{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T11:02:26Z","timestamp":1768734146772,"version":"3.49.0"},"reference-count":63,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T00:00:00Z","timestamp":1567555200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JEIM"],"published-print":{"date-parts":[[2019,9,4]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>Human factor is often cited as one of the biggest challenges for organizational information security management. The purpose of this paper is to investigate how and why employees fail to carry out required security tasks.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>On the basis of coping theory, this paper develops a theoretical model to examine employee effortful security behavior (ESB). The model is tested with the data collected through a survey of computer users.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The results suggest that employee procrastination of security tasks and psychological detachment from security issues are two antecedents of ESB. Psychological detachment and procrastination are in turn influenced by perceived externalities of security risk and triage of business tasks over security issues by employees.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This paper contributes to the information systems security literature by providing a nuanced understanding of the antecedents and process of how employees cope with security task demands. It also offers some insights for practitioners in terms of the importance of designing and implementing security measures that are viewed as relevant to employees.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jeim-10-2018-0229","type":"journal-article","created":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T10:00:55Z","timestamp":1562580055000},"page":"824-842","source":"Crossref","is-referenced-by-count":16,"title":["It ain\u2019t my business: a coping perspective on employee effortful security behavior"],"prefix":"10.1108","volume":"32","author":[{"given":"Zhengchuan","family":"Xu","sequence":"first","affiliation":[]},{"given":"Ken","family":"Guo","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"1","key":"key2019102413373877300_ref001","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1108\/02683940510571621","article-title":"Positive affect and feedback-giving behavior","volume":"20","year":"2005","journal-title":"Journal of Managerial Psychology"},{"issue":"6","key":"key2019102413373877300_ref002","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1016\/j.cose.2009.01.003","article-title":"The information security digital divide between information security managers and users","volume":"28","year":"2009","journal-title":"Computers & Security"},{"issue":"7","key":"key2019102413373877300_ref003","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1016\/j.paid.2006.10.008","article-title":"Academic procrastination and the role of hope as a coping strategy","volume":"42","year":"2007","journal-title":"Personality and Individual Differences"},{"issue":"2","key":"key2019102413373877300_ref004","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1111\/j.1468-5914.2007.00331.x","article-title":"Understanding procrastination","volume":"37","year":"2007","journal-title":"Journal for the Theory of Social Behaviour"},{"key":"key2019102413373877300_ref005","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","article-title":"Gender difference and employees\u2019 cybersecurity behaviors","volume":"69","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"key2019102413373877300_ref006","doi-asserted-by":"crossref","unstructured":"Barling, J., Kelloway, E.K. and Frone, M.R. (Eds) (2005), Handbook of Work Stress, SAGE, Thousand Oaks, CA.","DOI":"10.4135\/9781412975995"},{"issue":"4","key":"key2019102413373877300_ref007","doi-asserted-by":"crossref","first-page":"689","DOI":"10.2307\/25750701","article-title":"The other side of acceptance: studying the direct and indirect effects of emotions in information technology use","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2019102413373877300_ref008","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.cose.2003.09.002","article-title":"Computer security impaired by legitimate users","volume":"23","year":"2004","journal-title":"Computers & Security"},{"issue":"2","key":"key2019102413373877300_ref009","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1057\/ejis.2009.8","article-title":"If someone is watching, I\u2019ll do what I\u2019m asked: mandatoriness, control, and information security","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"key":"key2019102413373877300_ref010","volume-title":"Cross-Cultural Research Methods","year":"1973"},{"issue":"3","key":"key2019102413373877300_ref011","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study on rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"key":"key2019102413373877300_ref012","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1146\/annurev.psych.093008.100352","article-title":"Personality and coping","volume":"61","year":"2010","journal-title":"Annual Review of Psychology"},{"key":"key2019102413373877300_ref013","unstructured":"Chin, W.W. (1998), \u201cThe partial least squares approach to structural equation modeling\u201d, in Marcoulides, G.A. (Ed.), Modern Methods for Business Research, Lawrence Erlbaum Associates, Mahwah, NJ, pp. 295-336."},{"key":"key2019102413373877300_ref014","doi-asserted-by":"crossref","unstructured":"Chin, W.W. (2010), \u201cHow to write up and report PLS analyses\u201d, in Esposito Vinzi, V., Chin, W.W., Henseler, J. and Wang, H. (Eds), Handbook of Partial Least Squares: Concepts, Methods and Applications, Springer, Berlin, pp. 655-690.","DOI":"10.1007\/978-3-540-32827-8_29"},{"key":"key2019102413373877300_ref015","volume-title":"The 2010\/2011 CSI Computer Crime and Security Survey","author":"Computer Security Institute","year":"2010"},{"issue":"6","key":"key2019102413373877300_ref016","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1111\/j.1540-5915.2012.00383.x","article-title":"Employee misuse of information technology resources: testing a contemporary deterrence model","volume":"43","year":"2012","journal-title":"Decision Sciences"},{"issue":"6","key":"key2019102413373877300_ref017","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1057\/ejis.2011.23","article-title":"A review and analysis of deterrence theory in the IS security literture: making sense of the disparate findings","volume":"20","year":"2011","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"key2019102413373877300_ref018","doi-asserted-by":"crossref","first-page":"285","DOI":"10.2753\/MIS0742-1222310210","article-title":"Understanding employee responses to stressful information security requirements: a coping perspective","volume":"31","year":"2014","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"key2019102413373877300_ref019","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1287\/isre.1070.0160","article-title":"User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach","volume":"20","year":"2009","journal-title":"Information Systems Research"},{"key":"key2019102413373877300_ref020","volume-title":"Coping with Work Stress: A Review and Critique","year":"2010"},{"issue":"4","key":"key2019102413373877300_ref021","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1111\/j.1365-2575.2007.00289.x","article-title":"User behaviour towards protective information technologies: the role of national cultural differences","volume":"19","year":"2009","journal-title":"Information Systems Journal"},{"key":"key2019102413373877300_ref022","volume-title":"A Primer for Soft Modeling","year":"1992","edition":"1st ed."},{"issue":"3","key":"key2019102413373877300_ref023","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1111\/j.1740-8784.2006.00055.x","article-title":"Approaches to scale development in Chinese management research","volume":"2","year":"2006","journal-title":"Management and Organization Review"},{"key":"key2019102413373877300_ref024","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1146\/annurev.psych.55.090902.141456","article-title":"Coping: pitfalls and promise","volume":"55","year":"2004","journal-title":"Annual Review of Psychology"},{"issue":"5","key":"key2019102413373877300_ref025","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1037\/0022-3514.50.5.992","article-title":"Dynamics of a stressful encounter: cognitive appraisal, coping, and encounter outcomes","volume":"50","year":"1986","journal-title":"Journal of Personality and Social Psychology"},{"issue":"1","key":"key2019102413373877300_ref026","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"1","key":"key2019102413373877300_ref027","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1744-6570.2008.00104.x","article-title":"Employee coping with organizational change: an examination of alternative theoretical perspectives and models","volume":"61","year":"2008","journal-title":"Personnel Psychology"},{"key":"key2019102413373877300_ref028","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/j.cose.2012.10.003","article-title":"Security-related behavior in using information systems in the workplace: a review and synthesis","volume":"32","year":"2013","journal-title":"Computers & Security"},{"issue":"6","key":"key2019102413373877300_ref029","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.im.2012.08.001","article-title":"The effects of multilevel sanctions on information security violations: a mediating model","volume":"49","year":"2012","journal-title":"Information & Management"},{"issue":"2","key":"key2019102413373877300_ref030","doi-asserted-by":"crossref","first-page":"203","DOI":"10.2753\/MIS0742-1222280208","article-title":"Understanding nonmalicious security violations in the workplace: a composite behavior model","volume":"28","year":"2011","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"key2019102413373877300_ref031","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","article-title":"Encouraging information security behaviors in organizations: role of penalties, pressures, and perceived effectiveness","volume":"47","year":"2009","journal-title":"Decision Support Systems"},{"issue":"2","key":"key2019102413373877300_ref032","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","article-title":"Protection motivation an deterrence: a framework for security policy compliance in organizations","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"key2019102413373877300_ref033","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.im.2011.12.005","article-title":"Applying an extended model of deterrence across cultures: an investigation of information systems misuse in the US and South Korea","volume":"49","year":"2012","journal-title":"Information & Management"},{"issue":"4","key":"key2019102413373877300_ref034","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1111\/j.1540-5915.2012.00361.x","article-title":"Managing employee compliance with information security policies: the critical role of top management and organizational culture","volume":"43","year":"2012","journal-title":"Decision Sciences"},{"issue":"6","key":"key2019102413373877300_ref035","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/1953122.1953142","article-title":"Does deterrence work in reducing information security policy abuse by employees?","volume":"54","year":"2011","journal-title":"Communications of the ACM"},{"issue":"1","key":"key2019102413373877300_ref036","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory","volume":"31","year":"2012","journal-title":"Computers & Security"},{"issue":"2","key":"key2019102413373877300_ref037","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/S0268-4012(02)00105-6","article-title":"An integrative study of information systems security effectiveness","volume":"23","year":"2003","journal-title":"International Journal of Information Management"},{"issue":"4","key":"key2019102413373877300_ref038","doi-asserted-by":"crossref","first-page":"704","DOI":"10.5465\/amj.2009.43669916","article-title":"Balancing borders and bridges: negotiating the work-home interface via boundary work tactics","volume":"52","year":"2009","journal-title":"Academy of Management Journal"},{"issue":"3","key":"key2019102413373877300_ref039","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1097\/00006842-199305000-00002","article-title":"Coping theory and research: past, present, and future","volume":"55","year":"1993","journal-title":"Psychosomatic Medicine"},{"key":"key2019102413373877300_ref040","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1146\/annurev.ps.44.020193.000245","article-title":"From psychological stress to the emotions: a history of changing outlooks","volume":"44","year":"1993","journal-title":"Annual Review of Psychology"},{"key":"key2019102413373877300_ref041","volume-title":"Stress, Appraisal, and Coping","year":"1984"},{"issue":"1","key":"key2019102413373877300_ref042","doi-asserted-by":"crossref","first-page":"71","DOI":"10.2307\/20650279","article-title":"Avoidance of information technology threats: a theoretical perspective","volume":"33","year":"2009","journal-title":"MIS Quarterly"},{"issue":"7","key":"key2019102413373877300_ref043","doi-asserted-by":"crossref","first-page":"394","DOI":"10.17705\/1jais.00232","article-title":"Understanding security behaviors in personal computer usage: a threat avoidance perspective","volume":"11","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"issue":"12","key":"key2019102413373877300_ref044","doi-asserted-by":"crossref","first-page":"1865","DOI":"10.1287\/mnsc.1060.0597","article-title":"Common method variance in IS research: a comparison of alternative approaches and a reanalysis of past research","volume":"52","year":"2006","journal-title":"Management Science"},{"key":"key2019102413373877300_ref045","volume-title":"Principles of Economics","year":"2009","edition":"6th ed."},{"issue":"2","key":"key2019102413373877300_ref046","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1057\/ejis.2009.10","article-title":"What levels of moral reasoning and values explain adherence to information security rules? An empirical study","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"key2019102413373877300_ref047","doi-asserted-by":"crossref","first-page":"105","DOI":"10.2307\/25148783","article-title":"Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2019102413373877300_ref048","doi-asserted-by":"crossref","first-page":"59","DOI":"10.5465\/amr.1998.192960","article-title":"Reframing crisis management","volume":"23","year":"1998","journal-title":"Academy of Management Review"},{"issue":"4","key":"key2019102413373877300_ref049","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1177\/014920638601200408","article-title":"Self-reports in organizational research: problems and prospects","volume":"12","year":"1986","journal-title":"Journal of Management"},{"issue":"5","key":"key2019102413373877300_ref050","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: a critical review of the literature and recommended remedies","volume":"88","year":"2003","journal-title":"Journal of Applied Psychology"},{"issue":"3","key":"key2019102413373877300_ref051","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.cose.2006.10.004","article-title":"Evaluating information security tradeoff: restricting access can interfere with user tasks","volume":"26","year":"2007","journal-title":"Computers & Security"},{"key":"key2019102413373877300_ref052","volume-title":"SmartPLS 2.0 (M3) Beta","year":"2005"},{"issue":"3","key":"key2019102413373877300_ref053","doi-asserted-by":"crossref","first-page":"487","DOI":"10.2307\/25750688","article-title":"Neutralization: new insight into the problem of employee information systems security policy violation","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2019102413373877300_ref054","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1037\/1076-8998.10.4.393","article-title":"Switching off mentally: predictors and consequences of psychological detachment from work during off-job time","volume":"10","year":"2005","journal-title":"Journal of Occupational Health Psychology"},{"issue":"3","key":"key2019102413373877300_ref055","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1037\/1076-8998.12.3.204","article-title":"The recovery experience questionnaire: development and validation of a measure for assessing recuperation and unwinding from work","volume":"12","year":"2007","journal-title":"Journal of Occupational Health Psychology"},{"issue":"1","key":"key2019102413373877300_ref056","first-page":"77","article-title":"Information security policies in the UK healthcare sector: a critical evaluation","volume":"22","year":"2011","journal-title":"Information Systems Journal"},{"issue":"1","key":"key2019102413373877300_ref057","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1037\/0033-2909.133.1.65","article-title":"The nature of procrastination: a meta-analytic and theoretical review of quintessential self-regulatory failure","volume":"133","year":"2007","journal-title":"Psychological Bulletin"},{"issue":"1","key":"key2019102413373877300_ref058","first-page":"380","article-title":"Validation guidelines for IS positivist research","volume":"13","year":"2004","journal-title":"Communications of the Association for Information Systems"},{"issue":"3","key":"key2019102413373877300_ref059","doi-asserted-by":"crossref","first-page":"303","DOI":"10.2753\/MIS0742-1222270311","article-title":"Impact of technostress on end-user satisfaction and performance","volume":"27","year":"2010","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"key2019102413373877300_ref060","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1111\/1464-0597.00021","article-title":"Procrastination: self-regulation in initiating aversive goals","volume":"49","year":"2000","journal-title":"Applied Psychology: An International Review"},{"issue":"3","key":"key2019102413373877300_ref061","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1037\/0021-9010.74.3.462","article-title":"Lack of method variance in self-reported affect and perceptions at work: reality or artifact?","volume":"74","year":"1989","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"key2019102413373877300_ref062","doi-asserted-by":"crossref","first-page":"1","DOI":"10.25300\/MISQ\/2013\/37.1.01","article-title":"Beyond deterrence: an expanded view of employee computer abuse","volume":"37","year":"2013","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2019102413373877300_ref063","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1207\/s15327663jcp1403_11","article-title":"Coping with negative emotions in purchase-related situations","volume":"14","year":"2004","journal-title":"Journal of Consumer Psychology"}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-10-2018-0229\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-10-2018-0229\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:32:13Z","timestamp":1753396333000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jeim\/article\/32\/5\/824-842\/198668"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,4]]},"references-count":63,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,9,4]]}},"alternative-id":["10.1108\/JEIM-10-2018-0229"],"URL":"https:\/\/doi.org\/10.1108\/jeim-10-2018-0229","relation":{},"ISSN":["1741-0398"],"issn-type":[{"value":"1741-0398","type":"print"}],"subject":[],"published":{"date-parts":[[2019,9,4]]}}}