論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus:開放下載的時間 available 2025-07-29
校外 Off-campus:開放下載的時間 available 2025-07-29
論文名稱 Title |
探討資訊安全疲勞的成因與降低方法 Understanding the Cause and Reduction Method of Information Security Fatigue |
||
系所名稱 Department |
|||
畢業學年期 Year, semester |
語文別 Language |
||
學位類別 Degree |
頁數 Number of pages |
80 |
|
研究生 Author |
|||
指導教授 Advisor |
|||
召集委員 Convenor |
|||
口試委員 Advisory Committee |
|||
口試日期 Date of Exam |
2022-07-28 |
繳交日期 Date of Submission |
2022-07-29 |
關鍵字 Keywords |
資訊安全、資訊安全疲勞、工作要求資源理論、資安承諾、資訊安全意識 Information Security, Information Security Fatigue, Job Demands-Resources, Information Security Commitment, Information Security Awareness |
||
統計 Statistics |
本論文已被瀏覽 299 次,被下載 0 次 The thesis/dissertation has been browsed 299 times, has been downloaded 0 times. |
中文摘要 |
資訊安全一直都是非常重要的議題,且隨著時間與科技技術的發展,資訊安全事件所能造成的影響已經不容小覷,從以前影響組織企業到現在社會、國家、全球等,這也是大眾必須要面對的課題。現在雖然也有許多資安廠商協助或是有許多設備可以協助管理資訊安全,或是國際或是第三方的資訊安全認證機構等,但最大的漏洞危害依舊是人,人為疏失因素依舊是整體中佔比最多,也是一直有在研究探討的。 由於在2019年開始爆發的全球Covid19疫情,學者發現社會上出現「防疫疲勞」的現象,主要是民眾知道防疫非常重要,但長期管控導致大眾對於防疫產生一種疲勞,導致開始有越來越多違反防疫規則的情形。因此疲勞一詞的概念能否也能應用於資訊安全上,而解釋過往尚未被發現的現象成因?在這議題上,國外已有學者透過質性研究新提出「資訊安全疲勞」的概念來探討違反資訊安全規則的行為。因此本研究將國外資訊安全疲勞的研究進行量化驗證,並探討可降低疲勞或是預防違規行為的因素。 研究透過JD-R模型來驗證與降低或預防的因素,並採取線上問卷方式,共計回收260份有效問卷,經統計分析量表皆具有有效的信效度。結果顯示資訊安全疲勞在JD-R模型下量化結果是有效的。雖然資源與承諾兩者無法降低疲勞,但資源可以提高承諾並且進一步減少違規行為的發生。根據本研究結果所提出的理論與實務貢獻,以提供資訊安全的規劃、評估與預防之幫助依據。 |
Abstract |
Information security has always been a very important topic, and with the development of time and technology, the impact of information security incidents can’t be underestimated, from the previous impact on organizations and enterprises to the current society, country, worldwide, etc., which is also everyone must take information security seriously. Now although there are also many security vendors to assist or there is much equipment to help manage information security, or international or third-party information security certification agencies, etc., the biggest vulnerability hazard is still human, human negligence factors are still the largest proportion of the whole, but also has been in the research and discussion. Due to the global Covid19 epidemic that began to break out in 2019, scholars have found that the phenomenon of "epidemic prevention fatigue" in society is mainly because the public knows that epidemic prevention is very important, but long-term control has led to a kind of fatigue of the public for epidemic prevention, resulting in more and more violations cases of epidemic prevention rules. So, can the concept of fatigue also be applied to information security to explain the causes of phenomena that have not been discovered in the past? On this topic, foreign scholars have proposed the concept of "information security fatigue" through qualitative research to explore violations of information security rules. Therefore, this study will quantitatively verify the research on foreign information security fatigue and explore the factors that can reduce fatigue or prevent violations. The study used the JD-R model to verify and reduce or prevent factors and adopted an online questionnaire to collect a total of 260 valid questionnaires, all of which had effective reliability and validity through statistical analysis scales. The results show that information safety fatigue is valid for quantifying the results under the JD-R model. While both resources and commitments can’t reduce fatigue, resources can increase commitments and further reduce the occurrence of violations. Theoretical and practical contributions based on the results of this study to provide a basis for the planning, evaluation and prevention of information security. |
目次 Table of Contents |
論文審定書 i 致謝 ii 摘要 iii Abstract iv 圖 目 錄 viii 表 目 錄 ix 第一章 緒論1 第一節 研究背景1 第二節 研究動機3 第三節 研究目的4 第四節 研究流程5 第二章 文獻探討7 第一節 工作要求資源理論7 第二節 資訊安全疲勞13 第三節 資訊安全承諾16 第三章 研究方法19 第一節 研究模型與假說19 第二節 構面定義與衡量29 第三節 問卷設計35 第四章 資料分析36 第一節 樣本基本資料分析36 第二節 模型衡量38 第三節 模型驗證與假說45 第五章 結論與建議47 第一節 研究結果與討論47 第二節 理論貢獻(意涵)49 第三節 實務貢獻(意涵)50 第四節 研究限制51 第五節 未來方向51 參考文獻52 附錄.本研究正式問卷61 |
參考文獻 References |
Albrechtsen, E., & Hovden, J. (2010). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers & Security, 29(4), pp. 432-445. doi:10.1016/j.cose.2009.12.005 Alnaimi, A. M., & Rjoub, H. (2021). Perceived organizational support, psychological entitlement, and extra-role behavior: The mediating role of knowledge hiding behavior. Journal of Management & Organization, 27(3), pp. 507–522. doi:10.1017/jmo.2019.1 Aminanto, M., Zhu, L., Ban, T., Isawa, R., Takahashi, T., & Inoue , D. (2019). Combating threat-alert fatigue with online anomaly detection using isolation forest. Neural Information Processing, 11953, pp. 756-765. doi:10.1007/978-3-030-36708-4_62 Angle, H., & Perry, J. (1981). An Empirical Assessment of Organizational Commitment and Organizational Effectiveness. Administrative Science Quarterly, 26(1), pp. 1-14. doi:10.2307/2392596 Anttila, E. (2014). Components of Organization: A case study consisting line managers from Finnish industrial company. University of Tampere School of Education. Bada, M., Sasse, A., & Nurse, J. (2015). Cyber Security Awareness Campaigns: Why do they fail to change behaviour? International Conference on Cyber Security for Sustainable Society 2015 Conference paper, 118(31). Bakker, A., & De Vries, J. (2020). Job Demands–Resources theory and self-regulation: new explanations and remedies for job burnout. Anxiety, Stress, and Coping, 34(5), pp. 1-21. doi:10.1080/10615806.2020.1797695 Bakker, A., & Demerouti, E. (2007). The Job Demands-Resources model: State of the art. Journal of Managerial Psychology, 22(3), pp. 309-328. doi:10.1108/02683940710733115 Bakker, A., & Demerouti, E. (2014). Job demands–resources theory. (P. Y. Chen, & C. L. Cooper, Eds.) Work and wellbeing, pp. 37-64. doi:10.1002/9781118539415.wbwell019 Bakker, A., & Demerouti, E. (2017). Job Demands–Resources Theory: Taking Stock and Looking Forward. Journal of Occupational Health Psychology, 22(3), pp. 273-285. doi:10.1037/ocp0000056 Bakker, A., Demerouti, E., & Verbeke, W. (2004). Using the Job Demands–Resources Model to Predict Burnout and Performance. Human Resource Management, 43(1), pp. 83-104. doi:10.1002/hrm.20004 Bakker, A., Demerouti, E., de Boer, E., & Shaufeli, W. (2003). Job demands and job resources as predictors of absence duration and frequency. Journal of Vocational Behavior, 62(2), pp. 341-356. doi:10.1016/S0001-8791(02)00030-1 Bakker, A., van der Zee, K., Lewig, K., & Dollard, M. (2006). The relationship between the Big Five personality factors and burnout: a study among volunteer counselors. Journal of Social Psychology, 146(1), pp. 31-50. Bakker, A., Veldhoven, M., & Xanthopoulou, D. (2010). Beyond the Demand-Control Model: Thriving on High Job Demands and Resources. Journal of Personnel Psychology, 9(1). doi:10.1027/1866-5888/a000006 Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. 84(2), p. 191. Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory: Prentice-Hall. Inc. Bandura, A., & Wood, R. (1989). Effect of perceived controllability and performance standards on self-regulation of complex decision making. 56(5), p. 805. Barbier, M., Hansez, I., Chmiel, N., & Demerouti, E. (2013). Performance expectations, personal resources, and job resources: How do they predict work engagement? European Journal of Work and Organizational Psychology, 22(6), pp. 750-762. doi:10.1080/1359432X.2012.704675 Bartley, S., & Chute, E. (1974). Fatigue and impairment in man. McGraw-Hill Book Company. doi:10.1037/11772-000 Baumeister, R. (2002a). Ego depletion and self-control failure: An energy model of the self's executive function. Self and Identity, 1(2), pp. 129-136. Bianco, T., & Eklund, R. (2001). Conceptual considerations for social support research in sport and exercise settings: The case of sport injury. Journal of Sport & Exercise Psychology, 23, pp. 85-107. Boksem, M., & Tops, M. (2008). Mental fatigue: costs and benefits. 59(1), pp. 125-139. Boss, S., Kirsch, L., Angermeier, I., Shingler, R., & Boss, R. (2009). If someone is watching, I'll do what I'm asked:Mandatoriness, control, and information security. European Journal of Information Systems, 18(2), pp. 151-164. Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010, 10). Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly, pp. 523-548. Cavusoglu, H., J.-Y, S., & I., B. (2009). Information Security Control Resources in Organizations: A Multidimensional View and Their Key Drivers. Chalder, T., Berelowitz, G., Pawlikowska, T., Watts, L., Wessely, S., Wright, D., & Wallace, E. (1993). Development of a fatigue scale. 37(2), pp. 147-153. Chen, H., & Li, W. (2014). Understanding Organization Employee's Information Security Omission Behavior: an Integrated Model of Social norm and Deterrence. Proceedings of PACIS. Chen, M., Woon, I., & Kankanhalli, A. (2005). Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior. Journal of Information Privacy and Security, 1(3), pp. 18-41. doi:doi.org/10.1080/15536548.2005.10855772 Cheung, C., Zhang, R., Cui, Q., & Hsu, S.-C. (2021). The antecedents of safety leadership: The job demands-resources model. Safety Science, 133. doi:10.1016/j.ssci.2020.104979 Chin, W. (1998). The Partial Least Squares Approach to Structural Equation Modeling. Modern methods for business research, 295(2), pp. 295-336. Cobb, S. (1976). Social support as a moderator of life stress. Psychosomatic medicine. Cohen, J., Cohen, P., West, S., & Aiken, L. (2013). Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences. Cook, J., & Wall, T. (1980). New Work Attitude Measures of Trust, Organizational Commitment and Personal Need Non-Fulfilment. 53, pp. 39-52. Cram, W., Proudfoot, J., & D'Arcy, J. (2020). When enough is enough: Investigating the antecedents and consequences of information security fatigue. pp. 1-29. D’Arcy, J., & Teh, P.-L. (2019). Predicting employee information security policy compliance on a daily basis: The interplay of security-relatedstress, emotions, and neutralization. Information Management, 56, pp. 103-151. Danziger, S., Levav, J., & Avnaim-Pesso, L. (2011). Extraneous factors in judicial decisions. Proceedings of the National Academy of Sciences, 108(17), pp. 6889–6892. doi:10.1073/pnas.1018033108 Davis, J., Agrawal, D., & Guo, X. (2021). Enhancing users’ security engagement throughcultivating commitment: the role of psychologicalneeds fulfilment. European Journal of Information Systems. Dejoy, D. (1996). Theoretical models of health behavior and workplace self-protection. Journal of Safety Research, 27(2), pp. 61-72. Demerouti, E., & Bakker, A. (2011). The Job Demands–Resources Model: Challenges for Future Research. SA Journal of Industrial Psychology, 37(2). doi:10.4102/sajip.v37i2.974 Demerouti, E., Bakker, A., Nachreiner, F., & Schaufeli, W. (2001). The job demands-resources model of burnout. 86(3), pp. 499-512. Dhillon, G. (2001). Violations of safegaurds by trusted personnel and understanding related information security concerns. pp. 165-172. Dhillon, G. (2007). Principles of Information Systems Security: text and cases. New Jersey: John Wiley & Sons. Dhillon, G., & Backhouse, J. (2000). Information system security management in the new millennium. 2000(43), pp. 125-128. Diamantopoulos, A., & Siguaw, J. (2006). Formative Versus Reflective Indicators in Organizational Measure Development: A Comparison and Empirical Illustration. 17(4), pp. 263-282. doi:10.1111/j.1467-8551.2006.00500.x Döbler, A.-S., Emmermacher, A., Richter-Killenberg, S., Nowak, J., & Wegge, J. (2022). New insights into self-initiated work design: the role of job crafting, self-undermining and five types of job satisfaction for employee’s health and work ability. German Journal of Human Resource Management: Zeitschrift für Personalforschung, 36(2), pp. 113-147. doi:10.1177/23970022211029023 Eisenberger, R., Armeli, S., Rexwinkel, B., Lynch, P., & Rhoades, L. (2001). Reciprocation of perceived organizational support. Journal of Applied Psychology, 86(1), pp. 42-51. Eisenberger, R., Huntington, R., Hutchison, S., & Sowa, D. (1986). Perceived supervisor support. Journal of Applied Psychology, 71(3), pp. 500-507. doi:10.1037/0021-9010.71.3.500 Eisenberger, R., Stinglhamber, F., Vandenberghe, C., Sucharski, I., & Rhoades, L. (2002). Perceived supervisor support: Contributions to perceived organizational support and employee retention. Journal of Applied Psychology, 87(3), pp. 565-573. doi:10.1037/0021-9010.87.3.565 Fida, R., Paciello, M., Tramontano, C., Fontaine, R., Barbaranelli, C., & Farnese, M. (2015). An integrative approach to understanding counterproductive work behavior: The roles of stressors, negative emotions, and moral disengagement. Journal of Business Ethics, 130(1), pp. 131-144. Ford, M., Heinen, B., & Langkamer, K. (2007). Work and family satisfaction Work and family satisfaction. Journal of applied psychology, 92(1), p. 57. Fornell, C., & Larcker, D. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, pp. 39-50. doi:10.2307/3151312 Fornell, C., & Larcker, D. (1981). Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics. Journal of Marketing Research, 18(3), pp. 382-388. doi:10.2307/3150980 Freudenberger, H. (1974). Staff Burn-Out. pp. 159-165. doi:10.1111/j.1540-4560.1974.tb00706.x Frins, W., Van Ruysseveldt, J., van Dam, K., & van den Bossche , S. (2016). Older employees’ desired retirement age: a JD-R perspective. 31(1), pp. 34-49. Goldenhar, L., Williams, L., & Swanson, N. (2003). Modelling relationships between job stressors and injury and near-miss outcomes for construction labourers. Work & Stress, 17(3), pp. 218-240. Gonzalez, T., & Guillen, M. (2008). Organizational Commitment: A Proposal for a Wider Ethical Conceptualization of “Normative Commitment”. The Journal of Business Ethics, 78, pp. 401-414. doi:10.1007/s10551-006-9333-9 González-Romá, V., Peiró, J., & Tordera, N. (2002). An examination of the antecedents and moderator influences of climate strength. Journal of Applied Psychology, 87, pp. 465-473. doi:10.1037/0021-9010.87.3.465 Grandey, A., & Gabriel, A. (2015). Emotional Labor at a Crossroads: Where Do We Go from Here? Annual Review of Organizational Psychology and Organizational Behavior, 2(1), pp. 323-349. doi:10.1146/annurev-orgpsych-032414-111400 Grover, S., Teo, S., Pick, D., & Roche, M. (2016). Mindfulness as a personal resource to reduce work stress in the job demands-resources model. Stress and Health, 33(4), pp. 426-436. doi:10.1002/smi.2726 Haeussinger, F., & Kranz, J. (2013). Information security Awareness: Its antecedents and mediating effects on security compliant behavior. Proceedings of the International Conference on Information Systems. Haeussinger, F., & Kranz, J. (2017). Antecedents of employees information security awareness-review, synthesis, and directions for future research. Hair, J., Black, W., Babin, B., & Anderson, R. (2009). Multivariate Data Analysis (7th ed ed.). Hill, S., Bahniuk, M., Dobos, J., & Rouner, D. (1989). Mentoring and other communication support in the academic setting. Group & Organization Studies, 14(3), pp. 355-368. Hobfoll, S. (1989). Conservation of resources: A new attempt at conceptualizing stress. American Psychologist, 44(3), pp. 513-524. doi:10.1037/0003-066X.44.3.513 Hobfoll, S., Johnson, R., Ennis, N., & Jackson, A. (2003). Resource Loss, Resource Gain, and Emotional Outcomes Among Inner City Women. Journal of Personality and Social Psychology, 84(3), pp. 632-643. doi:10.1037/0022-3514.84.3.632 Hobfoll, S., Johnson, R., Ennis, N., & Jackson, A. (2003). Resource loss, resource gain, and emotional outcomes among inner city women. Journal of Personality and Social Psychology, 84, pp. 632-643. doi:10.1037/0022-3514.84.3.632 Hockey, G. (1993). Cognitive-energetical control mechanisms in the management of work demands and psychological health. (A. Baddeley , & L. Weiskrantz , Eds.) Attention, selection, awareness, and control: A tribute to donald broadbent, pp. 328-345. House, J. (1981). Work stress and social support: Addison-Wesley Publishing Company Reading. MA. Huang, Y., Chen, J., DeArmond, S., Cigularov, K., & Chen, P. (2007). Roles of safety climate and shift work on perceived injury risk. Accident Analysis and Prevention, 39, pp. 1088-1096. Huang, Y., Ho, M., Smith, G., & Chen, P. (2006). Safety climate and self-reported injury: assessing the mediating role of employee safety control. Accident Analysis and Prevention, 38, pp. 425-433. Izutsu, T., Tsutsumi, A., Asukai, N., Kurita, H., & Kawamura, N. (2003). Relationship between a traumatic life event and an alteration in stress response. Stress Health, 20, pp. 65-73. Johnson, J., Hall, E., & Theorell, T. (1989). Combined effects of job strain and social isolation on cardiovascular disease morbidity and mortality in a random sample of the Swedish male working population. Scandinavian Journal of Work, Environment & Health, 15(4), pp. 271-279. doi:10.5271/sjweh.1852 Judge, T., Bono, J., Erez, A., & Locke, E. (2005). Core self-evaluations and job and life satisfaction: The role of self-concordance and goal attainment. Journal of Applied Psychology, 90, pp. 257-268. doi:10.1037/0021-9010.90.2.257 Karasek, R. (1979). Job Demands, Job Decision Latitude, and Mental Strain: Implications for Job Redesign. Administrative Science Quarterly, 24(2), pp. 285-308. doi:10.2307/2392498 Kelman, H. (1958). Compliance, identification, and internalization: Three processes of attitude change. Journal of Conflict Resolution, 2(1), pp. 51-60. doi:10.1177/ 002200275800200106 Khando, K., Gao, S., lslam, S., & Salman, A. (2021, 7). Enhancing employees information security awareness in private and public organisations: A systematic literature review. Computers & Security, 106. doi:10.1016/j.cose.2021.102267 Kickul, J., & Posig, M. (2001). Supervisory emotional support and burnout: An explanation of reverse buffering effects. Journal of Managerial Issues, pp. 328-344. Klein, J., Smith, N., & John, A. (2004). Why We Boycott: Consumer Motivations for Boycott Participation. Journal of Marketing, 68(3), pp. 92-109. doi:10.1509/jmkg.68.3.92.34770 Kossek, E., Pichler, S., Bodner, T., & Hammer, L. (2011). Workplace social Workplace support and work–family conflict: A meta-analysis clarifying the influence of general and work–family-specific supervisor and organizational support. Personnel psychology, 64(2), pp. 289-313. Kottke, J., & Sharafinski, C. (1988). Measuring perceived supervisory and organizational support. Educational and Psychological Measurement, 48(4), pp. 1075-1079. doi:10.1177/0013164488484024 Kulikowski, K. (2021). Cognitive abilities - a new direction in burnout research. European Journal of Work and Organizational Psychology, 30(5), pp. 705-719. doi:10.1080/1359432X.2020.1841284 LaManna, M. (2017). Technology intercepts for cyber security applied to critical infrastructures. WMSCI, pp. 8-11. Lartey, K., Li, M., Botchey, F., & Qin, Z. (2021). Human factor, a critical weak point in the information security of an organization's Internet of things. Heliyon, 7(3). doi:10.1016/j.heliyon.2021.e06522 Lee, Y.-L., & Guo, M. (2012). Metal Fatigue Analysis Handbook. doi:10.1016/B978-0-12-385204-5.00002-1 Luqman, A., Cao, X., Masood, A., Ali, A., & Yu, L. (2017). Empirical investigation of Facebook discontinues usage intentions based on SOR paradigm. Computers in Human Behavior, 70, pp. 544-555. doi:10.1016/j.chb.2017.01.020 Luthans, F., Avolio, B., Avey, J., & Norman, S. (2007). Positivepsychological capital: Measurement and relationship with performance and satisfaction. Personnel Psychology, 60(3), pp. 541–572. doi:10.1111/j.1744-6570.2007.00083.x Maas, E., De Bie, J., Vanfleteren, R., Hoogkamer, W., & Vanwanseele, B. (2018). Novice runners show greater changes in kinematics with fatigue compared with competitive runners. Sports Biomechanics, 17(3), pp. 350-360. doi:10.1080/14763141.2017.1347193 Marcoulides, G. (1998). Modern Methods for Business Research. Psychology Press. Maslach, C., & Jackson, S. (1981). The measurement of experienced burnout. Journal of Occupational Behavior, 2, pp. 99-113. Maslach, C., Schaufeli, W., & Leiter, M. (2001). Job burnout. Annual Review of Psychology, 52, pp. 397-422. doi:10.1146/annurev.psych.52.1.397 Mastenbroek, N., Jaarsma, A., Scherpbier, A., van Beukelen, P., & Demerouti, E. (2014). The role of personal resources in explaining well-being and performance: A study among young veterinary professionals. 23(2), pp. 190-202. doi:10.1080/1359432X.2012.728040 Meyer, J., & Allen, N. (1991). A there-component conceptualization oragnizational commitment. 1(1), pp. 61-89. Meyer, J., Becker, T., & Vandenberghe, C. (2004). Employee commitment and motivation: A conceptual analysis and integrative model. Journal of Applied Psychology, 89(6), pp. 991-1007. doi:10.1037/0021-9010.89.6.991 Morrow, S., McGonagle, A., Dove-Steinkamp, M., Waler Jr, C., Marmet, M., & Barnes-Farrell, J. (2010). Relationships between psychological safety climate facets andsafety behavior in the rail industry: A dominance analysis. Accident Analysis & Prevention(42), pp. 1460-1467. Nel, E., & Coetzee, M. (2019). Job Demands-Resources and Flourishing: Exploring Workplace Bullying as a Potential Mediator. Psychological Reports, 123(4), pp. 1316-1334. doi:10.1177/0033294119839032 Pap, Z., Vîrgă, D., Notelaers, G., & Maricuțoiu, L. (2020). A multilevel model of job insecurity and engagement. Journal of Managerial Psychology, 35(7/8), pp. 529-541. doi:10.1108/JMP-02-2020-0089 Pham, H.-C., El-Den, J., & Richardson, J. (2016). Influence of Security Compliance Demands and Resources on Security. Information & Computer Security, 24(4), pp. 326-347. doi:10.1108/ICS-10-2014-0067 Phillips, R. (2015). A review of definitions of fatigue – And a step towards a whole definition. Transportation Research Part F: Traffic Psychology and Behaviour, 29, pp. 48-56. doi:10.1016/j.trf.2015.01.003 Podsakoff, P., & Organ, D. (1986). Self-Reports in Organizational Research: Problems and Prospects. Journal of Management, 12(4), pp. 531-544. doi:10.1177/014920638601200408 Potempa, K., Lopez, M., Reid, C., & Lawson, L. (1986). Chronic Fatigue. Image: the Journal of Nursing Scholarship, 18(4), pp. 165-169. Randall, D. (1987). Commitment and the Organization: The Organization Man Revisited. The Academy of Management Review, pp. 460-471. doi:10.2307/258513 Ravie, L. (2021, 06 07). Hackers Breached Colonial Pipeline Using Compromised VPN Password. Retrieved from https://thehackernews.com/2021/06/hackers-breached-colonial-pipeline.html Ravindran, T., Kuan, A., & Lian, D. (2014). Antecedents and Effects of Social Network Fatigue. Journal of the Association for Information Science and Technology, 65(11), pp. 2306-2320. doi:10.1002/asi.23122 Rhee, H.-S., Kim, C., & Ryu, Y. (2009). Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28(8), pp. 816-826. Schneider, B. (1990). The climate for service: an application of the climate construct. In: Schneider, B. (Ed.). pp. 383-412. Schneider, B., Salvaggio, A., & Salvaggio, M. (2002). Climate strength: A new direction for climate research. Journal of Applied Psychology, 87, pp. 220-229. doi:10.1037/0021-9010 Schroder, H., Driver, M., & Streufert, S. (1967). Human information processing—Individuals and groups functioning in complex social situations. New York: Holt, Rinehart, & Winston. Self, D., Holt, D., & Schaninger, W. (2005). Work-group and organizational support: A test of distinct dimensions. Journal of Occupational and Organizational Psychology, 78(1), pp. 133-140. doi:10.1348/096317904X22944 Shapiro, C. (1998). Fatigue: how many types and how common? (Vol. 45). Journal of psychosomatic research. Siponen, M. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), pp. 31 - 41. doi:10.1108/09685220010371394 Skala, F., & Zemkova, E. (2022). Effects of Acute Fatigue on Cognitive Performance in Team Sport Players: Does It Change the Way They Perform? A Scoping Review. APPLIED SCIENCES-BASEL, 12(3). doi:10.3390/app12031736 Stanton, B., Theofanos, M., Prettyman, S., & Furman, S. (2016). Security fatigue. IT Professional, 18(5), pp. 26-32. Stephen, V., & Tite, T. (2016). Information security policy development andimplementation: The what, how and who. pp. 169-183. Strees, R. (1977). Antecedents and Outcomes of Organizational Commitment. Administrative Science Quarterly, 22(1), pp. 46-56. doi:10.2307/2391745 Swati, K. (2018, 08 06). iPhone Chip Supplier TSMC Stops Production After Computer Virus Attack. Retrieved from https://thehackernews.com/2018/08/tsmc-iphone-computer-virus.html Ten Brummelhuis, L., & Bakker, A. (2012). A Resource Perspective on the Work-Home Interface The Work-Home Resources Model. American Psychologist, 67(7), pp. 545-556. doi:10.1037/a0027974 Thompson, C., Cullum, N., McCaughan, D., Sheldon, T., & Raynor, P. (2004). Nurses, information use, and clinical decision making--the real world potential for evidence-based decisions in nursing. Evidence-based Nursing, 7(3), pp. 68-72. doi:10.1136/ebn.7.3.68 Tims, M., Bakker, A., & Derks, D. (2012). Development and validation of the job crafting scale. Journal of Vocational Behavior, 80(1), pp. 173-186. doi:10.1016/j.jvb.2011.05.009 Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E. (2015). Managing the introduction of information security awareness programmes in organisations. European Journal of Information Systems, 24(1), pp. 38-58. doi:10.1057/ejis.2013.27 Van Vianen, A., De Pater, I., Bechtoldt, M., & Evers, A. (2011). The strength and quality of climate perceptions. Journal of Managerial Psychology, 26, pp. 77-92. doi:10.1108/02683941111099637 Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivating IS security compliance: Insights from Habit and Protection. Inofrmation & Management, 49(3). Vohs, K., Baumeister, R., Schmeichel, B., Twenge, J., Twenge, N., & Tice, D. (2008). Making choices impairs subsequent self-control: A limited-resource account of decision making, self-regulation, and active initiative. Journal of Personality and Social Psychology(94), pp. 883-898. Von Solms, B. (2001). Information security - A multidimensional discipline. 20(6), pp. 504-508. doi:10.1016/S0167-4048(01)00608-3 Wasti, S. (2003). Organizational Commitment, Turnover Intentions, and the Influence of Cultural Values. Journal of Occupational and Organizational Psychology, 76, pp. 303-321. doi:10.1348/096317903769647193 Welle, P., & Graf, H. (2011). Effective hfestyle habits and coping strategies for stress tolerance among college students. American Journal of Health Education, 42(2), pp. 96-104. WHO. (2020). Pandemic fatigue: reinvigorating the public to prevent COVID-19. World Health Organization. Retrieved from https://apps.who.int/iris/bitstream/handle/10665/335820/WHO-EURO-2020-1160-40906-55390-eng.pdf Xi, H., Xiayu, C., & Robert, M. (2019). Social Support, Source Credibility, Social Influence, and Impulsive Purchase Behavior in Social Commerce. Journal of Electronic Commerce, 23(3), pp. 297-327. doi:10.1080/10864415.2019.1619905 Yu, M., & Li, J. (2019). Work-family conflict and mental health among Chinese underground coal miners: the moderating role of psychological capital. Psychology Health and Medicine, 25(1), pp. 1-9. doi:10.1080/13548506.2019.1595686 Yule, S., Flin, R., & Murdy, A. (2001). Modeling managerial influence on safety climate. Society of Industrial and Organizational Psychologists Conference. San Diego , CA. Zhang, J., Reithel, B., & Li, H. (2009). Impact of perceived technical protection on security. Information Management & Computer Security, 17(4), pp. 330-340. doi:10.1108/09685220910993980 Zohar, D. (1980). Safety Climate in Industrial Organizations: Theoretical andApplied Implications. Journal of Applied Psychology, 65(1), pp. 96-102. Zohar, D., & Luria, G. (2004). Climate as a Social-Cognitive Construction of Supervisory Safety Practices: Scripts as Proxy of Behavior Patterns. Journal of Applied Psychology, 89(2), pp. 322-333. |
電子全文 Fulltext |
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。 論文使用權限 Thesis access permission:自定論文開放時間 user define 開放時間 Available: 校內 Campus:開放下載的時間 available 2025-07-29 校外 Off-campus:開放下載的時間 available 2025-07-29 您的 IP(校外) 位址是 3.15.6.140 現在時間是 2024-11-21 論文校外開放下載的時間是 2025-07-29 Your IP address is 3.15.6.140 The current date is 2024-11-21 This thesis will be available to you on 2025-07-29. |
紙本論文 Printed copies |
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。 開放時間 available 2025-07-29 |
QR Code |