DOI QR코드

DOI QR Code

Reinforcement of IS Voice Behavior within the Organization: A Perspective on Mitigating Role Stress Through Organization Justice and Individual Social-identity

조직 내부의 정보보안 제언 행동 강화: 조직 공정성과 개인의 사회적 정체성을 통한 업무 스트레스 감소 관점

  • Hwang, In-Ho (College of General Education, Kookmin University)
  • Received : 2022.06.14
  • Accepted : 2022.08.17
  • Published : 2022.08.31

Abstract

As information security(IS) is recognized as an organization's core value, organizations are making efforts to adopt strict IS policies and technologies. However, strict IS policies can cause negative behavior for employees of organizations who need to apply IS to their work. This study confirms that IS can express the role stress of employees, and suggests a way to mitigate the IS role stress. Specifically, we confirm that organization justice and individual social identity can reduce IS role stress, which reduces IS voice behavior. In the study, we surveyed workers of organizations that applied IS policies to their work and obtained 318 samples. Also, we tested the hypothesis by applying the structural equation model. As a result, IS organization justice increased IS voice behavior through social identity and partially reduced IS voice behavior by mitigating IS role stress. In addition, social identity moderated the relationship between IS role stress and IS voice behavior. This study suggests strategies for achieving internal IS goals by suggesting conditions for mitigating IS role stress from an organizational and individual perspective.

정보보안이 조직의 핵심 가치로 인식되면서, 조직들은 높은 수준의 정보보안 정책 및 기술 도입 등의 활동을 수행하고 있다. 하지만, 정보보안을 업무에 적용해야 하는 조직원에게 엄격한 정보보안 정책은 오히려 부정적 영향을 줄 수 있다. 본 연구는 정보보안이 조직원의 업무 스트레스를 발현시킬 수 있음을 확인하고, 스트레스를 완화하는 방안을 제시하고자 한다. 세부적으로, 조직의 정보보안 조직 공정성과 개인의 사회적 정체성이 제언 행동에 부정적 영향을 주는 업무 스트레스를 감소시킬 수 있음을 확인한다. 연구는 정보보안 규정 및 정책을 과업에 적용한 조직의 근로자들에게 설문하였으며, 318개의 표본을 확보하였다. 그리고, 연구는 구조방정식 모형을 적용하여 가설을 검증하였다. 가설 검증 결과, 정보보안 조직 공정성이 사회적 정체성을 통해 제언 행동을 높였으며, 조직 공정성이 업무 스트레스를 완화하여 부분적으로 제언 행동을 감소시켰다. 또한, 사회적 정체성이 업무 스트레스와 제언 행동 간의 관계를 조절하였다. 본 연구는 조직 및 개인 차원의 업무 스트레스 완화 조건을 제시함으로써, 조직 내부의 정보보안 목표 달성을 위한 전략적 시사점을 제공한다.

Keywords

References

  1. Y. Duan, Y. Liu, Y. Chen, W. Guo, and L. Yang, "Research on the impact of knowledge sharing on risk control of inclusive finance in rural areas during the post-COVID-19 era," J. of Knowledge Management, vol. 25, no. 6, 2021, pp. 1526-1549. https://doi.org/10.1108/JKM-06-2020-0483
  2. X. Ma, "IS professionals' information security behaviors in Chinese IT organizations for information security protection," Information Processing & Management, vol. 59, no. 1, 2022, pp. 102744. https://doi.org/10.1016/j.ipm.2021.102744
  3. Verizon, "2020 data breach investigations report," Report, 2020.
  4. W. Lee and I. Hwang, "Sustainable information security behavior management: An empirical approach for the causes of employees' voice behavior," Sustainability, vol. 13, no. 11, 2021, pp. 6077. https://doi.org/10.3390/su13116077
  5. Y. Xue, H. Liang, and L. Wu, "Punishment, justice, and compliance in mandatory IT settings," Information Systems Research, vol. 22, no. 2, 2011, pp. 400-414. https://doi.org/10.1287/isre.1090.0266
  6. P. Menard, G. J. Bott, and R. E. Crossler, "User motivations in protecting information security: Protection motivation theory versus self-determination theory," J. of Management Information Systems, vol. 34, no. 4, 2017, pp. 1203-1230. https://doi.org/10.1080/07421222.2017.1394083
  7. M. Kajtazi, H. Cavusoglu, I. Benbasat, and D. Haftor, "Escalation of commitment as an antecedent to noncompliance with information security policy," Information & Computer Security, vol. 26, no. 2, 2018, pp. 171-193. https://doi.org/10.1108/ics-09-2017-0066
  8. J. D'Arcy and P. L. Teh, "Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization," Information & Management, vol. 56, no. 7, 2019, pp. 103151. https://doi.org/10.1016/j.im.2019.02.006
  9. I. Hwang, "The influence on the information security stressor on information security compliance intention: Focusing on the moderation of authentic leadership," J. of the Korea Institute of Electronic Communication Sciences, vol. 16, no. 6, 2021, pp. 1101-1112.
  10. S. Trang and I. Nastjuk, "Examining the role of stress and information security policy design in information security compliance behavior: An experimental study of in-task behavior," Computers & Security, vol. 104, 2021, pp. 102222. https://doi.org/10.1016/j.cose.2021.102222
  11. T. R. Tyler and S. L. Blader, "The group engagement model: Procedural justice, social identity, and cooperative behavior," Personality and Social Psychology Review, vol. 7, no. 4, 2003, pp. 349-361. https://doi.org/10.1207/S15327957PSPR0704_07
  12. S. L. Blader and T. R. Tyler, "Testing and extending the group engagement model: Linkages between social identity, procedural justice, economic outcomes, and extrarole behavior," J. of Applied Psychology, vol. 94, no. 2, 2009, pp. 445-464. https://doi.org/10.1037/a0013935
  13. C. Newton and S. Teo, "Identification and occupational stress: A stress buffering perspective," Human Resource Management, vol. 53, no. 1, 2014, pp. 89-113. https://doi.org/10.1002/hrm.21598
  14. M. L. Ambrose and M. Schminke, "The role of overall justice judgments in organizational justice research: A test of mediation," J. of Applied Psychology, vol. 94, no. 2, 2009, pp. 491-500. https://doi.org/10.1037/a0013203
  15. T. A. Judge and J. A. Colquitt, "Organizational justice and stress: The mediating role of work-family conflict," J. of Applied Psychology, vol. 89, no. 3, 2004, pp. 395-404. https://doi.org/10.1037/0021-9010.89.3.395
  16. Y. Zhang, J. A. LePine, B. R. Buckman, and F. Wei, "It's not fair... or is it? The role of justice and leadership in explaining work stressor-job performance relationships," Academy of Management J., vol. 57, no. 3, 2014, pp. 675-697. https://doi.org/10.5465/amj.2011.1110
  17. I. Hwang, "The influence on the information security techno-stress on security policy resistance through strain: Focusing on the moderation of task technology fit," J. of the Korea Institute of Electronic Communication Sciences, vol. 16, no. 5, 2021, pp. 931-939. https://doi.org/10.13067/JKIECS.2021.16.5.931
  18. L. Van Dyne and J. A. LePine, "Helping and voice extra-role behaviors: Evidence of construct and predictive validity," Academy of Management J., vol. 41, no. 1, 1998, pp. 108-119. https://doi.org/10.2307/256902
  19. M. Svendsen and T. S. Joensson, "Transformational leadership and change-related voice behavior," Leadership & Organization Development J., vol. 37, no. 3, 2016, pp. 357-368. https://doi.org/10.1108/LODJ-07-2014-0124
  20. K. A. Alshare, P. L. Lane, and M. R. Lane, "Information security policy compliance: A higher education case study," Information & Computer Security, vol. 26 no. 1, 2018, pp. 91-108. https://doi.org/10.1108/ics-09-2016-0073
  21. J. S. Adams, Inequity in social exchange. In Advances in Experimental Social Psychology. New York: Academic Press, 1965.
  22. M. Tarafdar, Q. Tu, B. S. Ragu-Nathan, and T. S. Ragu-Nathan, "The impact of technostress on role stress and productivity," J. of Management Information Systems, vol. 24, no. 1, 2007, pp. 301-328. https://doi.org/10.2753/MIS0742-1222240109
  23. P. S. Galluch, V. Grover, and J. B. Thatcher, "Interrupting the workplace: Examining stressors in an information technology context," J. of the Association for Information Systems, vol. 16, no. 1, 2015, pp. 1-47. https://doi.org/10.17705/1jais.00387
  24. I. Hwang, "The effect on the IS psychological empowerment on the mitigation of IS policy resistance through IS role stress: Focusing on the moderation of IS justice climate," J. of the Korea Institute of Electronic Communication Sciences, vol. 17, no. 1, 2022, pp. 1-12.
  25. L. Avanzi, F. Fraccaroli, G. Sarchielli, J. Ullrich, and R. van Dick, "Staying or leaving: A combined social identity and social exchange approach to predicting employee turnover intentions," Int. J. of Productivity and Performance Management, vol. 63, no. 3, 2014, pp. 272-289. https://doi.org/10.1108/IJPPM-02-2013-0028
  26. H. Li, J. Zhang, and R. Sarathy, "Understanding compliance with internet use policy from the perspective of rational choice theory," Decision Support Systems, vol. 48, no. 4, 2010, pp. 635-645. https://doi.org/10.1016/j.dss.2009.12.005
  27. A. K. Khan, S. Quratulain, and J. R. Crawshaw, "The mediating role of discrete emotions in the relationship between injustice and counterproductive work behaviors: A study in Pakistan," J. of Business and Psychology, vol. 28, no. 1, 2013, pp. 49-61. https://doi.org/10.1007/s10869-012-9269-2
  28. A. Ceylan and S. Sulu, "Work alienation as a mediator of the relationship of procedural injustice to job stress," South East European J. of Economics and Business, vol. 5, no. 2, 2010, pp. 65-74.
  29. R. E. Johnson, C. H. Chang, and C. C. Rosen, "Who I am depends on how fairly I'm treated": Effects of justice on self identity and regulatory focus," J. of Applied Social Psychology, vol. 40, no. 12, 2010, pp. 3020-3058. https://doi.org/10.1111/j.1559-1816.2010.00691.x
  30. L. Willis, K. J. Reynolds, and E. Lee, "Being well at work: The impact of organizational climate and social identity on employee stress and self-esteem over time," European J. of Work and Organizational Psychology, vol. 28, no. 3, 2019, pp. 399-413. https://doi.org/10.1080/1359432x.2019.1587409
  31. F. O. Walumbwa, D. M. Mayer, P. Wang, H. Wang, K. Workman, and A. L. Christensen, "Linking ethical leadership to employee performance: The roles of leader-member exchange, self-efficacy, and organizational identification," Organizational Behavior and Human Decision Processes, vol. 115, no. 2, 2011, pp. 204-213. https://doi.org/10.1016/j.obhdp.2010.11.002
  32. N. L. Jimmieson, B. M. McKimmie, R. L. Hannam, and J. Gallagher, "An investigation of the stress-buffering effects of social support in the occupational stress process as a function of team identification," Group Dynamics: Theory, Research, and Practice, vol. 14, no. 4, 2010, pp. 350-367. https://doi.org/10.1037/a0018631
  33. J. C. Nunnally, Psychometric theory (2nd ed.). New York: McGraw-Hill, 1978.
  34. C. Fornell and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error," J. of Marketing Research, vol. 18, no. 1, 1981, pp. 39-50. https://doi.org/10.2307/3151312
  35. P. M. Podsakoff, S. B. MacKenzie, J. Lee, and N. P. Podsakoff, "Common method biases in behavioral research: A critical review of the literature and recommended remedies," J. of Applied Psychology, vol. 88, no. 5, 2003, pp. 879-903. https://doi.org/10.1037/0021-9010.88.5.879
  36. A. F. Hayes, Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. New York: Guilford Publications, 2017.