IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v25y2023i4d10.1007_s10796-022-10281-6.html
   My bibliography  Save this article

An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies

Author

Listed:
  • Victoria Kisekka

    (University at Albany, State University of New York)

  • Sanjay Goel

    (University at Albany, State University of New York)

Abstract

Diligent compliance with Information security Policies (ISP) can effectively deter threats but can also adversely impact organizational productivity, impeding organizational task completion during extreme events. This paper examines employees’ job performance during extreme events. We use the conservation of resources (COR) theory to examine how psychological resources (individual resilience, job meaningfulness, self-efficacy) and organizational resources (incident command leadership, information availability, and perceived effectiveness of security and privacy controls) influence ISP compliance decisions and job performance during extreme events. The results show that a one-size-fits-all approach to ISP is not ideal during extreme events; ISP can distract employees from critical job tasks. We also observed that under certain conditions, psychological resources, such as individual resilience, are reserved for job performance, while others, such as self-efficacy, are reserved for ISP compliance. A post hoc analysis of data from respondents who experienced strain during a real extreme event while at work was conducted. Our discussion provides recommendations on how security and privacy policies can be designed to reflect disaster conditions by relaxing some policy provisions.

Suggested Citation

  • Victoria Kisekka & Sanjay Goel, 2023. "An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies," Information Systems Frontiers, Springer, vol. 25(4), pages 1439-1458, August.
  • Handle: RePEc:spr:infosf:v:25:y:2023:i:4:d:10.1007_s10796-022-10281-6
    DOI: 10.1007/s10796-022-10281-6
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-022-10281-6
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-022-10281-6?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Eunkyung Kweon & Hansol Lee & Sangmi Chai & Kyeongwon Yoo, 2021. "The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence," Information Systems Frontiers, Springer, vol. 23(2), pages 361-373, April.
    2. Nitesh Bharosa & JinKyu Lee & Marijn Janssen, 2010. "Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises," Information Systems Frontiers, Springer, vol. 12(1), pages 49-65, March.
    3. Hwee-Joo Kam & Thomas Mattson & Sanjay Goel, 2020. "A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness," Information Systems Frontiers, Springer, vol. 22(5), pages 1241-1264, October.
    4. Timmins, Michael L. & Bone, Eric A. & Hiller, Michael, 2015. "Healthcare system resiliency: The case for taking disaster plans further — Part 1," Journal of Business Continuity & Emergency Planning, Henry Stewart Publications, vol. 8(3), pages 216-237, February.
    5. Jeffrey D. Wall & Prashant Palvia & Paul Benjamin Lowry, 2013. "Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 9(4), pages 52-79, October.
    6. Simon Trang & Benedikt Brendel, 2019. "A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research," Information Systems Frontiers, Springer, vol. 21(6), pages 1265-1284, December.
    7. Hiller, Michael & Bone, Eric A. & Timmins, Michael L., 2015. "Healthcare system resiliency: The case for taking disaster plans further — Part 2," Journal of Business Continuity & Emergency Planning, Henry Stewart Publications, vol. 8(4), pages 356-375, March.
    8. Chang-Gyu Yang & Hee-Jun Lee, 2016. "A study on the antecedents of healthcare information protection intention," Information Systems Frontiers, Springer, vol. 18(2), pages 253-263, April.
    9. Ahmad, Atif & Maynard, Sean B & Shanks, Graeme, 2015. "A case analysis of information systems and security incident responses," International Journal of Information Management, Elsevier, vol. 35(6), pages 717-723.
    10. Luke Treglown & Kat Palaiou & Anthony Zarola & Adrian Furnham, 2016. "The Dark Side of Resilience and Burnout: A Moderation-Mediation Model," PLOS ONE, Public Library of Science, vol. 11(6), pages 1-16, June.
    11. Tenenhaus, Michel & Vinzi, Vincenzo Esposito & Chatelin, Yves-Marie & Lauro, Carlo, 2005. "PLS path modeling," Computational Statistics & Data Analysis, Elsevier, vol. 48(1), pages 159-205, January.
    12. Tejaswini Herath & H Raghav Rao, 2009. "Protection motivation and deterrence: a framework for security policy compliance in organisations," European Journal of Information Systems, Taylor & Francis Journals, vol. 18(2), pages 106-125, April.
    13. Mark Chan & Irene Woon & Atreyi Kankanhalli, 2005. "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 1(3), pages 18-41, July.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jeffrey D. Wall & Prashant Palvia & John D’Arcy, 2022. "Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios," Information Systems Frontiers, Springer, vol. 24(2), pages 637-658, April.
    2. Maurizio Cavallari, 2023. "Organizational Determinants and Compliance Behavior to Shape Information Security Plan," Academic Journal of Interdisciplinary Studies, Richtmann Publishing Ltd, vol. 12, November.
    3. Eunkyung Kweon & Hansol Lee & Sangmi Chai & Kyeongwon Yoo, 2021. "The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence," Information Systems Frontiers, Springer, vol. 23(2), pages 361-373, April.
    4. Bitrián, Paula & Buil, Isabel & Catalán, Sara & Merli, Dominik, 2024. "Gamification in workforce training: Improving employees’ self-efficacy and information security and data protection behaviours," Journal of Business Research, Elsevier, vol. 179(C).
    5. Li, Yuanxiang John & Hoffman, Elizabeth, 2023. "Designing an incentive mechanism for information security policy compliance: An experiment," Journal of Economic Behavior & Organization, Elsevier, vol. 212(C), pages 138-159.
    6. Venugopal Gopalakrishna-Remani & Robert Paul Jones & Kerri M. Camp, 2019. "Levels of EMR Adoption in U.S. Hospitals: An Empirical Examination of Absorptive Capacity, Institutional Pressures, Top Management Beliefs, and Participation," Information Systems Frontiers, Springer, vol. 21(6), pages 1325-1344, December.
    7. Jack Shih-Chieh Hsu & Sheng-Pao Shih & Yu Wen Hung & Paul Benjamin Lowry, 2015. "The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness," Information Systems Research, INFORMS, vol. 26(2), pages 282-300, June.
    8. Roozmehr Safi & Glenn J. Browne, 2023. "Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects," Information Systems Frontiers, Springer, vol. 25(3), pages 1277-1292, June.
    9. Abdul Molok, Nurul Nuha & Ahmad, Atif & Chang, Shanton, 2018. "A case analysis of securing organisations against information leakage through online social networking," International Journal of Information Management, Elsevier, vol. 43(C), pages 351-356.
    10. Claudio Vitari & Elisabetta Raguseo, 2016. "Big data value and financial performance: an empirical investigation [Digital data, dynamic capability and financial performance: an empirical investigation in the era of Big Data]," Post-Print halshs-01923271, HAL.
    11. Martins, José & Costa, Catarina & Oliveira, Tiago & Gonçalves, Ramiro & Branco, Frederico, 2019. "How smartphone advertising influences consumers' purchase intention," Journal of Business Research, Elsevier, vol. 94(C), pages 378-387.
    12. Gupta, Prashant & Seetharaman, A. & Raj, John Rudolph, 2013. "The usage and adoption of cloud computing by small and medium businesses," International Journal of Information Management, Elsevier, vol. 33(5), pages 861-874.
    13. Asif Khan & Chih-Cheng Chen & Kwanrat Suanpong & Athapol Ruangkanjanases & Santhaya Kittikowit & Shih-Chih Chen, 2021. "The Impact of CSR on Sustainable Innovation Ambidexterity: The Mediating Role of Sustainable Supply Chain Management and Second-Order Social Capital," Sustainability, MDPI, vol. 13(21), pages 1-25, November.
    14. Chen, Shih-Chih & Hung, Chung-Wen, 2016. "Elucidating the factors influencing the acceptance of green products: An extension of theory of planned behavior," Technological Forecasting and Social Change, Elsevier, vol. 112(C), pages 155-163.
    15. Bronzo, Marcelo & de Resende, Paulo Tarso Vilela & de Oliveira, Marcos Paulo Valadares & McCormack, Kevin P. & de Sousa, Paulo Renato & Ferreira, Reinaldo Lopes, 2013. "Improving performance aligning business analytics with process orientation," International Journal of Information Management, Elsevier, vol. 33(2), pages 300-307.
    16. R.M. Thirupathi & S. Vinodh, 2016. "Application of interpretive structural modelling and structural equation modelling for analysis of sustainable manufacturing factors in Indian automotive component sector," International Journal of Production Research, Taylor & Francis Journals, vol. 54(22), pages 6661-6682, November.
    17. Seif Obeid Al-Shbiel, 2016. "An Examination the Factors Influence on Unethical Behaviour among Jordanian external auditors: Job Satisfaction as a mediator," International Journal of Academic Research in Accounting, Finance and Management Sciences, Human Resource Management Academic Research Society, International Journal of Academic Research in Accounting, Finance and Management Sciences, vol. 6(3), pages 285-296, July.
    18. Preece, Gary & Shaw, Duncan & Hayashi, Haruo, 2013. "Using the Viable System Model (VSM) to structure information processing complexity in disaster response," European Journal of Operational Research, Elsevier, vol. 224(1), pages 209-218.
    19. André Schultz & Alexander Libman, 2015. "Is there a local knowledge advantage in federations? Evidence from a natural experiment," Public Choice, Springer, vol. 162(1), pages 25-42, January.
    20. Ana León-Gómez & José Manuel Santos-Jaén & Daniel Ruiz-Palomo & Mercedes Palacios-Manzano, 2022. "Disentangling the impact of ICT adoption on SMEs performance: the mediating roles of corporate social responsibility and innovation," Oeconomia Copernicana, Institute of Economic Research, vol. 13(3), pages 831-866, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:25:y:2023:i:4:d:10.1007_s10796-022-10281-6. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.