{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T08:25:47Z","timestamp":1771575947848,"version":"3.50.1"},"reference-count":79,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T00:00:00Z","timestamp":1649203200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100016152","name":"Yayasan UTP","doi-asserted-by":"publisher","award":["015LCO-171"],"award-info":[{"award-number":["015LCO-171"]}],"id":[{"id":"10.13039\/501100016152","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:p> Information security is one of the most crucial considerations in digitising Oil and Gas (O&amp;G) organisations. For ensuring information security policy compliance, O&amp;G organisations enforce heavy security requirements. The purpose of this article is to assess how O&amp;G employees cope with stressful information security tasks and how security-related stress (SRS) is related to information security policy violations among O&amp;G employees in developing countries. Based on the coping theory, this article develops a theoretical framework to examine O&amp;G employees\u2019 intention to violate information security policies. The framework is tested using a survey of 270 managers\/executives from 150 Malaysian O&amp;G organisations. The results indicated that O&amp;G employees perceive security requirements as stressful to follow and adopt avoidance coping strategies that lead them to violate organisational information security policies. For practitioners, the study findings demonstrate the prevalence of technostress in O&amp;G organisations and suggest alternative mechanisms to address the stressful effects of information security requirements. This article contributes to the information system security literature by testing procrastination and psychological detachment with SRS in the context of developing countries' O&amp;G organisations\u2019 employees and provides an understanding of how O&amp;G employees adopt avoidance coping. <\/jats:p>","DOI":"10.1177\/01655515221087680","type":"journal-article","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T06:31:41Z","timestamp":1649313101000},"page":"254-272","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":10,"title":["Investigation of information security policy violations among oil and gas employees: A security-related stress and avoidance coping perspective"],"prefix":"10.1177","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0701-6761","authenticated-orcid":false,"given":"Rao Faizan","family":"Ali","sequence":"first","affiliation":[{"name":"Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2496-1311","authenticated-orcid":false,"given":"PDD","family":"Dominic","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Malaysia"}]}],"member":"179","published-online":{"date-parts":[[2022,4,6]]},"reference":[{"key":"bibr1-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1007\/s10308-013-0355-5"},{"key":"bibr2-01655515221087680","doi-asserted-by":"publisher","DOI":"10.3390\/sym12111882"},{"issue":"2","key":"bibr3-01655515221087680","first-page":"86","volume":"7","author":"Ra\u2019ed MJ","year":"2014","journal-title":"Int J Crit Infr Prot"},{"key":"bibr4-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.01.003"},{"key":"bibr5-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007960"},{"key":"bibr6-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1108\/09685220810908796"},{"key":"bibr7-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-08-2016-0198"},{"key":"bibr8-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2979678"},{"key":"bibr9-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.01.011"},{"key":"bibr10-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-04-2016-0021"},{"key":"bibr11-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.06.007"},{"issue":"1","key":"bibr12-01655515221087680","first-page":"27","volume":"11","author":"Mukosolu O","year":"2015","journal-title":"Malays J Med Health Sci"},{"issue":"2","key":"bibr13-01655515221087680","first-page":"66","volume":"16","author":"Mohd Zukri I","year":"2010","journal-title":"J Community Health"},{"issue":"10","key":"bibr14-01655515221087680","first-page":"534","volume":"4","author":"Sathasivam K","year":"2014","journal-title":"J Asian Sci Res"},{"key":"bibr15-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.02.006"},{"key":"bibr16-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-10-2018-0229"},{"issue":"1","key":"bibr17-01655515221087680","first-page":"1275","volume":"63","author":"Ali RF","year":"2020","journal-title":"Solid State Technol"},{"key":"bibr18-01655515221087680","doi-asserted-by":"publisher","DOI":"10.3390\/su12208576"},{"key":"bibr19-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2016.09.017"},{"key":"bibr20-01655515221087680","volume-title":"16 annual report 2019\/2020","author":"MOGSC","year":"2020"},{"key":"bibr21-01655515221087680","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"bibr22-01655515221087680","volume-title":"The top ten cyber security vulnerabilities in oil and gas industry","author":"Winther T.","year":"2017"},{"key":"bibr23-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011079180"},{"issue":"5","key":"bibr24-01655515221087680","first-page":"64","volume":"4","author":"Salleh AL","year":"2008","journal-title":"Int Rev Bus Res Pap"},{"issue":"1","key":"bibr25-01655515221087680","first-page":"121","volume":"8","author":"Ahsan N","year":"2009","journal-title":"Eur J Soc Sci"},{"issue":"17","key":"bibr26-01655515221087680","first-page":"257","volume":"8","author":"Syed Ismail S","year":"2014","journal-title":"Aust J Basic Appl Sci"},{"key":"bibr27-01655515221087680","volume-title":"Proceedings of the twenty-fifth Americas conference on information systems","author":"Ifinedo P."},{"key":"bibr28-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.01.003"},{"key":"bibr29-01655515221087680","volume-title":"Proceedings of the European! Conference on information systems","author":"May J"},{"key":"bibr30-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.erss.2019.01.020"},{"key":"bibr31-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.jdeveco.2019.102388"},{"key":"bibr32-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43999-6_2"},{"key":"bibr33-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1037\/a0016752"},{"key":"bibr34-01655515221087680","unstructured":"Schweizerische S.I.I.I.S.O. Information technology \u2013 security techniques \u2013 information security management systems \u2013 requirements, 2013, https:\/\/eldritchdata.neocities.org\/PDF\/CS\/SecManagmentSystemsReq.pdf"},{"key":"bibr35-01655515221087680","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00232"},{"key":"bibr36-01655515221087680","doi-asserted-by":"publisher","DOI":"10.2307\/25750701"},{"key":"bibr37-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2006.10.008"},{"key":"bibr38-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1037\/1076-8998.10.4.393"},{"key":"bibr39-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1207\/s15327663jcp1403_11"},{"key":"bibr40-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-08-2017-0057"},{"key":"bibr41-01655515221087680","doi-asserted-by":"publisher","DOI":"10.2307\/2089195"},{"key":"bibr42-01655515221087680","doi-asserted-by":"publisher","DOI":"10.2307\/25750688"},{"key":"bibr43-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1177\/001316447003000308"},{"key":"bibr44-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.lrp.2013.01.001"},{"key":"bibr45-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.103212"},{"key":"bibr46-01655515221087680","volume-title":"SmartPLS 3","author":"Ringle CM","year":"2015"},{"key":"bibr47-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1287\/isre.14.2.189.16018"},{"key":"bibr48-01655515221087680","doi-asserted-by":"publisher","DOI":"10.4018\/ijec.2015100101"},{"key":"bibr49-01655515221087680","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00302"},{"key":"bibr50-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"bibr51-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1108\/EJM-10-2018-0665"},{"key":"bibr52-01655515221087680","volume-title":"Partial least squares structural equation modeling (PLS-SEM) using smartPLS 3.0: An updated guide and practical guide to statistical analysis","author":"Ramayah T","year":"2018"},{"key":"bibr53-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"issue":"2","key":"bibr54-01655515221087680","first-page":"315","volume":"2","author":"Chin WW.","year":"1998","journal-title":"Technol Stud"},{"key":"bibr55-01655515221087680","unstructured":"Chin W. Partial least squares for IS researchers: an overview and presentation of recent advances using the PLS approach. In: Proceedings of the ICIS, Brisbane, QLD, Australia, 27\u201329 January 2000."},{"key":"bibr56-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"bibr57-01655515221087680","volume-title":"Social research methods","author":"Bryman A.","year":"2016"},{"key":"bibr58-01655515221087680","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-016-0814-1"},{"key":"bibr59-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-04-2016-0130"},{"key":"bibr60-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.jwb.2016.12.003"},{"key":"bibr61-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1108\/EBR-10-2013-0128"},{"key":"bibr62-01655515221087680","volume-title":"Statistical power analysis for the behavioral sciences","author":"Cohen J.","year":"1988","edition":"2"},{"key":"bibr63-01655515221087680","volume-title":"Coping with work stress: a review and critique","author":"McLeod J.","year":"2011","edition":"2"},{"key":"bibr64-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2019.1672410"},{"key":"bibr65-01655515221087680","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.00243"},{"key":"bibr66-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.133.1.65"},{"key":"bibr67-01655515221087680","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2009.43669916"},{"key":"bibr68-01655515221087680","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.01"},{"key":"bibr69-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.024"},{"key":"bibr70-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2021.1014"},{"key":"bibr71-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102222"},{"key":"bibr72-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102152"},{"key":"bibr73-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101594"},{"key":"bibr74-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.12.005"},{"key":"bibr75-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.10.031"},{"key":"bibr76-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.01.008"},{"key":"bibr77-01655515221087680","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.2019040106"},{"key":"bibr78-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.leaqua.2009.03.011"},{"key":"bibr79-01655515221087680","doi-asserted-by":"publisher","DOI":"10.1016\/j.erss.2021.101918"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515221087680","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/01655515221087680","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515221087680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T02:53:37Z","timestamp":1740797617000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/01655515221087680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,6]]},"references-count":79,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["10.1177\/01655515221087680"],"URL":"https:\/\/doi.org\/10.1177\/01655515221087680","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,6]]}}}