Show simple item record

dc.contributor.authorCong Pham, H
dc.contributor.authorBrennan, L
dc.contributor.authorFurnell, SM
dc.date.accessioned2019-04-01T06:56:24Z
dc.date.issued2019-06
dc.identifier.issn2214-2126
dc.identifier.issn2214-2134
dc.identifier.urihttp://hdl.handle.net/10026.1/13591
dc.description.abstract

This study examines how information security burnout can develop from complying with organisational security demands, and whether security burnout can be reduced by engaging organisational and personal resources. The Job Demands-Resources model was extended to the IT security context, to develop and empirically test a security burnout model, using a sample of 443 participants in Vietnam. The results demonstrate that security task overload and difficult access to security requirements increased security burnout while dealing with challenging security requirements reduced burnout. Neither organisational resources nor user self-efficacy were effective in reducing burnout. Moreover, simple security tasks did not guarantee a burnout-free experience for users. The findings emphasise the significance of providing resources and designing security tasks as challenging and rewarding experiences, rather than simply reducing user involvement as a source of decreasing cyber security risks. The research establishes a theoretical basis for further studying the phenomenon of security burnout and its role in user security management.

dc.format.extent96-107
dc.languageen
dc.language.isoen
dc.publisherElsevier
dc.subjectHuman factors
dc.subjectSecurity stress
dc.subjectTechnology stress
dc.subjectCompliance fatigue
dc.subjectIT competency
dc.titleInformation security burnout: Identification of sources and mitigating factors from security demands and resources
dc.typejournal-article
dc.typeArticle
plymouth.issueJune
plymouth.volume46
plymouth.publication-statusPublished
plymouth.journalJournal of Information Security and Applications
dc.identifier.doi10.1016/j.jisa.2019.03.012
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Users by role
dcterms.dateAccepted2019-03-11
dc.rights.embargodate2020-3-15
dc.identifier.eissn2214-2134
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1016/j.jisa.2019.03.012
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV