IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v25y2023i4d10.1007_s10796-022-10281-6.html
   My bibliography  Save this article

An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies

Author

Listed:
  • Victoria Kisekka

    (University at Albany, State University of New York)

  • Sanjay Goel

    (University at Albany, State University of New York)

Abstract

Diligent compliance with Information security Policies (ISP) can effectively deter threats but can also adversely impact organizational productivity, impeding organizational task completion during extreme events. This paper examines employees’ job performance during extreme events. We use the conservation of resources (COR) theory to examine how psychological resources (individual resilience, job meaningfulness, self-efficacy) and organizational resources (incident command leadership, information availability, and perceived effectiveness of security and privacy controls) influence ISP compliance decisions and job performance during extreme events. The results show that a one-size-fits-all approach to ISP is not ideal during extreme events; ISP can distract employees from critical job tasks. We also observed that under certain conditions, psychological resources, such as individual resilience, are reserved for job performance, while others, such as self-efficacy, are reserved for ISP compliance. A post hoc analysis of data from respondents who experienced strain during a real extreme event while at work was conducted. Our discussion provides recommendations on how security and privacy policies can be designed to reflect disaster conditions by relaxing some policy provisions.

Suggested Citation

  • Victoria Kisekka & Sanjay Goel, 2023. "An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies," Information Systems Frontiers, Springer, vol. 25(4), pages 1439-1458, August.
  • Handle: RePEc:spr:infosf:v:25:y:2023:i:4:d:10.1007_s10796-022-10281-6
    DOI: 10.1007/s10796-022-10281-6
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-022-10281-6
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-022-10281-6?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Chang-Gyu Yang & Hee-Jun Lee, 2016. "A study on the antecedents of healthcare information protection intention," Information Systems Frontiers, Springer, vol. 18(2), pages 253-263, April.
    2. Eunkyung Kweon & Hansol Lee & Sangmi Chai & Kyeongwon Yoo, 2021. "The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence," Information Systems Frontiers, Springer, vol. 23(2), pages 361-373, April.
    3. Ahmad, Atif & Maynard, Sean B & Shanks, Graeme, 2015. "A case analysis of information systems and security incident responses," International Journal of Information Management, Elsevier, vol. 35(6), pages 717-723.
    4. Nitesh Bharosa & JinKyu Lee & Marijn Janssen, 2010. "Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises," Information Systems Frontiers, Springer, vol. 12(1), pages 49-65, March.
    5. Luke Treglown & Kat Palaiou & Anthony Zarola & Adrian Furnham, 2016. "The Dark Side of Resilience and Burnout: A Moderation-Mediation Model," PLOS ONE, Public Library of Science, vol. 11(6), pages 1-16, June.
    6. Tenenhaus, Michel & Vinzi, Vincenzo Esposito & Chatelin, Yves-Marie & Lauro, Carlo, 2005. "PLS path modeling," Computational Statistics & Data Analysis, Elsevier, vol. 48(1), pages 159-205, January.
    7. Hwee-Joo Kam & Thomas Mattson & Sanjay Goel, 2020. "A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness," Information Systems Frontiers, Springer, vol. 22(5), pages 1241-1264, October.
    8. Timmins, Michael L. & Bone, Eric A. & Hiller, Michael, 2015. "Healthcare system resiliency: The case for taking disaster plans further — Part 1," Journal of Business Continuity & Emergency Planning, Henry Stewart Publications, vol. 8(3), pages 216-237, February.
    9. Tejaswini Herath & H Raghav Rao, 2009. "Protection motivation and deterrence: a framework for security policy compliance in organisations," European Journal of Information Systems, Taylor & Francis Journals, vol. 18(2), pages 106-125, April.
    10. Jeffrey D. Wall & Prashant Palvia & Paul Benjamin Lowry, 2013. "Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 9(4), pages 52-79, October.
    11. Simon Trang & Benedikt Brendel, 2019. "A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research," Information Systems Frontiers, Springer, vol. 21(6), pages 1265-1284, December.
    12. Mark Chan & Irene Woon & Atreyi Kankanhalli, 2005. "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 1(3), pages 18-41, July.
    13. Hiller, Michael & Bone, Eric A. & Timmins, Michael L., 2015. "Healthcare system resiliency: The case for taking disaster plans further — Part 2," Journal of Business Continuity & Emergency Planning, Henry Stewart Publications, vol. 8(4), pages 356-375, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jeffrey D. Wall & Prashant Palvia & John D’Arcy, 2022. "Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios," Information Systems Frontiers, Springer, vol. 24(2), pages 637-658, April.
    2. Venugopal Gopalakrishna-Remani & Robert Paul Jones & Kerri M. Camp, 2019. "Levels of EMR Adoption in U.S. Hospitals: An Empirical Examination of Absorptive Capacity, Institutional Pressures, Top Management Beliefs, and Participation," Information Systems Frontiers, Springer, vol. 21(6), pages 1325-1344, December.
    3. Jack Shih-Chieh Hsu & Sheng-Pao Shih & Yu Wen Hung & Paul Benjamin Lowry, 2015. "The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness," Information Systems Research, INFORMS, vol. 26(2), pages 282-300, June.
    4. Maurizio Cavallari, 2023. "Organizational Determinants and Compliance Behavior to Shape Information Security Plan," Academic Journal of Interdisciplinary Studies, Richtmann Publishing Ltd, vol. 12, November.
    5. Eunkyung Kweon & Hansol Lee & Sangmi Chai & Kyeongwon Yoo, 2021. "The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence," Information Systems Frontiers, Springer, vol. 23(2), pages 361-373, April.
    6. Roozmehr Safi & Glenn J. Browne, 2023. "Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects," Information Systems Frontiers, Springer, vol. 25(3), pages 1277-1292, June.
    7. Li, Yuanxiang John & Hoffman, Elizabeth, 2023. "Designing an incentive mechanism for information security policy compliance: An experiment," Journal of Economic Behavior & Organization, Elsevier, vol. 212(C), pages 138-159.
    8. Annie Tubadji & Peter Nijkamp, 2015. "Cultural impact on regional development: application of a PLS-PM model to Greece," The Annals of Regional Science, Springer;Western Regional Science Association, vol. 54(3), pages 687-720, May.
    9. Debora Bettiga & Lucio Lamberti & Emanuele Lettieri, 2020. "Individuals’ adoption of smart technologies for preventive health care: a structural equation modeling approach," Health Care Management Science, Springer, vol. 23(2), pages 203-214, June.
    10. Vittadini, Giorgio & Minotti, Simona C. & Fattore, Marco & Lovaglio, Pietro G., 2007. "On the relationships among latent variables and residuals in PLS path modeling: The formative-reflective scheme," Computational Statistics & Data Analysis, Elsevier, vol. 51(12), pages 5828-5846, August.
    11. Adam Malešević & Dušan Barać & Dragan Soleša & Ema Aleksić & Marijana Despotović-Zrakić, 2021. "Adopting xRM in Higher Education: E-Services Outside the Classroom," Sustainability, MDPI, vol. 13(14), pages 1-20, July.
    12. Oubrich, Mourad & Hakmaoui, Abdelati & Benhayoun, Lamiae & Solberg Söilen, Klaus & Abdulkader, Bisan, 2021. "Impacts of leadership style, organizational design and HRM practices on knowledge hiding: The indirect roles of organizational justice and competitive work environment," Journal of Business Research, Elsevier, vol. 137(C), pages 488-499.
    13. Abdul Molok, Nurul Nuha & Ahmad, Atif & Chang, Shanton, 2018. "A case analysis of securing organisations against information leakage through online social networking," International Journal of Information Management, Elsevier, vol. 43(C), pages 351-356.
    14. Claudio Vitari & Elisabetta Raguseo, 2016. "Big data value and financial performance: an empirical investigation [Digital data, dynamic capability and financial performance: an empirical investigation in the era of Big Data]," Post-Print halshs-01923271, HAL.
    15. Martins, José & Costa, Catarina & Oliveira, Tiago & Gonçalves, Ramiro & Branco, Frederico, 2019. "How smartphone advertising influences consumers' purchase intention," Journal of Business Research, Elsevier, vol. 94(C), pages 378-387.
    16. Amir Louizi & Radhouane Kammoun, 2016. "Evaluation of corporate governance systems by credit rating agencies," Journal of Management & Governance, Springer;Accademia Italiana di Economia Aziendale (AIDEA), vol. 20(2), pages 363-385, June.
    17. Sengazhani Murugesan Vadivel & Aloysius Henry Sequeira & Robert Rajkumar Sakkariyas & Kirubaharan Boobalan, 2022. "Impact of lean service, workplace environment, and social practices on the operational performance of India post service industry," Annals of Operations Research, Springer, vol. 315(2), pages 2219-2244, August.
    18. Gupta, Prashant & Seetharaman, A. & Raj, John Rudolph, 2013. "The usage and adoption of cloud computing by small and medium businesses," International Journal of Information Management, Elsevier, vol. 33(5), pages 861-874.
    19. Asif Khan & Chih-Cheng Chen & Kwanrat Suanpong & Athapol Ruangkanjanases & Santhaya Kittikowit & Shih-Chih Chen, 2021. "The Impact of CSR on Sustainable Innovation Ambidexterity: The Mediating Role of Sustainable Supply Chain Management and Second-Order Social Capital," Sustainability, MDPI, vol. 13(21), pages 1-25, November.
    20. Chen, Shih-Chih & Hung, Chung-Wen, 2016. "Elucidating the factors influencing the acceptance of green products: An extension of theory of planned behavior," Technological Forecasting and Social Change, Elsevier, vol. 112(C), pages 155-163.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:25:y:2023:i:4:d:10.1007_s10796-022-10281-6. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.