The Impact of Technostress on Information Security Perception and Organizational Outcomes

기술스트레스가 조직원의 보안 인식과 조직성과에 미치는 영향에 관한 연구

  • Published : 2012.01.31

Abstract

Technological countermeasures have been chosen by many companies for information systems security. However, such countermeasures often proved unsatisfactory in mitigating security accidents since organizations failed to invest enough money for developing and maintaining those technologies or they wasted money on commercial security products that did not complement their organization's specific IT environments and requirements. Therefore, employees who use the information technology suffer from many stresses that are referred to as technostress. However, previous study has separately focused on technological and behavioral factors. Thus, the proposed study is to explain and examine empirically technological factors and behavioral factors together.

그동안 많은 기업들은 정보보안을 위해 기술적 대안을 주로 선택해왔다. 특히 기업들은 자신의 기업에 맞는 보안 기술이 아니라 가격효율성을 고려하여 상용화 패키지를 구입하는 경우가 많았다. 이 경우 조직의 환경 및 조직이 지금까지 사용하고 있는 시스템과의 이질성으로 인해 조직원들이 느끼는 기술적 이질감은 더욱더 높아질 수밖에 없다. 이로 인해 조직원들은 정보보안에 대해 불편함을 느끼거나, 자신의 업무의 생산성을 저해한다고 느끼게 된다. 또한 기존의 정보기술이외에 또 다른 기술인 보안시스템에 대한 적응과 학습이 필요하기 때문에 조직원들이 느끼는 기술스트레스는 자연스럽게 증가할 수밖에 없다. 이에 따라 본 연구는 보안의 기술적 측면과 인적 측면을 고려한 연구를 기업의 정보보안 상황에 적용해보고자 한다.

Keywords

References

  1. 전자신문, "유통의 핵심과제 '신속⋅정확' QR 코드로 둘 다 풀었다", pp. 18, 2011년 9월 26일.
  2. W. Wang, W. Shu, and Q. Tu, "Technostress under Different Organizational Environments: An Empirical Investigation", Computers in Human Behavior, Vol. 24, pp. 3002-3013, Sep. 2008.
  3. M. Tarafdar, Q. Tu, B. S. Ragu-Nathan, and T. S. Ragu-Nathan, "The Impact of Technostress on Role Stress and Productivity", Journal of Management Information Systems, Vol. 24, No. 1, pp. 301-328, Summer, 2007.
  4. M. Tarafdar, Q. Tu, and T. S. Ragu-Nathan, "Impact of Technostress on End-User Satisfaction and Performance", Journal of Management Information Systems, Vol. 27, No. 3, pp. 303-334, Winter, 2010-11.
  5. T. Herath and H. R. Rao, "Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness", Decision Support Systems, Vol. 47, No. 2, pp. 154-165, May 2009.
  6. T. Herath and H. R. Rao, "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations", European Journal of Information Systems, Vol. 18, No. 2, pp. 106-225, April 2009.
  7. M-S. Yim, "Towards an Understanding of the Persistent Ethical Behavior in IT Use, Dissertation", Graduate School of Business at the Sogang University, Aug. 2011.
  8. J. Lee and Y. Lee, "A Holistic Model of Computer Abuse within Organizations", Information Management & Computer Security, Vol. 10, No. 2, pp. 57-63, 2002.
  9. M, Chan, I. Woon, and A. Kankanhalli, "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior", Journal of Information Privacy & Security, Vol. 1, No. 3, pp. 18-41, 2005.
  10. B. B. Arnetz and C. Wiholm, "Technological Stress: Psychophysiological Symptoms in Modern Offices", Journal of Psyhosomatic Research, Vol. 43, No. 1. pp. 35-42, July 1997.
  11. W. Fishier and S. Wesolkowski, "Tempering Technostress", IEEE Technology and Society Magazine, pp. 28-33, Spring, 1999.
  12. P. E. Brillhart, "Technostress in the Workplace: Managing Stress in the Electronic Workplace", Journal of American Academy of Business, Vol. 5, No.1/2, pp. 302-307, Sep. 2004.
  13. C. Brod, "Managing Technostress: Optimizing the Use of Computer Technology", Personnel Journal, Vol. 61, No. 10, pp. 753-757, Oct. 1982.
  14. T. S. Ragu-Nathan, M. Tarafdar, and B. S. Ragu- Nathan, "The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation", Information Systems Research, Vol. 19, No. 4, pp. 417-433, Dec. 2008.
  15. M. Tarafdar, Q. Tu, T. S. Ragu-Nathan, and B. S Ragu-Nathan, "Crossing to the Dark Side: Examining Creators, Outcomes, and Inhibitors of Technostress", Communications of ACM, Vol. 54, No. 9, pp. 113-120, Sep. 2011.
  16. Q, Tu, K. Wang and Q. Shu, "Computer-Related Technostress in China", Communications of the ACM, Vol. 48, No. 4, pp. 77-81, April 2005.
  17. L. S. Meyers, G. Gamst, and A. J. Guarino, "Applied Multivariate Research: Design and Interpretation", SAGE Publications, London, 2006.
  18. E. Ferguson and T. Cox, "Exploratory Factor Analysis: A Users' Guide", International Journal of Selection and Assessment, Vol. 1, No. 2, pp. 84-94, April 1993.
  19. M. T. Frohlich and R. Westbrook, "Arcs of Integration: An International Study of Supply Chain Strategies", Journal of Operations Management, Vol. 19, Issue 2, pp. 185-2000, Feb. 2001.
  20. H. Treiblmaier, and P. Filzmoser, "Exploratory Factor Analysis Revisited: How Robust Methods Support the Detection of Hidden Multivariate Data Structures in IS Research", Information & Management, Vol. 47, Issue 4, pp. 197-207, May 2010.
  21. C. D. Dziuban and E. C. Shirkey, "When is a Correlation Matrix Appropriate for Factor Analysis?", Psychological Bulletin, Vol. 81, No. 6, pp. 358-361, June 1974.
  22. J. F. Hair, Jr., W. C. Black, B. J. Babin, and R. E. Anderson, "Multivariate Data Analysis, 7th ed., Upper Saddle River", NJ, PrenticeHall, 2010.
  23. J. C. Nunnally and I. H. Bernstein, "Psychometric Theory", 3rd ed, New York, NY : McGraw-hill, 1994.
  24. P M. Podsakoff, S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff. "Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies", Journal of Applied Psychology, Vol. 88, No. 5, pp. 879-903, Oct. 2003.
  25. M. K. Lindell and D. J. Whitney, "Accounting for Common Method Variance in Cross-Sectional Research Designs", Journal of Applied Psychology, Vol. 86 No. 1, pp. 114-121, Feb. 2001.
  26. C. Fornell and D. Larcker, "Evaluating Structural Equation models with Unobservable Variables and Measurement Error", Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, Feb. 1981.
  27. R. A. Ping Jr., "On Assuring Valid Measures for Theoretical Models Using Survey Data", Journal of Business Research, Vol. 57, Issue 2, pp. 125-141, Feb. 2004.
  28. A. H. Segars, "Assessing the Unidimensionality of Measurement: A Paradigm and Illustration within the Context of Information Systems Research", Omega, International Journal of Management Science, Vol. 25, Issue 1, pp. 107-121, Feb. 1997.
  29. D. Gefen, D. Straub, and M. Boudreau, "Structural Equation Modeling and Regression: Guidelines for Research Practice", Communications of the Association for Information Systems, Vol. 4, No. 7, pp. 1-79, Aug. 2000.
  30. D. Gefen and D. Straub, "A Practical Guide to Factorial Validity Using PLS-Graph : Tutorial and Annotated Example", Communications of the Association for Information Systems, Vol. 16, pp. 91-109, 2005.
  31. R. P. Bagozzi, Y. Yi, and L. W. Phillips, "Assessing Construct Validity in Organizational Research", Administrative Science Quarterly, Vol. 36, No. 3, pp. 421-458, Sep. 1991.