Skip to main content
Top

2023 | OriginalPaper | Chapter

Protecting Organizational Information Security at Home During the COVID-19 Pandemic in Vietnam: Exploratory Findings from Technology-Organization-Environment Framework

Authors : Duy Dang-Pham, Hiep Pham, Ai-Phuong Hoang, Diem-Trang Vo, Long T. V. Nguyen

Published in: Information Systems Research in Vietnam

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

While prior research has examined the cognitive factors that influenced the information security behaviors of remote workers, little was known about the impact of the different work environments on these behaviors. Moreover, organizations and employees were abruptly forced to embrace working from home due to the ongoing COVID-19 pandemic, which created unprecedented problems and inconvenience in how employees perform daily work at home that could jeopardize organizational information security. This study adapts the technology-organization-environment (TOE) framework to investigate the factors that influence how employees in Vietnam protect organizational information security while working from home during the COVID-19 pandemic. Our qualitative findings drawn from in-depth interviews with 20 respondents reveal several factors that influence the employee protection of organizational InfoSec at home, such as the use of secure software for remote work, the flexible yet distracting work environment at home, and the lack of social interactions with colleagues that could demotivate personal information security efforts. We offer practical recommendations for organizations to prepare for flexible and secure workplaces in the future, especially to meet the continuing demand for working from home after the COVID-19 pandemic. In terms of theoretical implications, future studies are encouraged to focus on exploring the contextual and situational factors that influence employee information security behaviors.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Alzahrani, A. (2020). Coronavirus social engineering attacks: Issues and recommendations. International Journal of Advanced Computer Science and Applications, 11(5), 154–161.CrossRef Alzahrani, A. (2020). Coronavirus social engineering attacks: Issues and recommendations. International Journal of Advanced Computer Science and Applications, 11(5), 154–161.CrossRef
2.
go back to reference Ayyagari, R., Grover, V., & Purvis, R. (2011). Technostress: Technological Antecedents and Implications. MIS Quarterly: Management Information Systems, 35(4), 831–858.CrossRef Ayyagari, R., Grover, V., & Purvis, R. (2011). Technostress: Technological Antecedents and Implications. MIS Quarterly: Management Information Systems, 35(4), 831–858.CrossRef
3.
go back to reference Bélanger, F., Watson-Manheim, M. B., & Swan, B. R. (2013). A multi-level socio-technical systems telecommuting framework. Behaviour and Information Technology, 32(12), 1257–1279.CrossRef Bélanger, F., Watson-Manheim, M. B., & Swan, B. R. (2013). A multi-level socio-technical systems telecommuting framework. Behaviour and Information Technology, 32(12), 1257–1279.CrossRef
4.
go back to reference Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.CrossRef Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.CrossRef
5.
go back to reference Chigada, J., & Madzinga, R. (2021). Cyberattacks and threats during COVID-19: A systematic literature review. SA Journal of Information Management, 23(1), 1–11.CrossRef Chigada, J., & Madzinga, R. (2021). Cyberattacks and threats during COVID-19: A systematic literature review. SA Journal of Information Management, 23(1), 1–11.CrossRef
6.
go back to reference Chowdhury, N. H., Adam, M. T. P., & Skinner, G. (2019). The impact of time pressure on cybersecurity behaviour: A systematic literature review. Behaviour and Information Technology, 38(12), 1290–1308. Chowdhury, N. H., Adam, M. T. P., & Skinner, G. (2019). The impact of time pressure on cybersecurity behaviour: A systematic literature review. Behaviour and Information Technology, 38(12), 1290–1308.
7.
go back to reference Cooper, C. D., & Kurland, N. B. (2002). Telecommuting, professional isolation, and employee development in public and private organizations. Journal of Organizational Behavior, 23, 511–532.CrossRef Cooper, C. D., & Kurland, N. B. (2002). Telecommuting, professional isolation, and employee development in public and private organizations. Journal of Organizational Behavior, 23, 511–532.CrossRef
8.
go back to reference Creswell, J.W. a., & Creswell, J.D. (2018). In Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. 5th ed. SAGE Publications, Inc.,. Creswell, J.W. a., & Creswell, J.D. (2018). In Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. 5th ed. SAGE Publications, Inc.,.
9.
go back to reference Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. L. (2013). Future directions for behavioral information security research. Computers & Security (32), Elsevier Ltd, 90–101. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. L. (2013). Future directions for behavioral information security research. Computers & Security (32), Elsevier Ltd, 90–101.
10.
go back to reference D’Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding employee responses to stressful information security requirements: A coping perspective. Journal of Management Information Systems, 31(2), 285–318.CrossRef D’Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding employee responses to stressful information security requirements: A coping perspective. Journal of Management Information Systems, 31(2), 285–318.CrossRef
11.
go back to reference D’Arcy, J., & Hovav, A. (2008). Does one size fit all? Examining the differential effects of is security counter measures. Journal of Business Ethics, 89(S1), 59–71.CrossRef D’Arcy, J., & Hovav, A. (2008). Does one size fit all? Examining the differential effects of is security counter measures. Journal of Business Ethics, 89(S1), 59–71.CrossRef
12.
go back to reference Dang-Pham, D., Pittayachawan, S., & Bruno, V. (2017). Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace. Computers in Human Behavior, 67, 196–206. Dang-Pham, D., Pittayachawan, S., & Bruno, V. (2017). Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace. Computers in Human Behavior, 67, 196–206.
13.
go back to reference Depietro, R., Wiarda, E., & Fleischer, M. (1990). The context for change: Organization, technology and environment. The Processes of Technological Innovation, 199, 151–175. Depietro, R., Wiarda, E., & Fleischer, M. (1990). The context for change: Organization, technology and environment. The Processes of Technological Innovation, 199, 151–175.
14.
go back to reference De’, R., Pandey, N., & Pal, A. (2020). Impact of digital surge during Covid-19 pandemic: A viewpoint on research and practice. International Journal of Information Management, 55(June). De’, R., Pandey, N., & Pal, A. (2020). Impact of digital surge during Covid-19 pandemic: A viewpoint on research and practice. International Journal of Information Management, 55(June).
15.
go back to reference Furnell, S., & Shah, J. N. (2020). Home working and cyber security—an outbreak of unpreparedness? Computer Fraud and Security, 2020(8), 6–12. Furnell, S., & Shah, J. N. (2020). Home working and cyber security—an outbreak of unpreparedness? Computer Fraud and Security, 2020(8), 6–12.
16.
go back to reference Gajendran, R. S., & Harrison, D. A. (2007). The good, the bad, and the unknown about telecommuting: Meta-analysis of psychological mediators and individual consequences. Journal of Applied Psychology, 92, 1524–1541.CrossRef Gajendran, R. S., & Harrison, D. A. (2007). The good, the bad, and the unknown about telecommuting: Meta-analysis of psychological mediators and individual consequences. Journal of Applied Psychology, 92, 1524–1541.CrossRef
17.
go back to reference Georgiadou, A., Mouzakitis, S., & Askounis, D. (2021). Working from home during COVID-19 Crisis: A cyber security culture assessment survey. Security Journal (2021). Georgiadou, A., Mouzakitis, S., & Askounis, D. (2021). Working from home during COVID-19 Crisis: A cyber security culture assessment survey. Security Journal (2021).
18.
go back to reference Godlove, T. (2012). Examination of the factors that influence teleworkers’ willingness to comply with information security guidelines. Information Security Journal, 21(4), 216–229. Godlove, T. (2012). Examination of the factors that influence teleworkers’ willingness to comply with information security guidelines. Information Security Journal, 21(4), 216–229.
19.
go back to reference Hobbs, D., & Armstrong, J. (1998). An experimental study of social and psychological aspects of teleworking. Facilities, 16(12–13), 366–371.CrossRef Hobbs, D., & Armstrong, J. (1998). An experimental study of social and psychological aspects of teleworking. Facilities, 16(12–13), 366–371.CrossRef
20.
go back to reference Jain, T., Currie, G., and Aston, L. (2021). COVID and working from home: Long-term impacts and psycho-social determinants. Transportation Research Part A: Policy and Practice, 156, 52–68. Jain, T., Currie, G., and Aston, L. (2021). COVID and working from home: Long-term impacts and psycho-social determinants. Transportation Research Part A: Policy and Practice, 156, 52–68.
21.
go back to reference Kazekami, S. (2020). Mechanisms to improve labor productivity by performing telework. Telecommunications Policy, 44(2), 101868.CrossRef Kazekami, S. (2020). Mechanisms to improve labor productivity by performing telework. Telecommunications Policy, 44(2), 101868.CrossRef
22.
go back to reference Laato, S., Islam, A. K. M. N., Islam, M. N., & Whelan, E. (2020). What drives unverified information sharing and cyberchondria during the COVID-19 pandemic? European Journal of Information Systems 29(3), 288–305. Laato, S., Islam, A. K. M. N., Islam, M. N., & Whelan, E. (2020). What drives unverified information sharing and cyberchondria during the COVID-19 pandemic? European Journal of Information Systems 29(3), 288–305.
23.
go back to reference Lallie, H. S., Shepherd, L. A., Nurse, J. R. C., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2021). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers and Security, 105. Lallie, H. S., Shepherd, L. A., Nurse, J. R. C., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2021). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers and Security, 105.
24.
go back to reference Li, Y., & Siponen, M. (2011). A call for research on home users' information security behaviour. In: 15th Pacific Asia Conference on Information Systems (PACIS). Li, Y., & Siponen, M. (2011). A call for research on home users' information security behaviour. In: 15th Pacific Asia Conference on Information Systems (PACIS).
25.
go back to reference Martin, B. H., & MacDonnell, R. (2012). Is telework effective for organizations? A meta-analysis of empirical research on perceptions of telework and organizational outcomes. Management Research Review, 35(7), 602–616.CrossRef Martin, B. H., & MacDonnell, R. (2012). Is telework effective for organizations? A meta-analysis of empirical research on perceptions of telework and organizational outcomes. Management Research Review, 35(7), 602–616.CrossRef
26.
go back to reference Maslach, C., Schaufeli, W. B., & Leiter, M. P. (2001). Job burnout. Annual Review of Psychology, 52, 397–422.CrossRef Maslach, C., Schaufeli, W. B., & Leiter, M. P. (2001). Job burnout. Annual Review of Psychology, 52, 397–422.CrossRef
27.
go back to reference Moen, P., Kelly, E. L., & Hill, R. (2011). Does enhancing work-time control and flexibility reduce turnover? A naturally occurring experiment. Social Problems, 58, 69–98. Moen, P., Kelly, E. L., & Hill, R. (2011). Does enhancing work-time control and flexibility reduce turnover? A naturally occurring experiment. Social Problems, 58, 69–98.
28.
go back to reference Mwagwabi, F., & Jiow, J. H. (2021). Compliance with security guidelines in teenagers: The conflicting role of peer influence and personal norms. Australasian Journal of Information Systems, 25, 1–25.CrossRef Mwagwabi, F., & Jiow, J. H. (2021). Compliance with security guidelines in teenagers: The conflicting role of peer influence and personal norms. Australasian Journal of Information Systems, 25, 1–25.CrossRef
29.
go back to reference Palanisamy, R., Norman, A. A., & Kiah, M. L. M. (2020). Compliance with bring your own device security policies in organizations: A systematic literature review. Computers and Security 98. Palanisamy, R., Norman, A. A., & Kiah, M. L. M. (2020). Compliance with bring your own device security policies in organizations: A systematic literature review. Computers and Security 98.
30.
go back to reference Pearlson, K. E., & Saunders, C. S. (2001). There’s no place like home: Managing telecommuting paradoxes. Academy of Management Executive, 15(2), 117–128. Pearlson, K. E., & Saunders, C. S. (2001). There’s no place like home: Managing telecommuting paradoxes. Academy of Management Executive, 15(2), 117–128.
31.
go back to reference Pham, H. C. (2019). Information security burnout: Identification of sources and mitigating factors from security demands and resources. Journal of Information Security and Applications, 46, Elsevier Ltd, 96–107. Pham, H. C. (2019). Information security burnout: Identification of sources and mitigating factors from security demands and resources. Journal of Information Security and Applications, 46, Elsevier Ltd, 96–107.
32.
go back to reference Pollini, A., Callari, T. C., Tedeschi, A., Ruscio, D., Save, L., Chiarugi, F., & Guerri, D. (2021). Leveraging human factors in cybersecurity: An integrated methodological approach. Cognition, Technology and Work. Pollini, A., Callari, T. C., Tedeschi, A., Ruscio, D., Save, L., Chiarugi, F., & Guerri, D. (2021). Leveraging human factors in cybersecurity: An integrated methodological approach. Cognition, Technology and Work.
33.
go back to reference Rhee, H.-S. S., Kim, C., & Ryu, Y. U. (2009). Self-Efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28 (8), 816– 826. Rhee, H.-S. S., Kim, C., & Ryu, Y. U. (2009). Self-Efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28 (8), 816– 826.
34.
go back to reference Safa, N. S., & Von Solms, R. (2016). An information security knowledge sharing model in organizations. Computers in Human Behavior, 57, 442–451. Safa, N. S., & Von Solms, R. (2016). An information security knowledge sharing model in organizations. Computers in Human Behavior, 57, 442–451.
35.
go back to reference Sardeshmukh, S. R., Sharma, D., & Golden, T. D. (2012). Impact of telework on exhaustion and job engagement. New Technology, Work and Employment, 27(3), 193–207.CrossRef Sardeshmukh, S. R., Sharma, D., & Golden, T. D. (2012). Impact of telework on exhaustion and job engagement. New Technology, Work and Employment, 27(3), 193–207.CrossRef
36.
go back to reference Smite, D., Tkalich, A., Moe, N. B., Papatheocharous, E., Klotins, E., & Buvik, M. P. (2022). Changes in perceived productivity of software engineers during covid-19 pandemic: The voice of evidence. Journal of Systems and Software, 186, 1–14.CrossRef Smite, D., Tkalich, A., Moe, N. B., Papatheocharous, E., Klotins, E., & Buvik, M. P. (2022). Changes in perceived productivity of software engineers during covid-19 pandemic: The voice of evidence. Journal of Systems and Software, 186, 1–14.CrossRef
37.
go back to reference Viet Nam COVID-19 Situation Report #65. WHO. 30 October 2021. Retrieved 30 October 2021. Viet Nam COVID-19 Situation Report #65. WHO. 30 October 2021. Retrieved 30 October 2021.
38.
go back to reference Warkentin, M., Johnston, A. C., & Shropshire, J. (2011). The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 20(3), 267–284.CrossRef Warkentin, M., Johnston, A. C., & Shropshire, J. (2011). The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 20(3), 267–284.CrossRef
Metadata
Title
Protecting Organizational Information Security at Home During the COVID-19 Pandemic in Vietnam: Exploratory Findings from Technology-Organization-Environment Framework
Authors
Duy Dang-Pham
Hiep Pham
Ai-Phuong Hoang
Diem-Trang Vo
Long T. V. Nguyen
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-3804-7_6

Premium Partner