Skip to main content
Log in

Examining the impact of work overload on cybersecurity behavior: highlighting self-efficacy in the realm of artificial intelligence

  • Published:
Current Psychology Aims and scope Submit manuscript

Abstract

This study investigates the relationship between work overload and employee cybersecurity behavior, with a particular focus on the moderating role of self-efficacy in artificial intelligence (AI) use. Grounded in a multidisciplinary theoretical framework, the research integrates concepts from the Job Demands-Resources (JD-R) Model, Cognitive Load Theory, Social Identity Theory, and Protection Motivation Theory. Data were collected from 410 employees in South Korea through a three-wave time-lagged survey, analyzing the impact of work overload on cybersecurity behavior mediated by job stress and organizational identification, and moderated by self-efficacy in AI. The current study reveals a negative impact of work overload on employee cybersecurity behavior, mediated by job stress and organizational identification. Also, self-efficacy in AI use significantly moderates the relationship between work overload and job stress, mitigating the adverse effects of workload on cybersecurity behavior. The findings extend existing literature by demonstrating how organizational psychology theories can be applied to understand cybersecurity behavior in the workplace. This study highlights the importance of managing work overload and enhancing AI self-efficacy to improve cybersecurity practices in organizations. The study underscores the need for organizations to address work overload as a part of their cybersecurity strategy and to invest in AI self-efficacy training. The findings advocate for an interdisciplinary approach to cybersecurity, integrating insights from organizational psychology and AI technology. Future research should explore these dynamics in different cultural and organizational contexts and consider longitudinal designs to further validate the findings.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data availability

The authors confirm that all data generated or analyzed during this study are included in this published article.

References

  • Alsharida, R. A., Al-rimy, B. A. S., Al-Emran, M., & Zainal, A. (2023). A systematic review of multi perspectives on human cybersecurity behavior. Technology in Society, 102258.

  • Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411–423.

    Article  Google Scholar 

  • Ashforth, B. E., & Mael, F. (1989). Social identity theory and the organization. Academy of Management Review, 14(1), 20–39.

    Article  Google Scholar 

  • Bakker, A. B., & Demerouti, E. (2007). The job demands-resources model: State of the art. Journal of Managerial Psychology, 22(3), 309–328.

    Article  Google Scholar 

  • Bakker, A. B., Demerouti, E., & Sanz-Vergel, A. I. (2014). Burnout and work engagement: The JD–R approach. Annual Review of Organizational Psychology and Organizational Behavior, 1(1), 389–411.

    Article  Google Scholar 

  • Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122–147.

    Article  Google Scholar 

  • Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Prentice Hall, Inc.

  • Barriga Medina, H. R., Aguirre, C., Coello-Montecel, R., Pacheco, D. O., P., & Paredes-Aguirre, M. I. (2021). The influence of work–family conflict on burnout during the COVID-19 pandemic: The effect of teleworking overload. International Journal of Environmental Research and Public Health, 18(19), 10302.

    Article  PubMed  PubMed Central  Google Scholar 

  • Beehr, T. A., & Newman, J. E. (1978). Job stress, employee health, and organizational effectiveness: A facet analysis, model, and literature review. Personnel Psychology, 31(4), 665–699.

    Article  Google Scholar 

  • Brace, N., Kemp, R., & Snelgar, R. (2003). A guide to data analysis using SPSS for windows. Palgrave Macmillan.

  • Browne, M. W., & Cudeck, R. (1993). Alternative ways of assessing model fit. In K. A. Bollen, & J. S. Long (Eds.), Testing structural equation models (pp. 136–162). Sage.

  • Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548.

    Article  Google Scholar 

  • Chen, Y., Ramamurthy, K., & Wen, K. W. (2012). Organizations’ information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29(3), 157–188.

    Article  Google Scholar 

  • Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19(2), 189–211.

    Article  Google Scholar 

  • Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145–158.

    Article  Google Scholar 

  • Cousins, R., Mackay, C. J., Clarke, S. D., Kelly, C., Kelly, P. J., & McCaig, R. H. (2004). Management standards’ work-related stress in the UK: Practical development. Work & Stress, 18(2), 113–136.

    Article  Google Scholar 

  • Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers and Security, 32, 90–101.

    Article  Google Scholar 

  • Demerouti, E., Bakker, A. B., Nachreiner, F., & Schaufeli, W. B. (2001). The job demands-resources model of burnout. Journal of Applied Psychology, 86(3), 499–512.

    Article  PubMed  Google Scholar 

  • Gélinas, D., Sadreddin, A., & Vahidov, R. (2022). Artificial intelligence in human resources management: A review and research agenda. Pacific Asia Journal of the Association for Information Systems, 14(6), 1.

    Article  Google Scholar 

  • Hwang, Y. S., & Kim, B. J. (2021). The power of a firm’s Benevolent Act: The influence of work overload on turnover intention, the mediating role of meaningfulness of work and the moderating effect of CSR activities. International Journal of Environmental Research and Public Health, 18(7), 3780.

    Article  PubMed  PubMed Central  Google Scholar 

  • Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 83–95.

    Article  Google Scholar 

  • Khan, N. F., Ikram, N., Murtaza, H., & Javed, M. (2023). Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick’s Model (Vol. 125, p. 103049). Computers & Security.

  • Kumar, S., Hansiya Abdul Rauf, F., & Rathnasekara, H. (2021). Working to help or helping to work? Work-overload and allocentrism as predictors of organizational citizenship behaviours. The International Journal of Human Resource Management, 32(13), 2807–2828.

    Article  Google Scholar 

  • Landers, R. N., & Behrend, T. S. (2015). An inconvenient truth: Arbitrary distinctions between organizational, mechanical Turk, and other convenience samples. Industrial and Organizational Psychology, 8(2), 142–164.

    Article  Google Scholar 

  • Lian, H., Li, J. K., Du, C., Wu, W., Xia, Y., & Lee, C. (2022). Disaster or opportunity? How COVID-19-associated changes in environmental uncertainty and job insecurity relate to organizational identification and performance. Journal of Applied Psychology, 107(5), 693–707.

    Article  PubMed  Google Scholar 

  • Mael, F. A., & Ashforth, B. E. (1992). Alumni and their alma mater: A partial test of the reformulated model of organizational identification. Journal of Organizational Behavior, 13(2), 103–123.

    Article  Google Scholar 

  • Marakas, G. M., Yi, M. Y., & Johnson, R. D. (1998). The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research. Information Systems Research, 9(2), 126–163.

    Article  Google Scholar 

  • Mhango, M., Dzobo, M., Chitungo, I., & Dzinamarira, T. (2020). COVID-19 risk factors among health workers: A rapid review. Safety and Health at Work, 11(3), 262–265.

    Article  PubMed  PubMed Central  Google Scholar 

  • Motowidlo, S. J., Packard, J. S., & Manning, M. R. (1986). Occupational stress: Its causes and consequences for job performance. Journal of Applied Psychology, 71(4), 618–629.

    Article  PubMed  Google Scholar 

  • Posey, C., Roberts, T. L., & Lowry, P. B. (2015). The impact of organizational commitment on insiders’ motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179–214.

    Article  Google Scholar 

  • Ragu-Nathan, T. S., Tarafdar, M., Ragu-Nathan, B. S., & Tu, Q. (2008). The consequences of technostress for end users in organizations: Conceptual development and empirical validation. Information Systems Research, 19(4), 417–433.

    Article  Google Scholar 

  • Riketta, M. (2005). Organizational identification: A meta-analysis. Journal of Vocational Behavior, 66(2), 358–384.

    Article  Google Scholar 

  • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93–114.

    Article  PubMed  Google Scholar 

  • Sauter, S. L., Murphy, L. R., & Hurrell, J. J. (1990). Prevention of work-related psychological disorders. A national strategy proposed by the National Institute for Occupational Safety and Health (NIOSH). American Psychologist, 45(10), 1146–1158.

    Article  PubMed  Google Scholar 

  • Schaufeli, W. B., & Bakker, A. B. (2004). Job demands, job resources, and their relationship with burnout and engagement: A multi-sample study. Journal of Organizational Behavior, 25(3), 293–315.

    Article  Google Scholar 

  • Selye, H. (1974). Stress without distress. Psychopathology of human adaptation (pp. 137–146). Springer US.

  • Sergent, K., & Stajkovic, A. D. (2020). Women’s leadership is associated with fewer deaths during the COVID-19 crisis: Quantitative and qualitative analyses of United States governors. Journal of Applied Psychology, 105(8), 771–783.

    Article  PubMed  Google Scholar 

  • Shrout, P. E., & Bolger, N. (2002). Mediation in experimental and nonexperimental studies: New procedures and recommendations. Psychological Methods, 7(4), 422–445.

    Article  PubMed  Google Scholar 

  • Sparks, K., & Cooper, C. (1999). Occupational differences in the work-strain relationship: Towards the use of situation-specific models. Journal of Occupational and Organizational Psychology, 72(2), 219–229.

    Article  Google Scholar 

  • Sweller, J. (1988). Cognitive load during problem solving: Effects on learning. Cognitive Science, 12(2), 257–285.

    Article  Google Scholar 

  • Tajfel, H., & Turner, J. C. (1979). An integrative theory of intergroup conflict. In W. G. Austin, & S. Worchel (Eds.), The social psychology of intergroup relations (pp. 33–47). Brooks/Cole.

  • Tambe, P., Cappelli, P., & Yakubovich, V. (2019). Artificial intelligence in human resources management: Challenges and a path forward. California Management Review, 61(4), 15–42.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Julak Lee.

Ethics declarations

Informed consent statement

Informed consent was obtained from all the participants.

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, BJ., Kim, MJ. & Lee, J. Examining the impact of work overload on cybersecurity behavior: highlighting self-efficacy in the realm of artificial intelligence. Curr Psychol 43, 17146–17162 (2024). https://doi.org/10.1007/s12144-024-05692-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12144-024-05692-4

Keywords

Navigation