Show simple item record

dc.contributor.authorCong Pham, Hen
dc.contributor.authorBrennan, Len
dc.contributor.authorFurnell, SMen
dc.date.accessioned2019-04-01T06:56:24Z
dc.identifier.issn2214-2126en
dc.identifier.urihttp://hdl.handle.net/10026.1/13591
dc.description.abstract

This study examines how information security burnout can develop from complying with organisational security demands, and whether security burnout can be reduced by engaging organisational and personal resources. The Job Demands-Resources model was extended to the IT security context, to develop and empirically test a security burnout model, using a sample of 443 participants in Vietnam. The results demonstrate that security task overload and difficult access to security requirements increased security burnout while dealing with challenging security requirements reduced burnout. Neither organisational resources nor user self-efficacy were effective in reducing burnout. Moreover, simple security tasks did not guarantee a burnout-free experience for users. The findings emphasise the significance of providing resources and designing security tasks as challenging and rewarding experiences, rather than simply reducing user involvement as a source of decreasing cyber security risks. The research establishes a theoretical basis for further studying the phenomenon of security burnout and its role in user security management.

en
dc.format.extent96 - 107en
dc.language.isoenen
dc.publisherElsevieren
dc.subjectHuman factorsen
dc.subjectSecurity stressen
dc.subjectTechnology stressen
dc.subjectCompliance fatigueen
dc.subjectIT competencyen
dc.titleInformation security burnout: Identification of sources and mitigating factors from security demands and resourcesen
dc.typeJournal Article
plymouth.issueJuneen
plymouth.volume46en
plymouth.journalJournal of Information Security and Applicationsen
dc.identifier.doi10.1016/j.jisa.2019.03.012en
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Users by role
dcterms.dateAccepted2019-03-11en
dc.rights.embargodate2020-03-15en
dc.rights.embargoperiodNot knownen
rioxxterms.versionofrecord10.1016/j.jisa.2019.03.012en
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserveden
rioxxterms.typeJournal Article/Reviewen


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV