An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies
Author
Abstract
Suggested Citation
DOI: 10.1007/s10796-022-10281-6
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Chang-Gyu Yang & Hee-Jun Lee, 2016. "A study on the antecedents of healthcare information protection intention," Information Systems Frontiers, Springer, vol. 18(2), pages 253-263, April.
- Eunkyung Kweon & Hansol Lee & Sangmi Chai & Kyeongwon Yoo, 2021. "The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence," Information Systems Frontiers, Springer, vol. 23(2), pages 361-373, April.
- Ahmad, Atif & Maynard, Sean B & Shanks, Graeme, 2015. "A case analysis of information systems and security incident responses," International Journal of Information Management, Elsevier, vol. 35(6), pages 717-723.
- Nitesh Bharosa & JinKyu Lee & Marijn Janssen, 2010. "Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises," Information Systems Frontiers, Springer, vol. 12(1), pages 49-65, March.
- Luke Treglown & Kat Palaiou & Anthony Zarola & Adrian Furnham, 2016. "The Dark Side of Resilience and Burnout: A Moderation-Mediation Model," PLOS ONE, Public Library of Science, vol. 11(6), pages 1-16, June.
- Tenenhaus, Michel & Vinzi, Vincenzo Esposito & Chatelin, Yves-Marie & Lauro, Carlo, 2005. "PLS path modeling," Computational Statistics & Data Analysis, Elsevier, vol. 48(1), pages 159-205, January.
- Hwee-Joo Kam & Thomas Mattson & Sanjay Goel, 2020. "A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness," Information Systems Frontiers, Springer, vol. 22(5), pages 1241-1264, October.
- Timmins, Michael L. & Bone, Eric A. & Hiller, Michael, 2015. "Healthcare system resiliency: The case for taking disaster plans further — Part 1," Journal of Business Continuity & Emergency Planning, Henry Stewart Publications, vol. 8(3), pages 216-237, February.
- Tejaswini Herath & H Raghav Rao, 2009. "Protection motivation and deterrence: a framework for security policy compliance in organisations," European Journal of Information Systems, Taylor & Francis Journals, vol. 18(2), pages 106-125, April.
- Jeffrey D. Wall & Prashant Palvia & Paul Benjamin Lowry, 2013. "Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 9(4), pages 52-79, October.
- Simon Trang & Benedikt Brendel, 2019. "A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research," Information Systems Frontiers, Springer, vol. 21(6), pages 1265-1284, December.
- Mark Chan & Irene Woon & Atreyi Kankanhalli, 2005. "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 1(3), pages 18-41, July.
- Hiller, Michael & Bone, Eric A. & Timmins, Michael L., 2015. "Healthcare system resiliency: The case for taking disaster plans further — Part 2," Journal of Business Continuity & Emergency Planning, Henry Stewart Publications, vol. 8(4), pages 356-375, March.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Jeffrey D. Wall & Prashant Palvia & John D’Arcy, 2022. "Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios," Information Systems Frontiers, Springer, vol. 24(2), pages 637-658, April.
- Venugopal Gopalakrishna-Remani & Robert Paul Jones & Kerri M. Camp, 2019. "Levels of EMR Adoption in U.S. Hospitals: An Empirical Examination of Absorptive Capacity, Institutional Pressures, Top Management Beliefs, and Participation," Information Systems Frontiers, Springer, vol. 21(6), pages 1325-1344, December.
- Jack Shih-Chieh Hsu & Sheng-Pao Shih & Yu Wen Hung & Paul Benjamin Lowry, 2015. "The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness," Information Systems Research, INFORMS, vol. 26(2), pages 282-300, June.
- Maurizio Cavallari, 2023. "Organizational Determinants and Compliance Behavior to Shape Information Security Plan," Academic Journal of Interdisciplinary Studies, Richtmann Publishing Ltd, vol. 12, November.
- Eunkyung Kweon & Hansol Lee & Sangmi Chai & Kyeongwon Yoo, 2021. "The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence," Information Systems Frontiers, Springer, vol. 23(2), pages 361-373, April.
- Roozmehr Safi & Glenn J. Browne, 2023. "Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects," Information Systems Frontiers, Springer, vol. 25(3), pages 1277-1292, June.
- Bitrián, Paula & Buil, Isabel & Catalán, Sara & Merli, Dominik, 2024. "Gamification in workforce training: Improving employees’ self-efficacy and information security and data protection behaviours," Journal of Business Research, Elsevier, vol. 179(C).
- Li, Yuanxiang John & Hoffman, Elizabeth, 2023. "Designing an incentive mechanism for information security policy compliance: An experiment," Journal of Economic Behavior & Organization, Elsevier, vol. 212(C), pages 138-159.
- Annie Tubadji & Peter Nijkamp, 2015. "Cultural impact on regional development: application of a PLS-PM model to Greece," The Annals of Regional Science, Springer;Western Regional Science Association, vol. 54(3), pages 687-720, May.
- Debora Bettiga & Lucio Lamberti & Emanuele Lettieri, 2020. "Individuals’ adoption of smart technologies for preventive health care: a structural equation modeling approach," Health Care Management Science, Springer, vol. 23(2), pages 203-214, June.
- Vittadini, Giorgio & Minotti, Simona C. & Fattore, Marco & Lovaglio, Pietro G., 2007. "On the relationships among latent variables and residuals in PLS path modeling: The formative-reflective scheme," Computational Statistics & Data Analysis, Elsevier, vol. 51(12), pages 5828-5846, August.
- Adam Malešević & Dušan Barać & Dragan Soleša & Ema Aleksić & Marijana Despotović-Zrakić, 2021. "Adopting xRM in Higher Education: E-Services Outside the Classroom," Sustainability, MDPI, vol. 13(14), pages 1-20, July.
- Oubrich, Mourad & Hakmaoui, Abdelati & Benhayoun, Lamiae & Solberg Söilen, Klaus & Abdulkader, Bisan, 2021. "Impacts of leadership style, organizational design and HRM practices on knowledge hiding: The indirect roles of organizational justice and competitive work environment," Journal of Business Research, Elsevier, vol. 137(C), pages 488-499.
- Abdul Molok, Nurul Nuha & Ahmad, Atif & Chang, Shanton, 2018. "A case analysis of securing organisations against information leakage through online social networking," International Journal of Information Management, Elsevier, vol. 43(C), pages 351-356.
- Claudio Vitari & Elisabetta Raguseo, 2016. "Big data value and financial performance: an empirical investigation [Digital data, dynamic capability and financial performance: an empirical investigation in the era of Big Data]," Post-Print halshs-01923271, HAL.
- Martins, José & Costa, Catarina & Oliveira, Tiago & Gonçalves, Ramiro & Branco, Frederico, 2019. "How smartphone advertising influences consumers' purchase intention," Journal of Business Research, Elsevier, vol. 94(C), pages 378-387.
- Amir Louizi & Radhouane Kammoun, 2016. "Evaluation of corporate governance systems by credit rating agencies," Journal of Management & Governance, Springer;Accademia Italiana di Economia Aziendale (AIDEA), vol. 20(2), pages 363-385, June.
- Sengazhani Murugesan Vadivel & Aloysius Henry Sequeira & Robert Rajkumar Sakkariyas & Kirubaharan Boobalan, 2022. "Impact of lean service, workplace environment, and social practices on the operational performance of India post service industry," Annals of Operations Research, Springer, vol. 315(2), pages 2219-2244, August.
- Gupta, Prashant & Seetharaman, A. & Raj, John Rudolph, 2013. "The usage and adoption of cloud computing by small and medium businesses," International Journal of Information Management, Elsevier, vol. 33(5), pages 861-874.
- Asif Khan & Chih-Cheng Chen & Kwanrat Suanpong & Athapol Ruangkanjanases & Santhaya Kittikowit & Shih-Chih Chen, 2021. "The Impact of CSR on Sustainable Innovation Ambidexterity: The Mediating Role of Sustainable Supply Chain Management and Second-Order Social Capital," Sustainability, MDPI, vol. 13(21), pages 1-25, November.
More about this item
Keywords
Job performance; Security policy compliance; Extreme events; Security behavior;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:25:y:2023:i:4:d:10.1007_s10796-022-10281-6. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.