Stress Burnout and Security Fatigue in Cybersecurity A Human Factors Problem
Stress Burnout and Security Fatigue in Cybersecurity A Human Factors Problem
2478/hjbpa-2022-0003
Calvin NOBLES 1 0F
Abstract
Stress, burnout, and security fatigue continue as slight destroyers of strong cybersecurity and
significant human factors concerns. The persistence of these human performance issues is
concerning given the lack of mitigation and integration of human factors practitioners to mitigate
these adverse risk circumstances. Security fatigue is not a new phenomenon but the evolving
nature of cybersecurity results in various sub-categories of security fatigue; thus, making it a
difficult problem to solve. Stress and burnout are major causes of short tenures in senior roles for
security executives. Business decision-makers lack the expertise to explore the negative influences
of stress, burnout, and security fatigue on cybersecurity. Technology-led cycles are organizations’
primary course of action to mitigate cybersecurity threats, resulting in complexity debt and
making businesses more vulnerable to attacks. Human factors professionals can identify high-
friction areas that degrade human performance and implement initiatives to reduce the risk.
Human performance degradation in cybersecurity is a critical risk factor and requires immediate
attention, given that cybercriminals continue to exploit human weaknesses to gain access to
sensitive and critical infrastructure.
Keywords: Complexity Debt, Cybersecurity, Behavior, Burnout, Fatigue, Human Factors, Human
Performance, Security Fatigue, and Stress
1. Introduction
An existing phenomenon that continues to plague information security and
cybersecurity is fatigue and burnout. Recently, the topic of job burnout has been
trending in several practitioner-based security magazines, blogs, social media, and
websites (Platsis, 2019). In addition, a recent study by a reputable university in the U.K.
and a security vendor highlighted the pervasive nature of cybersecurity burnout and its
implications on businesses, individuals, and the industry (Platsis, 2019). One researcher
indicated that the technological pace, operational demands, and relentless threats
1
Illinois Institute of Technology, Cybersecurity Fellow, Harvard University Belfer Center, USA,
[email protected]
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
coupled with disjointed security capabilities and non-integrated products contribute to
job burnout in the cybersecurity domain (Platsis, 2019).
Stress, burnout, and cybersecurity fatigue issues are not new to cybersecurity; however,
the occurrences and consequences are mounting due to business decision-makers
(BDM), primarily senior management, failure to address the root causes of stress,
burnout, and fatigue. Researchers noted that security practitioners are overtaxed,
stressed out, and inaccessible (Dykstra & Paul, 2018); hence, leading to the shortage of
scientific research on security fatigue. Operational stress, fatigue, error, and burnout are
extensively documented in the literature (Grier, 2015); however, fatigue in cybersecurity
remains less than a top-tier discussion topic for security and technology executives.
Grier (2015) indicated that other sociotechnical fields such as aviation, industrial control
and command, and medicine had investigated workload because these fields mandate
high cognitive skills, awareness, memory, and visual perception abilities. The significance
of studying workload and stress is the scientifically proven correlation of errors and
decreased performance (Dykstra & Paul, 2018; Nobles, 2019). A study by Dykstra and
Paul (2018), who examined cyber operators, revealed that operation fatigue and
frustration increased throughout the length of the cyber operation
Nobles (2019) postulated that organizations and BDM have not thoroughly explored the
issues causing security fatigue. The three pillars of information security are (a) people,
(b) technology, and (c) processes. Failure to address security fatigue in cybersecurity
resulted in upticks in data breaches, cyber-attacks, ransomware attacks, and other
security catastrophes. Existing research indicates that 80-90% of security incidents stem
from human errors in the U.S. and the U.K. (Nobles, 2018). The dynamic nature of the
business environment, coupled with increased reliance on advanced technologies, a
shortage of cybersecurity, increased regulatory demands, and a relentless cybersecurity
threat landscape, perpetuates security fatigue (Nobles, 2019). This paper aims to
instigate discourse, empirical research, and operational practices to address the root
causes of stress, security fatigue, and burnout in cybersecurity. Another objective of this
article is to highlight the critical need to address security fatigue in cybersecurity
operations due to increased risk.
2. Background
A recent survey divulged that Chief Information Security Officers (CISO) are overworked,
impacting their mental health to the degree that 90% are willing to take a pay cut
(Sheridan, 2020). The continuous stress and mental health implications disrupt the CISOs
work-life balance; 88% of the executive were overly stressed (Sheridan, 2020). The
survey did not list the factors for inducing the pressure (Sheridan, 2020). ISACA indicates
that CISOs are responsible for a myriad of responsibilities, leading to too much strain
and stress (ISACA, 2020). The grueling nature of the CISO position results in short
tenures from 1 to 2 years due to the increasing responsibility, less personal and recovery
time, and the constant connectivity (ISACA, 2020). The demanding responsibilities
50
HOLISTICA Vol 13, Issue 1, 2022, pp. 49-72
placed on CISOs and security professionals lead to mental health concerns and
unprecedented stress levels (ISACA, 2020; Sheridan, 2020). At issue is the increased
stress levels and the potential to cascade throughout the ranks of the security team;
consequently, possibly resulting in burnout and chronic fatigue.
Chief Information Security Officers are not the only individuals impacted by security
fatigue. For example, a National Institute of Standards and Technology study indicated
that people engaged in risky behavior while working and at home (Stanton, Theofanos,
Prettyman, & Furman, 2016). In addition, the study discovered that workers are
overwhelmed while interacting with computer systems due to experiencing substandard
security experiences, resulting in security fatigue and degraded security decision-making
(Stanton, Theofanos, Prettyman, & Furman, 2016). This growing phenomenon of
security lethargicness requires immediate remediation and solutions because
cybercriminals continuously attack employees’ cognitive abilities. In addition,
cybercriminals leverage deceptive practices to target humans to provide sensitive,
personal, or private information to steal their login credentials and illegally gain access
to computer networks (Bone, 2017). Failure to address human performance issues in
cybersecurity or interacting with information systems will continue to allow
cybercriminals to continuously execute malicious activity detrimental to business
organizations and people.
People perform countless security tasks daily privately and professionally; consequently,
these tasks require physical and cognitive abilities, which takes a toll on individuals,
especially if the security functions are deemed excessive, illogical, or impractical to the
users (Parker, Krol, Becker, & Sasse, 2016). Researchers emphasized that security
compliance and the burdensome of constant security tasks can exceed an individual’s
physical and cognitive abilities, resulting in security fatigue (Parker et al., 2016). Pfleeger
et al. (2014) stressed that security tasks deplete employees’ energy reservoir, especially
with cognitively demanding security functions (Parker et al., 2016). Renaud (2012)
stated that organizations’ security policies place impractical requirements on workers.
The abovementioned suppositions highlight the lack of human factors strategies and
initiatives in cybersecurity. This is primarily because the cybersecurity industry lags in
leveraging human factors as a core capability (Nobles, 2019).
51
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
(ENISA, 2021). The monetization of malicious cyber activities increasingly drives
cybercriminals, while cryptocurrency remains the universal payout mechanism for
cybercrime (ENISA, 2021).
Phishing-as-a-service, ransomware-as-a-service, ransom-denial-of-service,
disinformation-as-a-service coupled with artificial intelligence-enabled information,
business email compromise (ENISA, 2021), and traditional attack methodologies are
increasing the complexity of the cyber threat environment. The significance of human
performance and cognition are essential given the increase in human errors such as
system misconfigurations.
The integration of digital technologies increases cybercrime, which researchers forecast
the cost of global cybercrime to reach 6 trillion dollars in 2021 (Lallie et al., 2021). The
cost of global cybercrime increased from 3 trillion dollars in 2015 (Lallie et al., 2021),
indicative of a hyperactive cybersecurity threat environment. During COVID-19,
researchers noted a mounting increase in online crimes due to organizations leveraging
online technologies to support work from home (Okereafor & Adelaiye, 2020). Some of
the prominent attack practices leveraged by cybercriminals are (a) phishing with
malware, (b) denial of service, (c) ransomware, (d) vishing, (e) smishing, and (f) zero-day
exploit, and (g) man-in-the-middle. The upsurge of work from home during COVID-19
forced organizations to leverage cloud infrastructure rapidly; however, the shortage of
cloud expertise resulted in a poorly deployed and managed cloud environment, which
creates exploitation opportunities for cybercriminals (ENISA, 2021). Without a doubt,
COVID-19 exacerbated cyber-attacks as malicious actors capitalized on employees
working from home. Social engineering or cognitive hacking is a growing phenomenon
that emerged before the pandemic; yet remains a challenge.
3.1 Cognitive Hacking
Cognitive hacking is not a new concept in computer security. For example, Cybenko,
Giani, and Thompson (2002) articulated that cognitive hacking pertains to outwitting
users to conduct certain behaviors to aid in executing the cognitive attack through
perception manipulation. Cybercriminals and hackers continue to exploit end-users
psychological limitations and weaknesses because organizations fail to implement risk
management solutions to address cognitive attacks (Bone, 2017). Cognitive hacks are
either covert or overt; in covert attacks, the attackers attempt to disguise the
manipulation, and overt attacks occur in the form of nuisances and bothersome
(Cybenko, Giani, &Thompson, 2002). Given that cognitive hacking has been a significant
vector to impede cybersecurity programs without any viable solutions is problematic
and indicative of the complexity associated with cybercriminals and malicious actors
attacking the end-users’ psychological limitations.
Research indicates that “cognitive hacking refers to a computer or information system
attack that relies on changing human users’ perceptions and corresponding behaviors in
order to be successful” (Bones, 2017, p. 134). Phishing, vishing, smishing, spear phishing,
and social engineering attacks are forms of cognitive hacking. A significant concern for
52
HOLISTICA Vol 13, Issue 1, 2022, pp. 49-72
HPI in cybersecurity is due to the increasing number of cognitive attacks. Stress, fatigue,
and burnout reduce the performance capacity of employees, especially business
decision-makers and cybersecurity professionals; consequently, enabling cybercriminals
and hackers to capitalize on the employees’ debilitated state and lack of awareness.
The proliferation of new technology supports cybercriminals with new avenues to attack
employees accompanied by high workloads, inattention blindness, complexity, and risk
deafness (Bone, 2017). Business decision-makers struggle to understand the human
element, specifically, human factors as a scientific discipline. Given that the human
factor is largely underexplored in cybersecurity (Hull, 2017; Nobles, 2018), cognitive
hacking and the associated risk factors remain in a state of risk deafness (Bone, 2017).
One reason for the continual struggle with cognitive hacking is that organizations lack
the organic talent to remediate the associated issues (Nobles, 2019). Given the
increasing intricacy of cognitive hacking, psychology-based professionals, including
human factors practitioners, should be integrated into cybersecurity operations to
develop practical solutions.
53
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
2019; Nori et al., 2019).
Security fatigue is lethargy or 1. Authentication
reluctance to deal with computer fatigue
security and compliance due to 2. Compliance
being overwhelmed or in conflict fatigue
Security Fatigue
with one’s bounded rationality to 3. Alert fatigue
acquire and practice effective 4. Decision fatigue
security behavior (Stanton et al., 5. Regulatory fatigue
2016).
Stress is a physical and emotional 1. Acute stress
response to specific 2. Episodic stress
circumstances….Acute stress is the 3. Chronic stress
fight or flight concept in which the 4. Time stress
symptoms are short-term….while 5. Anticipation Stress
episodic stress pertains to exposure 6. 6. Situational
Stress to repeated stressful events with Stress
reduced recovery periods….chronic
stress occurs from long-term
exposure to stressful situations
which impeded one’s abilities and
can result in burnout (Dykstra &
Paul, 2018).
Source: author synthesis
Stress, workload, awareness, and cognition are some categories that apply to human
factors in cybersecurity (Gutzwiller et al., 2019). Given that cybersecurity is a complex
socio-technical system, the application of human factors in cybersecurity is continuously
emerging as the domain addresses nascent areas (Gutzwiller et al., 2019). Most
organizations and business decision-makers lack foundational expertise in managing
human factors in cybersecurity—hence, the sustained human performance issues in
cybersecurity.
Human performance problems are exacerbated by a shortage of skilled workers,
inadequate resourcing, poor management, and ineffective prioritization. Cybersecurity
professionals and information technologists work long hours under high demand to
prevent cyber attacks, data breaches, and ransomware attacks (Thomas, 2020). A 2019
survey indicated that 91% of Chief Information Security Officers (CISOs) experienced
moderate to high-stress levels, and 28% reported that the sustained stress level
impeded their performance (Thomas, 2019).
Furthermore, 77% of corporate employees have experienced burnout in their current
roles (Thomas, 2020). In a recent survey, 70% of employees emphasized that their
businesses perform poorly in averting and reducing burnout (Thomas, 2020). A 2019
survey of 408 CISOs noted that most are dealing with a cybersecurity talent shortage
(Nominet Cyber Security, (2019), which adversely contributes to human performance,
54
HOLISTICA Vol 13, Issue 1, 2022, pp. 49-72
often in the form of stress, burnout, and fatigue. The survey pointed out that 17% of
CISOs used medication or alcohol to cope with stress, while 60% rarely unplug from their
jobs, and 88% reported working more than 40 hours per week (Nominet Cyber Security,
(2019). These statistics reflect the pressure and stress at the CISO-level, cascading down
the cybersecurity ranks due to the lack of human performance initiatives targeting
stress, fatigue, and burnout.
Human performance dilemmas in cybersecurity are exacerbated by many factors, such
as remote work, distractions, life-changing events, and a relentless threat environment.
For example, a recent survey of 2,000 office workers highlighted that younger
employees and employees caring for children or adults reported negative experiences
and engaged in riskier online behavior while working remotely (Cunningham, 2021). A
contemporary study highlighted that prolonged stress, anxiety, interruptions, and
burnout are human performance problems that require proactive leadership
engagement (Cunningham, 2021). Compounding issues such as working remotely and
constant changes in cybersecurity degrade human performance.
It is known that humans are the most significant vulnerability to your cybersecurity
programs (Moustafa, Bello, & Maurushat, 2021); yet, most business decision-makers
inadequately address human performance issues. The persistence of human
performance problems exists due to an “under-education” on human factors in
cybersecurity. Human factors researchers and practitioners need to partner with
industry and academia to create human factors educational programs and practical
solutions to reduce human performance issues in cyber. For example, federal
regulations mandate the working hours per day for airline pilots and flight attendants in
the commercial aviation industry. Addressing human performance problems in
cybersecurity aims to reduce cybersecurity risks and reinforce positive security behavior.
4.1 Security Fatigue
Security fatigue surfaced in existing literature as early as 2009 when researchers
revealed that organizations are prone to inducing security fatigue despite the plethora
of technologies and countermeasures to reduce information security risks (Furnell and
Thomson, 2009). A 2008 survey of 1,280 respondents indicated that one-third of
participants reported that security requirements impeded their jobs (SAI, 2008).
Researchers at the National Institute of Standards and Technology raised awareness on
security fatigue due to its unimpeded effort and challenges on information security
(Stanton et al., 2016). Researchers publish articles on security fatigue (Cram, Proudfoot,
& D’Arcy, 2019; Stanton et al., 2016); however, business organizations fail to account for
the phenomenon. Nobles (2019) argued that issues such as security fatigue continue to
plague information security, cybersecurity, and data privacy because human factors
practitioners are not engaged in supporting cybersecurity. Human factors practitioners
can evaluate high friction areas and address such issues through improving the system
design to reduce problematic areas such as security fatigue.
55
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
Researchers defined security fatigue as mental exhaustion after engaging in extended
periods of cognitive activity (Serfontein, Drevin, & Kruger, 2018). In addition, Ritchey
(2018) classified security fatigue as a weariness or lethargic nature that disregards
computer security. Therefore, it is essential to note the various types of fatigue in
cybersecurity and the need to annotate and define, as described in Table 1. Table 1
provides a list of documented fatigues in cybersecurity and indicates that the security
fatigue phenomenon is complex and progressing. Unfortunately, organizations lack the
organic expertise and partnerships to address security fatigue in current-day risk
management practices. Therefore, the intricate changes in the cybersecurity domain
further acerbate and perpetuate the challenge of remediating fatigue. Bone (2017)
underscored that stress, fatigue, and demanding security challenges diminish
employees’ cognitive abilities, resulting in successful semantic attacks. The increasing
number of types of security fatigue requires meticulous initiatives and remediation.
4.2 Types of Security Fatigue
Table 2 Different Types of Security Fatigue
Different Types of Security Fatigue
Type Definition
A condition of weariness and tiredness from
continuously validating one’s identity accompanied by
Authentication Fatigue the enforcement of creating complicated passwords,
passphrase expirations, and additional credentialing to
gain access (Sasse, 2013).
A state of mental fog is caused by exhaustion or
lethargic behavior stemming from exceeding one’s
Cognitive Fatigue mental acumen with strenuous or high attentional
demands and activities for an extended period
(Dykstra & Paul, 2019).
The concept of consumers becoming complacent to
data breaches results in less preparation and less than
Data Breach Fatigue
desirable security practices towards breaches (Kwon &
Johnson, 2015; Zorabedian, 2019).
The state of exceeding one’s cognitive abilities makes
Decision Fatigue frequent security decisions when manipulating
information and computer systems (Ritchey, 2018).
An overwhelming experience induced by the practice
Password Fatigue of committing too many passwords to memory
(Napallan, 2018).
Tiredness due to overburden of maintaining strict
compliance with increasing mandated laws in fear of
Regulatory Fatigue
being non-compliant (Corporate Compliance Insights,
2015).
Operator Fatigue This type of fatigue occurs as the onset of exhaustion
56
HOLISTICA Vol 13, Issue 1, 2022, pp. 49-72
and lethargic behavior due to continuous and
extensive exposure to cognitively demanding
cybersecurity operations (Dykstra & Paul, 2019).
The degradation and depletion of psychological
faculties due to
Mental Fatigue monotonous tasks, stress, and periods of inactivity
between tasks and
functions (Mirilla, Tappert, Frank, & Tao, 2018).
Formally known as chronic fatigue syndrome, it is a
weakening, prolonged-term disorder in which people
Chronic Fatigue suffer from exhaustion that is not remediated by rest,
a constant state of mental fogginess, and trouble with
memory and sleep (Davis, 2018).
The overindulgence of survey testing and various
Survey Fatigue instruments to gather feedback or responses results in
lower response rates (Roberts and Allen, 2015).
This type of mental exhaustion forms many false-
Alarm Fatigue
positive alerts that distrust alerts (LaManna, 2017).
Exhaustion occurs from monitoring and analyzing
Threat-Alert Fatigue (Alert
many incidents to determine the significance of the
Fatigue)
alerts related to cybersecurity (Aminanto et al., 2019).
Ineffective cybersecurity education makes employees
Training Fatigue frustrated or exhausted, resulting in less responsive
training outcomes (MacEwan, 2017).
Source: author synthesis
Safa, Von Solms, and Furnell (2016) indicated a deficiency in security awareness,
inexperience, carelessness, apathy, misbehavior, and resistance as salient factors that
result in human-enabled errors. The National Institute of Standards and Technology
study denoted that security fatigue results in personnel taking increased security risk
and practicing non-compliant behavior (Ritchey, 2018). The human element in
cybersecurity remains paramount as research and industry trends indicate a
continuation of risky security behavior; consequently, leading to business decision-
makers placing a heightened emphasis on information security awareness (Serfontein,
Drevin, & Kruger, 2018). Researchers postulated that security awareness programs lack
the comprehensiveness to address security problems such as security fatigue
(Serfontein, Drevin, & Kruger, 2018).
Existing literature on security fatigue could manifest in the management of security and
cognitively in executing security-related tasks and functions (Parkins et al., 2016).
Researchers suggested that fatigue impacts how an employee consciously and
unconsciously attains work objectives (Parkins et al., 2016). In addition, exceeding an
employee’s cognitive ability during a fatigued state could result in adaptive thinking to
determine a solution (Parkins et al., 2016). Although the researchers highlighted some
57
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
physiological implications of security fatigue, most fail to connect fatigue to human
factors. Other industries such as aviation, medicine, and industrial safety leverage
human factor initiatives to address human performance dilemmas (Nobles, 2019).
A growing concern in cybersecurity and information security is the mounting operational
demands that result in employee burnout. Cybersecurity fatigue and burnout are
growing phenomena exaggerated by a shortage of cyber professionals and an
increasingly tumultuous threat landscape (Hinkley, 2019). The relentless demand to
protect systems, intellectual property, data, and financial resources increases
cybersecurity professionals’ anxiety and stress (Hinkley, 2019). A recent Deloitte survey
of 1,000 employees indicated that 77% had experienced burnout in their current
positions, and more than 50% reported experiencing more than once (Fisher, 2018).
According to Ogbanufe and Spears (2019), cybersecurity professionals are under
immense pressure accompanied by a talent shortage that increases operational job
stressors, resulting in fatigue and burnout. Security fatigue and burnout require
immediate attention from business decision-makers, especially security and technology
executives responsible for information security, technology integration, governance, and
data privacy. Therefore, it is important to note that security and technology executives
struggle to remediate security fatigue and burnout because human factor practitioners
are primarily absent in cybersecurity operations (Nobles, 2019).
Security practices and user behavior are often opposing forces due to security fatigue-
inducing requirements; consequently, resulting in good security practitioners
circumventing security controls (Koppel, Blythe, Kothari, & Smith, 2016). Researchers
highlighted that security fatigue is analogous to decision fatigue in that it mandates
employees to make choices on depleted mental faculties (Stanton, Theofanos,
Prettyman, & Furman, 2016). One study the following effects from decision fatigue,
which has a direct correlation to security fatigue (Stanton et al., 2016):
1.) Evading pointless decisions
2.) Selecting the most straightforward option available
3.) Basing decisions on instantaneous motivation
4.) Selecting a simplified algorithm rather than a complicated alternative
5.) Acting impulsively
6.) Feeling overwhelmed and a loss of control
Security fatigue leads to frustration and a less than desirable attitude and behavior to
support informational assurance and security policies (Bojanova, Voas, Chang, &
Wilbanks, 2016). This further corroborated a study that compared cybersecurity
professionals and general users, in which both groups indicated a high level of
frustration and powerlessness regarding the information security rules (Koppel et al.,
2016). A significant takeaway from the study was that cybersecurity professionals could
use the findings of the general users’ group to help shape and scope access and
password policies that are user-friendly and less frustrating (Koppel et al., 2016). The
disconnect between cybersecurity professionals and general users emphasizes the need
58
HOLISTICA Vol 13, Issue 1, 2022, pp. 49-72
for psychology-based professionals to develop less fatigue-inducing policies and
practices.
59
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
indicates employees suffering from security fatigue and burnout syndrome (see Figure
3) (Tanimoto et al., 2017). Organizational leaders often misdiagnose fatigue, burnout,
and stress; consequently, resulting in the continual integration of additional
countermeasures. Tanimoto et al. (2017) refer to the unending process of integrating
security controls, policies, and countermeasures as the vicious cycle. This method is self-
induced and reflects the undervaluing of human factor engineering in cybersecurity.
Figure 2 Security Fatigue and Burnout Syndrome Vicious Cycle
(1) Inconvenice of
work factors
(5) Security
Fatigue and (2) Uptick in
Burnout security violations
Syndrome Set in
(4) Increased
(3) Security
security policies
Assessment and
and
rule tightening
countmeasures
4.3 Burnout
Researchers indicated that burnout is not an individual-based issue but is caused by the
workplace climate and environment (Maslach & Leiter, 2005). Maslach and Leiter (2005)
emphasized that when organizations neglect to account for the human side of work, a
disparity occurs between the nature of work and the disposition of people. According to
Signh (2021), the concept of burnout has not been studied in its application to
cybersecurity. At issue is the increasing number of cybersecurity attacks and incidents
predominantly resulting from human error. A significant gap in cybersecurity is the
oversight of human performance and the impact of cybersecurity attacks and incidents.
Valcour (2016) asserted that burnout is derived from a debilitated cognitive state that
negatively affects employees’ mental and physical health, as previously corroborated in
a 2013 study, which inferred that 65% of 5,100 workers in North America suffer
operational stressors, loss of control, and extreme fatigue. Researchers have linked
burnout to the following health ailments: (a) heart disease, (b) high blood pressure, (c)
sleep problems, (d) depression, (e) anxiety, and (f) drug and alcohol abuse (Valcour,
2016). Psychologists deemed burnout as a tri-dimensional problem that consists of (a)
exhaustion, (b) cynicism, and (c) inefficacy (Valcour, 2016). Pham (2016, 2019) stressed
60
HOLISTICA Vol 13, Issue 1, 2022, pp. 49-72
that the conceptualization of burnout implies that employees lack interests and
undervalue security matters because their jobs take a higher precedent than
cybersecurity.
Security compliance burnout is classified as psychological exhaustion and pessimism
towards designated security responsibilities based on the lack of interest and
underestimating security issues and measures (Pham, 2019). Ross et al. (2009)
contended that security controls are designed to motivate employees to comply and
have a positive security attitude. Tedious and straightforward tasks can increase security
compliance burnout coupled with the continuous implementation of security controls
and countermeasures, which increases stress resulting in reduced attention spans
(Pham, Brennan, & Furnell, 2019). According to researchers, burnout results from
demanding security requirements, the shortage of resources, and the persistent
pressure that leads to fatigue (Pham, Brennan, & Furnell, 2019). The result of
environmental and personal factors, as depicted in Figure 3, indicates the degradation of
human performance due to burnout.
Figure 3 Analytic Model of Burnout
61
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
practices. Amid COVID-19, burnout became a ubiquitous health issue; however, burnout
adversely affected the workforce before the most recent pandemic crisis (Thorbecke,
2021), and organizational leaders ignored its debilitation impact on employees. Malasch,
a seminal researcher on burnout, refuted the argument that burnout is caused by
employees failing to maintain their health (Thorbecke, 2021). The leading cause of
burnout is an unhealthy working environment or workplace situation (Thorbecke, 2021).
The prominent factor of burnout is exhaustion; researchers emphasized that extreme
physical, cognitive, and emotional fatigue are the fundamental catalyst that undercut
employees’ capacity to work productively and maintain a positive perspective (Maslach
& Schaufeli, 2001; Valcour 2016). Inefficacy refers to ineptitude and lack of
accomplishments and productivity, while cynicism correlates to attrition of engagement
(Valcour, 2016).
4.4 Stress
Organizations continue to fall short on preventing employees’ exposure to prolonged
stress (Fisher, 2018). The plaguing of stress accounts for more than 120,000 deaths and
the healthcare cost of $190B in the U.S. (Moss, 2019). The debilitating impacts of
workplace stress result in $500B annually and 550 million days of work lost (Moss,
2019). For example, in a recent industry survey, 70% of the respondents noted that
organizations struggle to minimize burnout, while 21% of the survey participants
emphasized that their employers do not offer stress-reduction programs. (Fisher, 2018).
Reviewing stress in cybersecurity can be explained using the person-environment fit
theory. The person-environment fit theory indicates that an imbalance between people
and their associated environments increases stress (Edwards, Caplan, & Van Harrison,
1998). Organizational leaders need to ensure an adequate balance between the
workplace environment and the employee.
Pham (2019) noted that information security stress had gained the attention of
behavioral experts. Existing literature reveals that workplace stress contributes to lower
production and non-compliant behavior towards organizational policies and procedures
(Pham, 2019). However, some researchers argue that strain, a prolonged stress
response, burnout, or work exhaustion improved workers’ effectiveness, efficiency,
decision quality, and decision accuracy (Monica & Gloria, 2019; Tobler et al., 2017; Wang
et al., 2017). Given the evolving nature and constant change in cybersecurity, the
person-environment fit is challenged and requires balancing to reduce the onset of
stress.
Cybersecurity professionals and information technologists work long hours under high
demand to prevent cyber attacks, data breaches, and ransomware attacks (Thomas,
2020). A 2019 survey indicated that 91% of Chief Information Security Officers (CISOs)
experienced moderate to high-stress levels, and 28% reported that the sustained stress
level impeded their performance (Thomas, 2019). The survey indicated that 17% of
CISOs used medication or alcohol to cope with stress, while 60% rarely unplug from their
jobs, and 88% reported working more than 40 hours per week (Nominet Cyber Security,
62
HOLISTICA Vol 13, Issue 1, 2022, pp. 49-72
2019). These statistics reflect the pressure and stress at the CISO-level, cascading down
the cybersecurity ranks due to the lack of human performance initiatives targeting
stress, fatigue, and burnout.
A recent study highlighted that stress had been theorized primarily as a negative
phenomenon, as apparent by adverse psychological reactions such as dissatisfaction,
fatigue, distress, job turnover, and non-compliant behavior (Singh, 2021). It is essential
to note the positive aspects of stress, existing literature highlights that security-related
stress increases compliance (Signh, 2021).
Research regarding stress in information security and cybersecurity is expanding. A
study conducted by Helkala et al. (2016) revealed cybersecurity professionals experience
more severe sleep, nutrition deprivation, and increased physical and physiological stress
compared to other employees. Singh (2021) raises an interesting point in that existing
research primarily focused on stress derived from information security mandates, while
the impact of security-related stress relating to cybersecurity professionals remains
unexplored.
63
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
while leaving the human element vulnerable (Michel, 2017; Nobles, 2019; Widenhorf,
2014). The failure to include psychology-based professionals in cybersecurity operations
prolongs the development of practical solutions to mitigate human behavior in
cybersecurity.
64
HOLISTICA Vol 13, Issue 1, 2022, pp. 49-72
one’s cognitive abilities and increase stress. The practice of HRO is deeply rooted in
highly complex technical fields (Wilson, Hamilton, & Stallbaum, 2020), and with
cybersecurity being a sociotechnical system and domain, underpinning cybersecurity
with HRO initiatives could reduce security incidents.
According to Wilson, Hamilton, and Stallbaum (2020), HRO is fundamentally based on
the following three practices: (a) mindfulness, (b) responsiveness, and (c) learning
capacity. Researchers expanded the HRO principles to address the human performance
gap in cybersecurity through an analogous concept known as high-reliability
cybersecurity organizations (HRCO) (Wilson, Hamilton, & Stallbaum, 2020). The pillars
for HRCO are depicted in Table 3.
65
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
fail, human performance is all that stands between you and a cyberattack”. When the
inevitable happens, are your employees suffer from security fatigue, stress, or burnout?
7. Recommendations
Currently, there is a human factors knowledge gap in cybersecurity; as a result, human
factors practitioners are not deemed critical stakeholders in cybersecurity. This critical
omission prevents organizations from leveraging the expertise of human factors. As a
result, business organizations struggle with persistent threats and expanding
vulnerabilities in cybersecurity while human performance issues continue to mount. The
human element remains one of the most underexplored areas in cybersecurity,
especially human behavior and human performance. Stress, security fatigue, and
burnout negatively impact employees’ ability to maximize cybersecurity. As illustrated in
Figure 4, technology-led dependency creates technical and complexity debt that
degrades human performance and results in a continuous cycle of cybersecurity
incidents (Wilson, Hamilton, & Stallbaum, 2020). Below are recommendations to
integrate human factors engineering to enhance human performance in cybersecurity.
Partner with Human Factors Experts. Organizations should partner with human factors
practitioners to address the high friction areas that impede human performance in
cybersecurity. Human factors practitioners can provide expertise in understanding the
technological implications and the adverse influence on employees from the fast pace of
technology (Hollnagel, 2016), especially the growth in cybersecurity. The increasing
demand for faster, better, and cheaper to attain higher levels of productivity and
performance through technological innovation is an essential human factor challenge
(Hollnagel. 2016). Unfortunately, organizations failed to account for the human element
by excluding human factors practitioners from contributing to these scientific
evolutions—which most organizations take for granted. The expertise of human factors
practitioners can help eliminate the unintended consequences stemming from not
accounting for humans and change the ways of work through technical means.
Cybersecurity is a sociotechnical system that requires a high level of availability,
functionality, and automation. Few organizations account for the human element when
designing systems in cybersecurity—hence a human factors practitioner can provide the
necessary expertise.
Implement a Human Factors Program. In addition to partnering with human factors
practitioners, it is prudent to implement a Cybersecurity Human Factors Program for
organizations with large and complex cybersecurity programs. A human factors program
in cybersecurity could improve the salient factors such as cybersecurity awareness and
security training to prevent security fatigue, not only to cybersecurity and information
security professionals but also non-technical personnel (Nobles, 2019). Implementing a
human factors program aims to reduce the high friction areas that result in
cybersecurity incidents such as degraded human performance. Such programs have
66
HOLISTICA Vol 13, Issue 1, 2022, pp. 49-72
proven effective in aviation, medicine, nuclear power, and industrial safety (Nobles,
2019) and should emphasize cybersecurity.
Practice Human-Centered Cybersecurity. As cybersecurity continues to evolve, the
complexity increases; thus, making it difficult for people to manage and comprehend the
systems within the system. A human-centered (design thinking) cybersecurity approach
is vital to ensure people are a centric pillar when developing systems. Human-centered
design is a common practice in human-computer interaction that incorporates human
factors when engineering human interfaces in computing (Boy, 2017). Complex systems
such as cybersecurity require rigorous focus on people and organizations when
designing systems to ensure human performance is not degraded or impeded when
interacting with the technologies (Boy, 2017), security policy compliance, change
management, and regulatory guidance. Evaluating cybersecurity task analysis through a
human-centered lens could provide a deeper understanding of tasks such as
differentiating critical tasks from routine tasks.
Establish Anti-Fatiguing Programs. The degradation of human performance in
cybersecurity is a critical problem deserving the immediate attention of business
decision-makers. Even though I only discussed stress, burnout, and security fatigue,
there is an extensive list of human performance challenges in cybersecurity that are
unmitigated and explored by cybercriminals. Other sociotechnical industries have
tackled human performance problems, and now is the time for the cybersecurity
industry to get serious about human factors. Implementing an anti-fatiguing initiative is
one way to address human performance degradation, especially exploring factors
causing stress, burnout, and fatigue and subsequently integrating prevention measures.
Stress, burnout, and security fatigue existed long before COVID-19. The pandemic
highlighted these human performance issues and how cybercriminals exploit people to
execute cyber-attacks. Human performance issues remain unmitigated and open vectors
for subsequent attacks without an anti-fatiguing program.
8. Conclusion
Human performance issues such as stress, burnout, and security fatigue are critical
concerns in cybersecurity. However, organizations are lethargic to address these issues
other than through technological means. As pointed out, technology-led cycles are
problematic and increase complexity debt that results in degraded human performance.
The constant technology changes coupled with a hyperactive cybersecurity threat
environment takes a toll on all employees. Cybercriminals target human weaknesses as
a vector to attack organizations because most businesses fail to solidify the human
element—technology alone is not enough. Organizations can reinforce cybersecurity
practices by learning from other industries and implementing human factors initiatives
to prevent human performance degradation. Stress, burnout, and security fatigue are
human risk factors that require mitigation and eradication to reduce the organization’s
chances of experiencing a successful cyber-attack or incident.
67
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
References
Aminanto M.E., Zhu L., Ban T., Isawa R., Takahashi T., Inoue D. (2019) Combating threat-alert
fatigue with online anomaly detection using isolation forest. In: Gedeon T., Wong K., Lee
M. (eds) Neural Information Processing. ICONIP 2019. Lecture Notes in Computer Science,
vol 11953. Springer, Cha
Bojanova, I., Voas, J., Chang, M., & Wilbanks, L. (2016). Cybersecurity or Privacy [Guest editors'
introduction]. I.T. Professional, 18(5), 16-17.
Bone, J. (2017). Cognitive Hack: The New Battleground in Cybersecurity... the Human Mind. CRC
Press.
Boy, G. A. (2017). Human-centered design of complex systems: An experience-based approach.
Design Science, 3.
Choi, H., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in
Human Behavior, 81, 42–51. https://doi.org/10.1016/j.chb.2017.12.001
Cong Pham, H., Brennan, L., & Furnell, S. M. (2019). Information security burnout: Identification
of sources and mitigating factors from security demands and resources. Journal of
Information Security and Applications. Retrieved from
http://hdl.handle.net/10026.1/13591. DOI: 10.1016/j.jisa.2019.03.012
Corporate Compliance Insights. (2015, May 13). Retrieved from
https://www.corporatecomplianceinsights.com/thomson-reuters-annual-cost-of-
compliance-survey-shows-regulatory-fatigue-resource-challenges-and-personal-liability-
to-increase-throughout-2015/
Cram, W. A., Proudfoot, J. G., & D'Arcy, J. (2019). When enough is enough: Investigating the
antecedents and consequences of information security fatigue. Information Systems
Journal.
Cunningham, M. (2021, March 25). “Tiny crimes” – How minor mistakes when remote working
could lead to major cybersecurity breaches (Part 1). Forcepoint.com. Retrieved from
https://www.forcepoint.com/blog/x-labs/minor-mistakes-major-breaches-pt-1.
Cybenko, G., Giani, A., & Thompson, P. (2002). Cognitive hacking: A battle for the
mind. Computer, 35(8), 50-56.
Davis, N. (2018, December 17). Chronic fatigue syndrome could be triggered by overactive
immune system. TheGuardian.com. Retrieved from
https://www.theguardian.com/society/2018/dec/17/chronic-fatigue-syndrome-could-be-
triggered-by-overactive-immune-system
Dykstra, J., & Paul, C. L. (2018). Cyber Operations Stress Survey (COSS): Studying fatigue,
frustration, and cognitive workload in cybersecurity operations. In 11th USENIX Workshop
on Cyber Security Experimentation and Test CSE, 18.
Edwards, J. R., Caplan, R. D., & Van Harrison, R. (1998). Person-environment fit theory. Theories
of organizational stress, 28(1), 67-94.
ENISA Threat Landscape 2021. (2021, October). Retrieved from
https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021
Fisher, J. (2018, July 31). How managers can prevent their teams from burning out. Retrieved
from https://hbr-org.cdn.ampproject.org/c/s/hbr.org/amp/2018/07/how-managers-can-
prevent-their-teams-from-burning-out
Furnell, S. and Thomson, K.L. (2009). Recognising and addressing security fatigue.” Computer
Fraud & Security, 11, 7–11, doi:10.1016/S1361-3723(09)70139-3.
68
HOLISTICA Vol 13, Issue 1, 2022, pp. 49-72
Grier, R. A. (2015, September). How high is high? A meta-analysis of NASA-TLX global workload
scores. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol.
59, No. 1, pp. 1727-1731). Sage CA: Los Angeles, CA: SAGE Publications.
Gutzwiller, R. S., Cosley, D., Ferguson-Walter, K., Fraze, D., & Rahmer, R. (2019, November).
Panel: Research sponsors for cybersecurity research and the human factor. In Proceedings
of the Human Factors and Ergonomics Society Annual Meeting (Vol. 63, No. 1, pp. 422-
426). Sage CA: Los Angeles, CA: SAGE Publications.
Helkala, K., Knox, B., Jøsok, Ø., & Knox, S. (2016). Factors to affect improvement in cyber officer
performance. Information & Computer Security.
Hinkley, C. (2019 September 16). Preventing PTSD and burnout for cybersecurity professionals.
Darkreading.com. Retrieved from https://www.darkreading.com/risk/preventing-ptsd-
and-burnout-for-cybersecurity-professionals/a/d-
id/1335750?fbclid=IwAR31h9dqAsT7oC5JaAEGseXlSnL1C1Jp5VsntlFGwDaFy4Pf82JSCIbFT
UU
Hollnagel, E. (2016). The nitty-gritty of human factors. Human factors and ergonomics in practice:
Improving system performance and human well-being in the real world, 45-64.
Hull, J. L. (2017). Analyst Burnout in the Cyber Security Operation Center-CSOC: A
Phenomenological Study (Doctoral dissertation, Colorado Technical University).
ISACA. (2020, November 18). Understanding and burning CISO burnout. ISACA.org. Retrieved
from https://www.isaca.org/resources/news-and-trends/industry-
news/2020/understanding-and-addressing-ciso-burnout
Koppel, R., Blythe, J., Kothari, V., & Smith, S. (2016). Beliefs about cybersecurity rules and
passwords: A comparison of two survey samples of cybersecurity professionals versus
regular users. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016).
Kwon, J., & Johnson, M. E. (2015, June). The market effect of healthcare security: Do patients
care about data breaches?. In WEIS.
Lallie, H. S., Shepherd, L. A., Nurse, J. R., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X.
(2021). Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and
cyber-attacks during the pandemic. Computers & Security, 105, 102248.
LaManna. M. (2017). Technology intercepts for cyber security applied to critical infrastructures.
WMSCI ,8-11.
Loui, R. K. (2020, February 28). #Psybersecurity: Mental healths impacts of cybersecurity attacks.
RSA Conference 2020. San Francisco, California
MacEwan, N. (2017). Responsibilisation, rules and rule-following concerning Cyber Security:
Findings from Small Business Case Studies in the U.K. (Doctoral dissertation, University of
Southampton).
Maslach, C., and Schaufeli, W. (2001). Job burnout. Annual Review of Psychology (52), pp. 397–
422.
Maslach, C., & Leiter, M. P. (2005). Reversing burnout. Standford Social Innovation Review, 43-49.
Mancuso, V. F., Strang, A. J., Funke, G. J., & Finomore, V. S. (2014, September). Human factors of
cyber-attacks: a framework for human-centered research. In Proceedings of the Human
Factors and Ergonomics Society Annual Meeting (Vol. 58, No. 1, pp. 437-441). Sage CA: Los
Angeles, CA: SAGE Publications.
Michel, A. (2017). Psyber Security: Thwarting Hackers with Behavioral Science. APS Observer,
30(9).
69
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
Mirilla, D. F., Tappert, C. C., Frank, R. I., & Tao, L. (2018). A proposed dynamic Security Operations
Center Management Framework for reducing task disengagement. Proceedings of
Student-Faculty Research Day, Pace University.
Monica, A., & Gloria, P. W. (2019). Stressed decision-makers and use of decision aids: a literature
review and conceptual model. Information Technology & People, 33(2), 710- 754.
https://doi.org/10.1108/ITP-04-2019-0194
Moss, J. (2019, December 11). Burnout is about your workplace, not your people. HBR.org.
Retrieved from https://hbr-org.cdn.ampproject.org/c/s/hbr.org/amp/2019/12/burnout-is-
about-your-workplace-not-your-people
Moustafa, A. A., Bello, A., & Maurushat, A. (2021). The role of user behaviour in improving cyber
security management. Frontiers in Psychology, 12.
Nobles, C. (2018). Botching human factors in cybersecurity in business organizations. HOLISTICA–
Journal of Business and Public Administration, 9(3), 71-88.
Nobles, C. (2019). Establishing human factors programs to mitigate blind spots in cybersecurity.
MWAIS 2019 Proceedings, 22. https://aisel.aisnet.org/mwais2019/22
Nobles, C. (2021a, February 8). The Human Factors Series: Burnout and fatigue are sustained
problems in cybersecurity. https://www.linkedin.com/pulse/human-factors-series-
burnout-fatigue-sustained-calvin-nobles-ph-d-/ [post]. LinkedIn.
https://www.linkedin.com/pulse/human-factors-series-burnout-fatigue-sustained-calvin-
nobles-ph-d-/
Nominet Cyber Security. (2019). Life inside the perimeter: Understanding the modern CISO.
Retrieved from Nominet-Cyber_CISO-report_FINAL-130219.pdf.
Nori, P., Bartash, R., Cowman, K., Dackis, M., & Pirofski, L. A. (2019, April). Is burnout infectious?
Understanding drivers of burnout and job satisfaction among academic infectious diseases
physicians. In Open forum infectious diseases (Vol. 6, No. 4, p. ofz092). U.S.: Oxford
University Press.
Ogbanufe, O., & Spears, J. (2019). Burnout in cybersecurity professionals. Proceedings of the 14th
Pre-ICIS Workshop on Information Security and Privacy, Munich, Germany, December 15,
2019.
Okereafor, K., & Adelaiye, O. (2020). Randomized cyber attack simulation model: a cybersecurity
mitigation proposal for post covid-19 digital era. International Journal of Recent
Engineering Research and Development (IJRERD), 5(07), 61-72.
Parkin, S., Krol, K., Becker, I., & Sasse, M. A. (2016). Applying cognitive control modes to identify
security fatigue hotspots. In Twelfth Symposium on Usable Privacy and Security ({SOUPS}
2016).
Pfleeger, S. L., Sasse, M. A., & Furnham, A. (2014). From weakest link to security hero:
Transforming staff security behavior. Journal of Homeland Security and Emergency
Management, 11(4), 489-510.
Pham, H.-C., El-Den, J., & Richardson, J. (2016). Stress-based security compliance model – an
exploratory study. Information and Computer Security, 24(4), 326.
Pham, H. C. (2019). Information security burnout: Identification of sources and mitigating factors
from security demands and resources. Journal of Information Security and Applications,
46, 96-107.
Platsis, G. (2019). The Human Factor: Cyber Security’s Greatest Challenge. In Cyber Law, Privacy,
and Security: Concepts, Methodologies, Tools, and Applications (pp. 1-19). IGI Global.
70
HOLISTICA Vol 13, Issue 1, 2022, pp. 49-72
Platsis, G. (2019, August 14). Is staff burnout the best reason to implement cybersecurity A.I.?
Securityintelligence.com. Retrieved from https://securityintelligence.com/articles/is-staff-
burnout-the-best-reason-to-implement-cybersecurity-ai/
Reeves, A., Delfabbro, P., & Calic, D. (2021). Encouraging employee engagement with
cybersecurity: How to tackle cyber fatigue. SAGE Open, 11(1), 21582440211000049.
Renaud, K. (2012). Blaming noncompliance is too convenient: What really causes information
breaches? Security & Privacy, IEEE 10 (3), 57-63.
Roberts, L. D., & Allen, P. J. (2015). Exploring ethical issues associated with using online surveys in
educational research. Educational Research and Evaluation, 21(2), 95-108.
Ritchey, D. (2018). Curing security fatigue. Security, 55(9), 10. Retrieved from
http://libproxy.temple.edu/login?url=https://search-proquest-
com.libproxy.temple.edu/docview/2109287230?accountid=14270
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in
organizations. computers & security, 56, 70-82.
SAI Global. (2008). SAI Global Information Security Awareness Survey 2008. Retrieved from
http://www.saiglobal.com
Sasse, M. A. (2013, August). Technology should be smarter than this!: A Vision for Overcoming
the Great Authentication Fatigue. In Workshop on Secure Data Management (pp. 33-36).
Springer, Cham.
Serfontein, R., Drevin, L., & Kruger, H. (2018). The feasibility of raising information security
awareness in an academic environment using SNA. In IFIP World Conference on
Information Security Education (pp. 69-80). Springer, Cham.
Singh, T. (2021). The role of stress among cybersecurity professionals (Doctoral dissertation, The
University of Alabama).
Sheridan, K. (2020, June 6). 90% of CISOs would pay for better work-life balance.
DarkReading.com. Retrieved from https://www.darkreading.com/risk/90--of-cisos-would-
cut-pay-for-better-work-life-balance/d/d-id/1336995
Stanton, B., Theofanos, M. F., Prettyman, S. S., & Furman, S. (2016). Security fatigue. I.T.
Professional, 18(5), 26-32.
Tanimoto, S., Nagai, K., Hata, K., Hatashima, T., Sakamoto, Y., & Kanai, A. (2017, July). A Concept
Proposal on Modeling of Security Fatigue Level. In 2017 5th Intl Conf on Applied
Computing and Information Technology/4th Intl Conf on Computational
Science/Intelligence and Applied Informatics/2nd Intl Conf on Big Data, Cloud
Thomas, B. (2019, December 26). Most urgent CISO skills 2020: Reporting avoiding burnout,
more. Bitsight.com. Retrieved from https://www.bitsight.com/blog/5-shocking-it-
cybersecurity-burnout-statistics.
Thomas, B. (2020, January 07). Five shocking I.T. and cybersecurity burnout statistics.
Bitsight.com. Retrieved from https://www.bitsight.com/blog/5-shocking-it-cybersecurity-
burnout-statistics.
Thorbecke, C. (2021, July 02). Why business leaders need a wake-up call to take burnout seriously
right now, experts say. Yahoo.com. Retrieved from https://www.yahoo.com/gma/why-
business-leaders-wake-call-100007147.html
Tobler, N., Colvin, J., & Rawlins, N. W. (2017). Longitudinal analysis and coping model of user
adaptation. Journal of Computer Information Systems, 57(2), 97-105.
https://doi.org/10.1080/08874417.2016.1183415
Valcour, M. (2016). Beating burnout. Harv Bus Rev, 94, 98-101.
71
HOLISTICA Vol 13, Issue 1, 2022, pp.49-72
Wang, J., Li, Y., & Rao, H. R. (2017). Coping responses in phishing detection: An investigation of
antecedents and consequences. Information Systems Research,28(2),378-396.
https://doi.org/10.1287/isre.2016.0680
Wilson, S., Hamilton, & Stallbaum, S. (2020, May 26). The unaddressed gap in cybersecurity:
Human performance. MIT Sloan Management Review. Retrieved from
https://sloanreview.mit.edu/article/the-unaddressed-gap-in-cybersecurity-human-
performance/
Zorabedian, J. (2019, February 01). Data breach fatigue makes every day feel like groundhog day.
SecurityIntelligence.com. Retrieved from https://securityintelligence.com/data-breach-
fatigue-makes-every-day-feel-like-groundhog-day
72