Information Security and Privacy (SIG SEC)

Loading...

Media is loading
 

Paper Type

ERF

Paper Number

1402

Description

Prior research has suggested that boredom in the workplace can exert a negative impact on employees’ performance. As a neglected but salient emotional state, the effects of boredom on information security-related behaviors are underexamined. To reveal the significance of security-related boredom, this study investigates how it can emerge and affect information security policy (ISP) compliance behaviors. Drawing upon the literature of boredom and coping theory, a conceptual model was developed. A mixed-methods research design will be utilized to collect both quantitative and qualitative data from employees via a professional platform. The model will be tested through the SEM methodology using covariance-based software. The qualitative data may provide additional explanations to the findings based on quantitative data analyses. The expected findings will inform the understanding of the role of security-related boredom on ISP compliance practices and offer a few insights into the current body of information systems literature and practitioners’ world.

Share

COinS
 
Aug 9th, 12:00 AM

Too Bored to Engage: An Exploratory Study of Information Security-related Boredom

Prior research has suggested that boredom in the workplace can exert a negative impact on employees’ performance. As a neglected but salient emotional state, the effects of boredom on information security-related behaviors are underexamined. To reveal the significance of security-related boredom, this study investigates how it can emerge and affect information security policy (ISP) compliance behaviors. Drawing upon the literature of boredom and coping theory, a conceptual model was developed. A mixed-methods research design will be utilized to collect both quantitative and qualitative data from employees via a professional platform. The model will be tested through the SEM methodology using covariance-based software. The qualitative data may provide additional explanations to the findings based on quantitative data analyses. The expected findings will inform the understanding of the role of security-related boredom on ISP compliance practices and offer a few insights into the current body of information systems literature and practitioners’ world.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.