The effect of resilience and job stress on information security awareness

Saved in:
Bibliographic Details
Published inInformation and computer security Vol. 26; no. 3; pp. 277 - 289
Main Authors McCormac, Agata, Calic, Dragana, Parsons, Kathryn, Butavicius, Marcus, Pattinson, Malcolm, Lillie, Meredith
Format Journal Article
LanguageEnglish
Published 09.07.2018
Online AccessGet full text
ISSN2056-4961
DOI10.1108/ICS-03-2018-0032

Cover

Author Parsons, Kathryn
Butavicius, Marcus
McCormac, Agata
Calic, Dragana
Pattinson, Malcolm
Lillie, Meredith
Author_xml – sequence: 1
  givenname: Agata
  surname: McCormac
  fullname: McCormac, Agata
– sequence: 2
  givenname: Dragana
  surname: Calic
  fullname: Calic, Dragana
– sequence: 3
  givenname: Kathryn
  surname: Parsons
  fullname: Parsons, Kathryn
– sequence: 4
  givenname: Marcus
  surname: Butavicius
  fullname: Butavicius, Marcus
– sequence: 5
  givenname: Malcolm
  surname: Pattinson
  fullname: Pattinson, Malcolm
– sequence: 6
  givenname: Meredith
  surname: Lillie
  fullname: Lillie, Meredith
BookMark eNp1kE1LAzEQhnOoYK29e8wfiE6SzZo9SvFjoeDBeg7ZZIIp26wkEem_d6ueBE8zDO8zzDwXZJGmhIRccbjmHPRNv3lhIJkArhmAFAuyFKBa1nQtPyfrUvYAwDveypYvSb97Q4ohoKt0CjRjiWPE5JDa5Ol-Gmip87DQKdGYwpQPtsa5L-g-cqxHaj9txjQnLslZsGPB9W9dkdeH-93miW2fH_vN3ZY5oWVlKFQXUM4XeeDOBz94gdp61MFhAyFYpaQNXimFHXdDJzzXt1KqhneDs1quCPzsdXkqJWMw7zkebD4aDuZkwMwGDEhzMmBOBmak_YO4WL__qNnG8X_wC_uSZT0
CitedBy_id crossref_primary_10_1007_s10639_022_11121_5
crossref_primary_10_1016_j_cose_2022_102991
crossref_primary_10_1080_08874417_2020_1712269
crossref_primary_10_1016_j_cose_2020_102020
crossref_primary_10_1016_j_ijinfomgt_2020_102298
crossref_primary_10_52053_jpap_v4i4_232
crossref_primary_10_1016_j_cose_2019_101640
crossref_primary_10_22394_1726_1139_2022_2_123_138
crossref_primary_10_4108_eetsis_6931
crossref_primary_10_1080_0144929X_2023_2295950
crossref_primary_10_3390_electronics11101659
crossref_primary_10_3390_ijerph18157779
crossref_primary_10_1108_ICS_03_2022_0047
crossref_primary_10_1108_ICS_03_2025_265
crossref_primary_10_1109_ACCESS_2022_3230286
crossref_primary_10_1109_ACCESS_2024_3383311
crossref_primary_10_1108_ICS_03_2018_0032
crossref_primary_10_1080_08874417_2020_1845584
crossref_primary_10_1108_OCJ_06_2022_0012
crossref_primary_10_1016_j_chb_2020_106557
Cites_doi 10.1037/0033-2909.112.1.155
10.1108/ICS-03-2018-0032
10.1080/10705500802222972
10.1037/0022-3514.51.6.1173
10.1108/09685220010371394
10.1016/j.chb.2016.11.065
10.1177/0093854895022002004
10.1016/j.chb.2017.12.022
10.1016/j.cose.2015.01.002
10.1016/j.compedu.2007.11.004
10.1016/j.cose.2017.01.004
10.1016/j.indmarman.2004.09.015
10.1016/j.cose.2005.12.004
10.1037/pas0000191
10.1017/S0954579412000715
10.1111/1467-8721.ep10768783
10.5465/19416520.2016.1159878
10.1016/j.cose.2013.12.003
10.1108/02683940510579803
10.1177/2041386611436264
10.1016/j.cose.2005.07.002
10.1016/j.cose.2006.02.008
10.1002/job.4030150503
10.1177/1748895806068572
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1108/ICS-03-2018-0032
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EndPage 289
ExternalDocumentID 10_1108_ICS_03_2018_0032
GroupedDBID .WU
0-V
1WG
3FY
5VS
7WY
8AO
8FE
8FG
8FI
8FW
9F-
AAGBP
AAKOT
AAMCF
AAUDR
AAVEV
AAXBI
AAYXX
ABIJV
ABJNI
ABSDC
ABUWG
ABXQL
ABYQI
ACGFS
ACTSA
ADBBV
ADOMW
ADQHX
ADWNT
AFKRA
AFNTC
AGYKA
AHMHQ
AILOG
AJEBP
AKXVL
ALMA_UNASSIGNED_HOLDINGS
ALSLI
AODMV
AQUVI
ARALO
ARAPS
AUCOK
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
BPHCQ
BVXVI
CCPQU
CITATION
CNYFK
DWQXO
EBS
ECCUG
EJD
FNNZZ
FYUFA
GEA
GEI
GMX
GNUQQ
GQ.
H13
HCIFZ
K6V
K6~
K7-
KBGRL
M0C
M0O
M0T
M1O
M42
P62
PHGZM
PHGZT
PJZUB
PPXIY
PQBIZ
PQGLB
PQQKQ
PROAC
PRQQA
PUEGO
SCAQC
SDURG
SLOBJ
TEM
TGG
TMF
TMI
TMT
UKHRP
Z11
Z12
Z21
ZYZAG
ID FETCH-LOGICAL-c283t-e259fe3056d01cdfdbd2e8ade8fce40ffa553afd555e91cb92d187335419bca83
IEDL.DBID GEI
ISSN 2056-4961
IngestDate Wed Sep 10 05:09:11 EDT 2025
Thu Apr 24 23:05:44 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://www.emerald.com/insight/site-policies
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c283t-e259fe3056d01cdfdbd2e8ade8fce40ffa553afd555e91cb92d187335419bca83
PageCount 13
ParticipantIDs crossref_primary_10_1108_ICS_03_2018_0032
crossref_citationtrail_10_1108_ICS_03_2018_0032
PublicationCentury 2000
PublicationDate 2018-07-09
PublicationDateYYYYMMDD 2018-07-09
PublicationDate_xml – month: 07
  year: 2018
  text: 2018-07-09
  day: 09
PublicationDecade 2010
PublicationTitle Information and computer security
PublicationYear 2018
References (key2020092809370524000_ref008) 2006; 25
(key2020092809370524000_ref004) 2016
(key2020092809370524000_ref001) 2008; 51
(key2020092809370524000_ref023) 2014; 42
(key2020092809370524000_ref032) 2011
(key2020092809370524000_ref005) 1992; 112
(key2020092809370524000_ref036) 2000; 8
(key2020092809370524000_ref020) 2017; 21
(key2020092809370524000_ref037) 2008; 15
(key2020092809370524000_ref021) 2017; 69
(key2020092809370524000_ref033) 2015; 49
(key2020092809370524000_ref016) 2006; 25
key2020092809370524000_ref041
(key2020092809370524000_ref014) 2012; 2
key2020092809370524000_ref022
key2020092809370524000_ref002
(key2020092809370524000_ref038) 2014
(key2020092809370524000_ref009) 2018; 81
Standards Australia Limited (key2020092809370524000_ref040) 2015
(key2020092809370524000_ref012) 2012; 24
(key2020092809370524000_ref025) 2017; 66
(key2020092809370524000_ref029) 2016; 28
key2020092809370524000_ref019
(key2020092809370524000_ref007) 1995; 22
(key2020092809370524000_ref028) 2015; 6
(key2020092809370524000_ref027) 2005; 34
(key2020092809370524000_ref015) 2016; 10
(key2020092809370524000_ref011) 2005; 20
(key2020092809370524000_ref026) 2015
(key2020092809370524000_ref006) 1992; 1
(key2020092809370524000_ref035) 2005
(key2020092809370524000_ref017) 2006; 6
(key2020092809370524000_ref031) 2005; 24
(key2020092809370524000_ref039) 1994; 15
(key2020092809370524000_ref003) 1986; 51
(key2020092809370524000_ref030) 2004
key2020092809370524000_ref010
key2020092809370524000_ref034
(key2020092809370524000_ref013) 2009
(key2020092809370524000_ref018) 2003
(key2020092809370524000_ref024) 2013
References_xml – ident: key2020092809370524000_ref041
– volume: 112
  start-page: 155
  issue: 1
  year: 1992
  ident: key2020092809370524000_ref005
  article-title: A power primer
  publication-title: Psychological Bulletin
  doi: 10.1037/0033-2909.112.1.155
– volume-title: The Resiliency Advantage: Master Change, Thrives under Pressure, and Bounce Back for Setback
  year: 2005
  ident: key2020092809370524000_ref035
– ident: key2020092809370524000_ref019
  doi: 10.1108/ICS-03-2018-0032
– volume: 6
  issue: 73
  year: 2015
  ident: key2020092809370524000_ref028
  article-title: Understanding individual resilience in the workplace: the international collaboration of workforce resilience model
  publication-title: Frontiers in Psychology
– volume: 15
  start-page: 194
  issue: 3
  year: 2008
  ident: key2020092809370524000_ref037
  article-title: The brief resilience scale: assessing the ability to bounce back
  publication-title: International Journal of Behavioral Medicine
  doi: 10.1080/10705500802222972
– year: 2014
  ident: key2020092809370524000_ref038
  article-title: Resilience definitions, theory, and challenges: interdisciplinary perspectives
  publication-title: European Journal of Psychotraumatology
– volume: 51
  start-page: 1173
  issue: 6
  year: 1986
  ident: key2020092809370524000_ref003
  article-title: The moderator–mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations
  publication-title: Journal of Personality and Social Psychology
  doi: 10.1037/0022-3514.51.6.1173
– volume: 8
  start-page: 31
  issue: 1
  year: 2000
  ident: key2020092809370524000_ref036
  article-title: A conceptual foundation for organizational information security awareness
  publication-title: Information Management & Computer Security
  doi: 10.1108/09685220010371394
– ident: key2020092809370524000_ref010
– volume-title: Work Organisation & Stress: Systematic Problem Approaches for Employers, Managers and Trade Union Representatives
  year: 2003
  ident: key2020092809370524000_ref018
– volume-title: Workplace Stress Evaluation Tools: A Snapshot Review
  year: 2011
  ident: key2020092809370524000_ref032
– volume: 69
  start-page: 151
  year: 2017
  ident: key2020092809370524000_ref021
  article-title: Individual differences and information security awareness
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2016.11.065
– volume: 22
  start-page: 152
  issue: 2
  year: 1995
  ident: key2020092809370524000_ref007
  article-title: Institutional and organizational antecedents of role stress, work alienation, and anomie among police executives
  publication-title: Criminal Justice and Behavior
  doi: 10.1177/0093854895022002004
– volume: 81
  start-page: 282
  year: 2018
  ident: key2020092809370524000_ref009
  article-title: Examining technostress creators and role stress as potential threats to employees’ information security compliance
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2017.12.022
– start-page: 231
  year: 2015
  ident: key2020092809370524000_ref026
  article-title: Factors that Influence Information Security Behaviour: an Australian Web-based Study
– volume: 49
  start-page: 177
  year: 2015
  ident: key2020092809370524000_ref033
  article-title: Personality, attitudes, and intentions: predicting initial adoption of information security behavior
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2015.01.002
– volume: 51
  start-page: 1103
  issue: 3
  year: 2008
  ident: key2020092809370524000_ref001
  article-title: Investigating teacher stress when using technology
  publication-title: Computers & Education
  doi: 10.1016/j.compedu.2007.11.004
– volume: 66
  start-page: 40
  year: 2017
  ident: key2020092809370524000_ref025
  article-title: The human aspects of information security questionnaire (HAIS-Q): two further validation studies
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2017.01.004
– volume: 34
  start-page: 345
  issue: 4
  year: 2005
  ident: key2020092809370524000_ref027
  article-title: Impact of sales force automation on technology-related stress, effort, and technology usage among salespeople
  publication-title: Industrial Marketing Management
  doi: 10.1016/j.indmarman.2004.09.015
– volume: 25
  start-page: 27
  issue: 1
  year: 2006
  ident: key2020092809370524000_ref008
  article-title: The challenges of understanding and using security: a survey of end-users
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2005.12.004
– ident: key2020092809370524000_ref022
– volume: 28
  start-page: 101
  issue: 5
  year: 2016
  ident: key2020092809370524000_ref029
  article-title: Reliability and validity of the Brief Resilience Scale (BRS) Spanish version
  publication-title: Psychological Assessment
  doi: 10.1037/pas0000191
– volume-title: Information Technology – Security Techniques – Code of Practice for Information Security Controls (as ISO/IEC 27002:2015)
  year: 2015
  ident: key2020092809370524000_ref040
– start-page: 3
  volume-title: Work-Life Policies
  year: 2009
  ident: key2020092809370524000_ref013
  article-title: Work and family employment policy for a transformed work force: current trends and themes
– volume-title: Secrets and Lies: Digital Security in a Networked World
  year: 2004
  ident: key2020092809370524000_ref030
– volume: 24
  start-page: 1297
  issue: 4
  year: 2012
  ident: key2020092809370524000_ref012
  article-title: Resilience and measured gene–environment interactions
  publication-title: Development and Psychopathology
  doi: 10.1017/S0954579412000715
– volume: 1
  start-page: 98
  issue: 3
  year: 1992
  ident: key2020092809370524000_ref006
  article-title: Statistical power analysis
  publication-title: Current Directions in Psychological Science
  doi: 10.1111/1467-8721.ep10768783
– volume: 21
  start-page: 1
  year: 2017
  ident: key2020092809370524000_ref020
  article-title: A reliable measure of information security awareness and the identification of bias in responses
  publication-title: Australasian Journal of Information Systems
– volume: 10
  start-page: 729
  issue: 1
  year: 2016
  ident: key2020092809370524000_ref015
  article-title: Resilience: a review using a grounded integrated occupational approach
  publication-title: Academy of Management Annals
  doi: 10.5465/19416520.2016.1159878
– ident: key2020092809370524000_ref034
– volume: 42
  start-page: 165
  year: 2014
  ident: key2020092809370524000_ref023
  article-title: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2013.12.003
– volume: 20
  start-page: 178
  issue: 2
  year: 2005
  ident: key2020092809370524000_ref011
  article-title: The experience of work-related stress across occupations
  publication-title: Journal of Managerial Psychology
  doi: 10.1108/02683940510579803
– year: 2016
  ident: key2020092809370524000_ref004
  article-title: Naïve and accidental behaviours that compromise information security: what the experts think
– volume: 2
  start-page: 152
  issue: 2
  year: 2012
  ident: key2020092809370524000_ref014
  article-title: Work–family boundary management styles in organizations: a cross-level model
  publication-title: Organizational Psychology Review
  doi: 10.1177/2041386611436264
– volume: 24
  start-page: 425
  issue: 6
  year: 2005
  ident: key2020092809370524000_ref031
  article-title: The human factor in security
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2005.07.002
– volume: 25
  start-page: 289
  issue: 4
  year: 2006
  ident: key2020092809370524000_ref016
  article-title: A prototype for assessing information security awareness
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2006.02.008
– volume: 15
  start-page: 385
  issue: 5
  year: 1994
  ident: key2020092809370524000_ref039
  article-title: Using self-report questionnaires in OB research: a comment on the use of a controversial method
  publication-title: Journal of Organizational Behavior
  doi: 10.1002/job.4030150503
– ident: key2020092809370524000_ref002
– start-page: 34
  volume-title: Proceedings of the European Information Security Multi-Conference (EISMC 2013)
  year: 2013
  ident: key2020092809370524000_ref024
  article-title: An analysis of information security vulnerabilities at three Australian government organisations
– volume: 6
  start-page: 371
  issue: 4
  year: 2006
  ident: key2020092809370524000_ref017
  article-title: The impact of work–family conflict on correctional staff: a preliminary study
  publication-title: Criminology and Criminal Justice
  doi: 10.1177/1748895806068572
SSID ssj0001916361
Score 2.3156533
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 277
Title The effect of resilience and job stress on information security awareness
Volume 26
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZKWVgoT1Fe8sDC4Dax48QZq4rSMnSBSqVL5KcolATRVEj8euw8qgrBgMScS5T4Tnf3Xe6-A-BKCRsDTKiQsOEZBYJEKA4wRzSMjEVi1KUUrttiHA4nwd2UThtgXM_CFG2VZTmm8NPzdOlAatc1blsvvCYccNtrRv171w1kQxhD1jhx11Wsu0_562LLWjoN69HfuuJiMyFSEKhiG_VREId-_d_yh4dtxKmNgDNogax-1bLP5KWzykVHfn5jcfy_b9kDu1VuCnulMe2Dhk4PQKve-wArN3AIRta2YNkIAjMDLWCfL4pLkKcKPmcClhMoMEthRczq1A-X1a48yD_cCJqVOAKTwc1Df4iqlQxI2jwkR9qiJaMd7FCeL5VRQmHNuNLMSB14xnBKCTeKUqpjX4oYK59FhNDAj4XkjByDZpql-gRAn0lsuGdCGbMgZhHnBGvfE77wjMSUtEG3VkAiK75ytzZjkRS4xWOJPbPEI4k7M0dxitvgen3HW8nV8avs6R9kz8BOqZcIefE5aObvK31hU5FcXBYWdgm2Z4-z3u0Xvr3aBA
linkProvider Emerald
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+effect+of+resilience+and+job+stress+on+information+security+awareness&rft.jtitle=Information+and+computer+security&rft.au=McCormac%2C+Agata&rft.au=Calic%2C+Dragana&rft.au=Parsons%2C+Kathryn&rft.au=Butavicius%2C+Marcus&rft.date=2018-07-09&rft.issn=2056-4961&rft.volume=26&rft.issue=3&rft.spage=277&rft.epage=289&rft_id=info:doi/10.1108%2FICS-03-2018-0032&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_03_2018_0032
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon