The effect of resilience and job stress on information security awareness
Saved in:
Published in | Information and computer security Vol. 26; no. 3; pp. 277 - 289 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
09.07.2018
|
Online Access | Get full text |
ISSN | 2056-4961 |
DOI | 10.1108/ICS-03-2018-0032 |
Cover
Author | Parsons, Kathryn Butavicius, Marcus McCormac, Agata Calic, Dragana Pattinson, Malcolm Lillie, Meredith |
---|---|
Author_xml | – sequence: 1 givenname: Agata surname: McCormac fullname: McCormac, Agata – sequence: 2 givenname: Dragana surname: Calic fullname: Calic, Dragana – sequence: 3 givenname: Kathryn surname: Parsons fullname: Parsons, Kathryn – sequence: 4 givenname: Marcus surname: Butavicius fullname: Butavicius, Marcus – sequence: 5 givenname: Malcolm surname: Pattinson fullname: Pattinson, Malcolm – sequence: 6 givenname: Meredith surname: Lillie fullname: Lillie, Meredith |
BookMark | eNp1kE1LAzEQhnOoYK29e8wfiE6SzZo9SvFjoeDBeg7ZZIIp26wkEem_d6ueBE8zDO8zzDwXZJGmhIRccbjmHPRNv3lhIJkArhmAFAuyFKBa1nQtPyfrUvYAwDveypYvSb97Q4ohoKt0CjRjiWPE5JDa5Ol-Gmip87DQKdGYwpQPtsa5L-g-cqxHaj9txjQnLslZsGPB9W9dkdeH-93miW2fH_vN3ZY5oWVlKFQXUM4XeeDOBz94gdp61MFhAyFYpaQNXimFHXdDJzzXt1KqhneDs1quCPzsdXkqJWMw7zkebD4aDuZkwMwGDEhzMmBOBmak_YO4WL__qNnG8X_wC_uSZT0 |
CitedBy_id | crossref_primary_10_1007_s10639_022_11121_5 crossref_primary_10_1016_j_cose_2022_102991 crossref_primary_10_1080_08874417_2020_1712269 crossref_primary_10_1016_j_cose_2020_102020 crossref_primary_10_1016_j_ijinfomgt_2020_102298 crossref_primary_10_52053_jpap_v4i4_232 crossref_primary_10_1016_j_cose_2019_101640 crossref_primary_10_22394_1726_1139_2022_2_123_138 crossref_primary_10_4108_eetsis_6931 crossref_primary_10_1080_0144929X_2023_2295950 crossref_primary_10_3390_electronics11101659 crossref_primary_10_3390_ijerph18157779 crossref_primary_10_1108_ICS_03_2022_0047 crossref_primary_10_1108_ICS_03_2025_265 crossref_primary_10_1109_ACCESS_2022_3230286 crossref_primary_10_1109_ACCESS_2024_3383311 crossref_primary_10_1108_ICS_03_2018_0032 crossref_primary_10_1080_08874417_2020_1845584 crossref_primary_10_1108_OCJ_06_2022_0012 crossref_primary_10_1016_j_chb_2020_106557 |
Cites_doi | 10.1037/0033-2909.112.1.155 10.1108/ICS-03-2018-0032 10.1080/10705500802222972 10.1037/0022-3514.51.6.1173 10.1108/09685220010371394 10.1016/j.chb.2016.11.065 10.1177/0093854895022002004 10.1016/j.chb.2017.12.022 10.1016/j.cose.2015.01.002 10.1016/j.compedu.2007.11.004 10.1016/j.cose.2017.01.004 10.1016/j.indmarman.2004.09.015 10.1016/j.cose.2005.12.004 10.1037/pas0000191 10.1017/S0954579412000715 10.1111/1467-8721.ep10768783 10.5465/19416520.2016.1159878 10.1016/j.cose.2013.12.003 10.1108/02683940510579803 10.1177/2041386611436264 10.1016/j.cose.2005.07.002 10.1016/j.cose.2006.02.008 10.1002/job.4030150503 10.1177/1748895806068572 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.1108/ICS-03-2018-0032 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EndPage | 289 |
ExternalDocumentID | 10_1108_ICS_03_2018_0032 |
GroupedDBID | .WU 0-V 1WG 3FY 5VS 7WY 8AO 8FE 8FG 8FI 8FW 9F- AAGBP AAKOT AAMCF AAUDR AAVEV AAXBI AAYXX ABIJV ABJNI ABSDC ABUWG ABXQL ABYQI ACGFS ACTSA ADBBV ADOMW ADQHX ADWNT AFKRA AFNTC AGYKA AHMHQ AILOG AJEBP AKXVL ALMA_UNASSIGNED_HOLDINGS ALSLI AODMV AQUVI ARALO ARAPS AUCOK AZQEC BENPR BEZIV BGLVJ BGRYB BPHCQ BVXVI CCPQU CITATION CNYFK DWQXO EBS ECCUG EJD FNNZZ FYUFA GEA GEI GMX GNUQQ GQ. H13 HCIFZ K6V K6~ K7- KBGRL M0C M0O M0T M1O M42 P62 PHGZM PHGZT PJZUB PPXIY PQBIZ PQGLB PQQKQ PROAC PRQQA PUEGO SCAQC SDURG SLOBJ TEM TGG TMF TMI TMT UKHRP Z11 Z12 Z21 ZYZAG |
ID | FETCH-LOGICAL-c283t-e259fe3056d01cdfdbd2e8ade8fce40ffa553afd555e91cb92d187335419bca83 |
IEDL.DBID | GEI |
ISSN | 2056-4961 |
IngestDate | Wed Sep 10 05:09:11 EDT 2025 Thu Apr 24 23:05:44 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://www.emerald.com/insight/site-policies |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c283t-e259fe3056d01cdfdbd2e8ade8fce40ffa553afd555e91cb92d187335419bca83 |
PageCount | 13 |
ParticipantIDs | crossref_primary_10_1108_ICS_03_2018_0032 crossref_citationtrail_10_1108_ICS_03_2018_0032 |
PublicationCentury | 2000 |
PublicationDate | 2018-07-09 |
PublicationDateYYYYMMDD | 2018-07-09 |
PublicationDate_xml | – month: 07 year: 2018 text: 2018-07-09 day: 09 |
PublicationDecade | 2010 |
PublicationTitle | Information and computer security |
PublicationYear | 2018 |
References | (key2020092809370524000_ref008) 2006; 25 (key2020092809370524000_ref004) 2016 (key2020092809370524000_ref001) 2008; 51 (key2020092809370524000_ref023) 2014; 42 (key2020092809370524000_ref032) 2011 (key2020092809370524000_ref005) 1992; 112 (key2020092809370524000_ref036) 2000; 8 (key2020092809370524000_ref020) 2017; 21 (key2020092809370524000_ref037) 2008; 15 (key2020092809370524000_ref021) 2017; 69 (key2020092809370524000_ref033) 2015; 49 (key2020092809370524000_ref016) 2006; 25 key2020092809370524000_ref041 (key2020092809370524000_ref014) 2012; 2 key2020092809370524000_ref022 key2020092809370524000_ref002 (key2020092809370524000_ref038) 2014 (key2020092809370524000_ref009) 2018; 81 Standards Australia Limited (key2020092809370524000_ref040) 2015 (key2020092809370524000_ref012) 2012; 24 (key2020092809370524000_ref025) 2017; 66 (key2020092809370524000_ref029) 2016; 28 key2020092809370524000_ref019 (key2020092809370524000_ref007) 1995; 22 (key2020092809370524000_ref028) 2015; 6 (key2020092809370524000_ref027) 2005; 34 (key2020092809370524000_ref015) 2016; 10 (key2020092809370524000_ref011) 2005; 20 (key2020092809370524000_ref026) 2015 (key2020092809370524000_ref006) 1992; 1 (key2020092809370524000_ref035) 2005 (key2020092809370524000_ref017) 2006; 6 (key2020092809370524000_ref031) 2005; 24 (key2020092809370524000_ref039) 1994; 15 (key2020092809370524000_ref003) 1986; 51 (key2020092809370524000_ref030) 2004 key2020092809370524000_ref010 key2020092809370524000_ref034 (key2020092809370524000_ref013) 2009 (key2020092809370524000_ref018) 2003 (key2020092809370524000_ref024) 2013 |
References_xml | – ident: key2020092809370524000_ref041 – volume: 112 start-page: 155 issue: 1 year: 1992 ident: key2020092809370524000_ref005 article-title: A power primer publication-title: Psychological Bulletin doi: 10.1037/0033-2909.112.1.155 – volume-title: The Resiliency Advantage: Master Change, Thrives under Pressure, and Bounce Back for Setback year: 2005 ident: key2020092809370524000_ref035 – ident: key2020092809370524000_ref019 doi: 10.1108/ICS-03-2018-0032 – volume: 6 issue: 73 year: 2015 ident: key2020092809370524000_ref028 article-title: Understanding individual resilience in the workplace: the international collaboration of workforce resilience model publication-title: Frontiers in Psychology – volume: 15 start-page: 194 issue: 3 year: 2008 ident: key2020092809370524000_ref037 article-title: The brief resilience scale: assessing the ability to bounce back publication-title: International Journal of Behavioral Medicine doi: 10.1080/10705500802222972 – year: 2014 ident: key2020092809370524000_ref038 article-title: Resilience definitions, theory, and challenges: interdisciplinary perspectives publication-title: European Journal of Psychotraumatology – volume: 51 start-page: 1173 issue: 6 year: 1986 ident: key2020092809370524000_ref003 article-title: The moderator–mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.51.6.1173 – volume: 8 start-page: 31 issue: 1 year: 2000 ident: key2020092809370524000_ref036 article-title: A conceptual foundation for organizational information security awareness publication-title: Information Management & Computer Security doi: 10.1108/09685220010371394 – ident: key2020092809370524000_ref010 – volume-title: Work Organisation & Stress: Systematic Problem Approaches for Employers, Managers and Trade Union Representatives year: 2003 ident: key2020092809370524000_ref018 – volume-title: Workplace Stress Evaluation Tools: A Snapshot Review year: 2011 ident: key2020092809370524000_ref032 – volume: 69 start-page: 151 year: 2017 ident: key2020092809370524000_ref021 article-title: Individual differences and information security awareness publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2016.11.065 – volume: 22 start-page: 152 issue: 2 year: 1995 ident: key2020092809370524000_ref007 article-title: Institutional and organizational antecedents of role stress, work alienation, and anomie among police executives publication-title: Criminal Justice and Behavior doi: 10.1177/0093854895022002004 – volume: 81 start-page: 282 year: 2018 ident: key2020092809370524000_ref009 article-title: Examining technostress creators and role stress as potential threats to employees’ information security compliance publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2017.12.022 – start-page: 231 year: 2015 ident: key2020092809370524000_ref026 article-title: Factors that Influence Information Security Behaviour: an Australian Web-based Study – volume: 49 start-page: 177 year: 2015 ident: key2020092809370524000_ref033 article-title: Personality, attitudes, and intentions: predicting initial adoption of information security behavior publication-title: Computers & Security doi: 10.1016/j.cose.2015.01.002 – volume: 51 start-page: 1103 issue: 3 year: 2008 ident: key2020092809370524000_ref001 article-title: Investigating teacher stress when using technology publication-title: Computers & Education doi: 10.1016/j.compedu.2007.11.004 – volume: 66 start-page: 40 year: 2017 ident: key2020092809370524000_ref025 article-title: The human aspects of information security questionnaire (HAIS-Q): two further validation studies publication-title: Computers & Security doi: 10.1016/j.cose.2017.01.004 – volume: 34 start-page: 345 issue: 4 year: 2005 ident: key2020092809370524000_ref027 article-title: Impact of sales force automation on technology-related stress, effort, and technology usage among salespeople publication-title: Industrial Marketing Management doi: 10.1016/j.indmarman.2004.09.015 – volume: 25 start-page: 27 issue: 1 year: 2006 ident: key2020092809370524000_ref008 article-title: The challenges of understanding and using security: a survey of end-users publication-title: Computers & Security doi: 10.1016/j.cose.2005.12.004 – ident: key2020092809370524000_ref022 – volume: 28 start-page: 101 issue: 5 year: 2016 ident: key2020092809370524000_ref029 article-title: Reliability and validity of the Brief Resilience Scale (BRS) Spanish version publication-title: Psychological Assessment doi: 10.1037/pas0000191 – volume-title: Information Technology – Security Techniques – Code of Practice for Information Security Controls (as ISO/IEC 27002:2015) year: 2015 ident: key2020092809370524000_ref040 – start-page: 3 volume-title: Work-Life Policies year: 2009 ident: key2020092809370524000_ref013 article-title: Work and family employment policy for a transformed work force: current trends and themes – volume-title: Secrets and Lies: Digital Security in a Networked World year: 2004 ident: key2020092809370524000_ref030 – volume: 24 start-page: 1297 issue: 4 year: 2012 ident: key2020092809370524000_ref012 article-title: Resilience and measured gene–environment interactions publication-title: Development and Psychopathology doi: 10.1017/S0954579412000715 – volume: 1 start-page: 98 issue: 3 year: 1992 ident: key2020092809370524000_ref006 article-title: Statistical power analysis publication-title: Current Directions in Psychological Science doi: 10.1111/1467-8721.ep10768783 – volume: 21 start-page: 1 year: 2017 ident: key2020092809370524000_ref020 article-title: A reliable measure of information security awareness and the identification of bias in responses publication-title: Australasian Journal of Information Systems – volume: 10 start-page: 729 issue: 1 year: 2016 ident: key2020092809370524000_ref015 article-title: Resilience: a review using a grounded integrated occupational approach publication-title: Academy of Management Annals doi: 10.5465/19416520.2016.1159878 – ident: key2020092809370524000_ref034 – volume: 42 start-page: 165 year: 2014 ident: key2020092809370524000_ref023 article-title: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q) publication-title: Computers & Security doi: 10.1016/j.cose.2013.12.003 – volume: 20 start-page: 178 issue: 2 year: 2005 ident: key2020092809370524000_ref011 article-title: The experience of work-related stress across occupations publication-title: Journal of Managerial Psychology doi: 10.1108/02683940510579803 – year: 2016 ident: key2020092809370524000_ref004 article-title: Naïve and accidental behaviours that compromise information security: what the experts think – volume: 2 start-page: 152 issue: 2 year: 2012 ident: key2020092809370524000_ref014 article-title: Work–family boundary management styles in organizations: a cross-level model publication-title: Organizational Psychology Review doi: 10.1177/2041386611436264 – volume: 24 start-page: 425 issue: 6 year: 2005 ident: key2020092809370524000_ref031 article-title: The human factor in security publication-title: Computers & Security doi: 10.1016/j.cose.2005.07.002 – volume: 25 start-page: 289 issue: 4 year: 2006 ident: key2020092809370524000_ref016 article-title: A prototype for assessing information security awareness publication-title: Computers & Security doi: 10.1016/j.cose.2006.02.008 – volume: 15 start-page: 385 issue: 5 year: 1994 ident: key2020092809370524000_ref039 article-title: Using self-report questionnaires in OB research: a comment on the use of a controversial method publication-title: Journal of Organizational Behavior doi: 10.1002/job.4030150503 – ident: key2020092809370524000_ref002 – start-page: 34 volume-title: Proceedings of the European Information Security Multi-Conference (EISMC 2013) year: 2013 ident: key2020092809370524000_ref024 article-title: An analysis of information security vulnerabilities at three Australian government organisations – volume: 6 start-page: 371 issue: 4 year: 2006 ident: key2020092809370524000_ref017 article-title: The impact of work–family conflict on correctional staff: a preliminary study publication-title: Criminology and Criminal Justice doi: 10.1177/1748895806068572 |
SSID | ssj0001916361 |
Score | 2.3156533 |
SourceID | crossref |
SourceType | Enrichment Source Index Database |
StartPage | 277 |
Title | The effect of resilience and job stress on information security awareness |
Volume | 26 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZKWVgoT1Fe8sDC4Dax48QZq4rSMnSBSqVL5KcolATRVEj8euw8qgrBgMScS5T4Tnf3Xe6-A-BKCRsDTKiQsOEZBYJEKA4wRzSMjEVi1KUUrttiHA4nwd2UThtgXM_CFG2VZTmm8NPzdOlAatc1blsvvCYccNtrRv171w1kQxhD1jhx11Wsu0_562LLWjoN69HfuuJiMyFSEKhiG_VREId-_d_yh4dtxKmNgDNogax-1bLP5KWzykVHfn5jcfy_b9kDu1VuCnulMe2Dhk4PQKve-wArN3AIRta2YNkIAjMDLWCfL4pLkKcKPmcClhMoMEthRczq1A-X1a48yD_cCJqVOAKTwc1Df4iqlQxI2jwkR9qiJaMd7FCeL5VRQmHNuNLMSB14xnBKCTeKUqpjX4oYK59FhNDAj4XkjByDZpql-gRAn0lsuGdCGbMgZhHnBGvfE77wjMSUtEG3VkAiK75ytzZjkRS4xWOJPbPEI4k7M0dxitvgen3HW8nV8avs6R9kz8BOqZcIefE5aObvK31hU5FcXBYWdgm2Z4-z3u0Xvr3aBA |
linkProvider | Emerald |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+effect+of+resilience+and+job+stress+on+information+security+awareness&rft.jtitle=Information+and+computer+security&rft.au=McCormac%2C+Agata&rft.au=Calic%2C+Dragana&rft.au=Parsons%2C+Kathryn&rft.au=Butavicius%2C+Marcus&rft.date=2018-07-09&rft.issn=2056-4961&rft.volume=26&rft.issue=3&rft.spage=277&rft.epage=289&rft_id=info:doi/10.1108%2FICS-03-2018-0032&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_03_2018_0032 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon |