open
Abstract
Accredited Social Health Activists (ASHAs) in India are the subjects of this study, which explores the complex relationships between emotional labor (EL) and unstable work environments and how these relationships affect organizational commitment (OC). The study also looked at how organizational virtuousness (OV) and perceived social value mediated the relationship between precarious work (PW), EL, and OC. This study included a total sample size of N = 467 ASHA personnel from a variety of healthcare settings. Hierarchical regression analysis was used to look at the moderating effects using the Hayes Process Macro. The findings suggest that there are noteworthy negative associations between EL, PW, and the OC of ASHA workers. Nevertheless, OV and perceived social worth (PSW) emerged as significant moderators. More precisely, elevated levels of PSW and OV mitigated the adverse effects of PW and EL on the OC of ASHA workers.
Collapse
Affiliation(s)
- Akbar Jan N
- Associate Professor, Saveetha School of Management, Saveetha University, Saveetha Institute of Medical and Technical Sciences, Chennai, Tamil Nadu, India.
| | - Rajasekhar David
- Assistant Professor, OB & HR Area, Indian Institute of Management (IIM), Ranchi, Jharkhand, India.
| | - Subramani A K
- Assistant Professor, Faculty of Human Resource Management and Soft Skills, ICFAI Business School (IBS) Hyderabad, The ICFAI Foundation for Higher Education (Deemed-to-be University), Hyderabad, Telangana, India.
| | - Sharda Singh
- Assistant Professor, PGDM Human Resource Management Department, Xavier Institute of Social Service (XISS), Ranchi, Jharkhand 834001, India.
| | - Utkarsh Nigoti
- Research Scholar, OB & HR Area, Indian Institute of Management (IIM), Ranchi, Jharkhand, India.
| |
Collapse
|
2
|
Alraja MN, Butt UJ, Abbod M. Information security policies compliance in a global setting: An employee's perspective. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103208] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/31/2023]
|
3
|
Farshadkhah S, Maasberg M, Ellis TS, Van Slyke C. An Empirical Examination of Employee Information Security Advice Sharing. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2023. [DOI: 10.1080/08874417.2023.2176947] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/02/2023]
|
4
|
Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach. COMPUTERS IN HUMAN BEHAVIOR 2023. [DOI: 10.1016/j.chb.2023.107702] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/25/2023]
|
5
|
Ifinedo P. Exploring Personal and Environmental Factors that Can Reduce Nonmalicious Information Security Violations. INFORMATION SYSTEMS MANAGEMENT 2022. [DOI: 10.1080/10580530.2022.2131944] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Affiliation(s)
- Princely Ifinedo
- Department of Finance and Information Systems, Brock University, St. Catharines, ON Canada
| |
Collapse
|
6
|
Mubarkoot M, Altmann J, Rasti-Barzoki M, Egger B, Lee H. Software Compliance Requirements, Factors, and Policies: a Systematic Literature Review. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102985] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
|
7
|
Ghasemaghaei M, Turel O. Why Do Data Analysts Take IT-Mediated Shortcuts? An Ego-Depletion Perspective. J MANAGE INFORM SYST 2022. [DOI: 10.1080/07421222.2022.2063558] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
Affiliation(s)
| | - Ofir Turel
- Information Systems Management, University of Melbourne, Victoria, Australia
| |
Collapse
|
8
|
AlGhamdi S, Win KT, Vlahu-Gjorgievska E. Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations. GOVERNMENT INFORMATION QUARTERLY 2022. [DOI: 10.1016/j.giq.2022.101721] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
9
|
Nord J, Sargent CS, Koohang A, Marotta A. Predictors of Success in Information Security Policy Compliance. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2067795] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
Affiliation(s)
- Jeretta Nord
- Oklahoma State University, Stillwater, Oklahoma, USA
| | | | | | | |
Collapse
|
10
|
Ali RF, Dominic PDD. Investigation of information security policy violations among oil and gas employees: A security-related stress and avoidance coping perspective. J Inf Sci 2022. [DOI: 10.1177/01655515221087680] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Information security is one of the most crucial considerations in digitising Oil and Gas (O&G) organisations. For ensuring information security policy compliance, O&G organisations enforce heavy security requirements. The purpose of this article is to assess how O&G employees cope with stressful information security tasks and how security-related stress (SRS) is related to information security policy violations among O&G employees in developing countries. Based on the coping theory, this article develops a theoretical framework to examine O&G employees’ intention to violate information security policies. The framework is tested using a survey of 270 managers/executives from 150 Malaysian O&G organisations. The results indicated that O&G employees perceive security requirements as stressful to follow and adopt avoidance coping strategies that lead them to violate organisational information security policies. For practitioners, the study findings demonstrate the prevalence of technostress in O&G organisations and suggest alternative mechanisms to address the stressful effects of information security requirements. This article contributes to the information system security literature by testing procrastination and psychological detachment with SRS in the context of developing countries' O&G organisations’ employees and provides an understanding of how O&G employees adopt avoidance coping.
Collapse
Affiliation(s)
- Rao Faizan Ali
- Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Malaysia
| | - PDD Dominic
- Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Malaysia
| |
Collapse
|
11
|
Amankwa E, Loock M, Kritzinger E. The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-10-2021-0169] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
This paper aims to examine the individual and combined effects of organisational and behavioural factors on employees’ attitudes and intentions to establish an information security policy compliance culture (ISPCC) in organisations.
Design/methodology/approach
Based on factors derived from the organisational culture theory, social bond theory and accountability theory, a testable research model was developed and evaluated in an online survey that involves the use of a questionnaire to collect quantitative data from 313 employees, from ten different organisations in Ghana. The data collected were analysed using the partial least squares-structural equation modelling approach, involving the measurement and structural model tests.
Findings
The study reveals that the individual measures of accountability – identifiability (2.4%), expectations of evaluation (38.8%), awareness of monitoring (55.7%) and social presence (−41.2%) – had weak to moderate effects on employees’ attitudes towards information security policy compliance. However, the combined effect showed a significant influence. In addition, organisational factors – supportive organisational culture (15%), security compliance leadership (2%) and user involvement (63%) – showed positive effects on employees’ attitudes. Further, employees’ attitudes had a substantial influence (65%), while behavioural intentions demonstrated a weak effect (24%) on the establishment of an ISPCC in the organisation. The combined effect also had a substantial statistical influence on the establishment of an ISPCC in the organisation.
Practical implications
Given the findings of the study, information security practitioners should implement organisational and behavioural factors that will have an impact on compliance, in tandem, with the organisational effort to build a culture of compliance for information security policies.
Originality/value
The study provides new insights on how to address the problem of non-compliance with regard to the information security policy in organisations through the combined application of organisational and behavioural factors to establish an information security policy compliance culture, which has not been considered in any past research.
Collapse
|
12
|
Goel L, Zhang JZ, Williamson S. IT assimilation: construct, measurement, and implications in cybersecurity. ENTERP INF SYST-UK 2022. [DOI: 10.1080/17517575.2022.2052187] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
Affiliation(s)
- Lakshmi Goel
- Department of Management, University of North Florida, Jacksonville, Florida, United States
| | - Justin Zuopeng Zhang
- Department of Management, University of North Florida, Jacksonville, Florida, United States
| | - Steven Williamson
- Department of Management, University of North Florida, Jacksonville, Florida, United States
| |
Collapse
|
13
|
Li L, Xu L, He W. The effects of antecedents and mediating factors on cybersecurity protection behavior. COMPUTERS IN HUMAN BEHAVIOR REPORTS 2022. [DOI: 10.1016/j.chbr.2021.100165] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022] Open
|
14
|
Ma X. IS professionals’ information security behaviors in Chinese IT organizations for information security protection. Inf Process Manag 2022. [DOI: 10.1016/j.ipm.2021.102744] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
15
|
Gao Y, Liu H. How Supervisor-Subordinate Guanxi Influence Employee Innovative Behavior: A Moderated Mediation Model. Psychol Res Behav Manag 2021; 14:2001-2014. [PMID: 34934367 PMCID: PMC8684436 DOI: 10.2147/prbm.s342875] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/07/2021] [Accepted: 11/26/2021] [Indexed: 11/23/2022] Open
Abstract
Purpose In the practice of inspiring employees’ innovative behavior (IB), managers often pay attention to the role of policies, capitals, incentive measures, equipment and other factors, while ignoring the role of the relationship between leaders and employees. Based on social exchange theory and conservation of resources theory, this paper is to examine the mediating role of job satisfaction (JS) and organizational commitment (OC) in the relationship between supervisor–subordinate guanxi (SSG) and employee IB, and the moderating role of psychological safety (PS) in the series mediation model between SSG and employee IB. Patients and Methods Cross-sectional data came from 207 employees of Chinese scientific and technological enterprises. The participants completed the SSG scale, JS scale, OC scale, IB scale, and PS scale. SPSS PROCESS macro was used to test the research hypothesis. Results SSG was positively associated with employee IB. SSG can not only influence IB through JS or OC (SSG→JS→IB; SSG→OC→IB) but also influence IB through JS and OC (SSG→JS→OC→IB). PS moderated the joint mediating effects between SSG and IB (SSG→JS→OC→IB). Conclusion To stimulate employees’ IB within an enterprise can pay attention to the relationship between leaders and employees, improve employee JS, and strengthen employee OC. The lower the PS, the stronger the joint mediation effects between SSG and employee IB. Therefore, leaders should also pay attention to employees with high PS to avoid the counterproductive effect of cultivating SSG.
Collapse
Affiliation(s)
- Yu Gao
- School of Economics and Management, China University of Geosciences (Beijing), Beijing, People's Republic of China
| | - Haiyan Liu
- School of Economics and Management, China University of Geosciences (Beijing), Beijing, People's Republic of China
| |
Collapse
|
16
|
Xue B, Warkentin M, Mutchler LA, Balozian P. Self-efficacy in Information Security: A Replication Study. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2021. [DOI: 10.1080/08874417.2021.2015725] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
Affiliation(s)
- Botong Xue
- University of Wisconsin – La Cross, La Cross, Wisconsin, USA
| | | | | | | |
Collapse
|
17
|
Protective behavior in ride-sharing through the lens of protection motivation theory and usage situation theory. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2021.102402] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
18
|
Hu S, Hsu C, Zhou Z. The impact of SETA event attributes on employees’ security-related Intentions: An event system theory perspective. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102404] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
19
|
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11083383] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
A grave concern to an organization’s information security is employees’ behavior when they do not value information security policy compliance (ISPC). Most ISPC studies evaluate compliance and noncompliance behaviors separately. However, the literature lacks a comprehensive understanding of the factors that transform the employees’ behavior from noncompliance to compliance. Therefore, we conducted a systematic literature review (SLR), highlighting the studies done concerning information security behavior (ISB) towards ISPC in multiple settings: research frameworks, research designs, and research methodologies over the last decade. We found that ISPC research focused more on compliance behaviors than noncompliance behaviors. Value conflicts, security-related stress, and neutralization, among many other factors, provided significant evidence towards noncompliance. At the same time, internal/external and protection motivations proved positively significant towards compliance behaviors. Employees perceive internal and external motivations from their social circle, management behaviors, and organizational culture to adopt security-aware behaviors. Deterrence techniques, management behaviors, culture, and information security awareness play a vital role in transforming employees’ noncompliance into compliance behaviors. This SLR’s motivation is to synthesize the literature on ISPC and ISB, identifying the behavioral transformation process from noncompliance to compliance. This SLR contributes to information system security literature by providing a behavior transformation process model based on the existing ISPC literature.
Collapse
|