Premium
When enough is enough: Investigating the antecedents and consequences of information security fatigue
Author(s) -
Cram W. Alec,
Proudfoot Jeffrey G.,
D'Arcy John
Publication year - 2021
Publication title -
information systems journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 2.635
H-Index - 89
eISSN - 1365-2575
pISSN - 1350-1917
DOI - 10.1111/isj.12319
Subject(s) - construct (python library) , compliance (psychology) , information security , public relations , critical security studies , business , ontological security , security policy , information security management , standard of good practice , psychology , knowledge management , social psychology , political science , cloud computing security , security information and event management , computer security , security service , computer science , network security policy , cloud computing , law , programming language , feeling
Despite concerns raised by practitioners, the potential downside of the information security demands imposed by organizations on their employees has received limited scholarly attention. Our research focuses on information security fatigue (hereafter security fatigue), which is defined as a socio‐emotional state experienced by an individual who is tired of and disillusioned with security policies and their associated guidelines and procedures. This research delves into the security fatigue concept, investigates its antecedents and reports how fatigue affects employee security policy compliance (and non‐compliance). Since security fatigue is not well articulated in the literature and there is limited understanding of its antecedents and consequences, we take a research approach that affords novel insight into this phenomenon. Specifically, we conduct 38 in‐depth interviews with business and IT professionals, and then use a qualitative approach to construct a model, including seven research propositions, to highlight the key aspects of security fatigue. Our results indicate that four distinct antecedents contribute to security fatigue, which result in three unique consequences. We discuss security fatigue in relation to past theoretical views and related concepts within the security policy compliance literature and identify directions for future research.