Computer misuse in the workplace
H. M. P. S. Herath and
W. M. J. I. Wijayanayake
Journal of Business Continuity & Emergency Planning, 2009, vol. 3, issue 3, 259-270
Abstract:
Many information security specialists believe that promoting good end-user behaviour and restricting inappropriate end-user behaviour are vital for effective information security. Because of the importance of security-related end-user behaviour, it is important to have a systematic viewpoint on the different kinds of benefits for managers, auditors, information technologists and others with an interest in assessing and/or influencing end-user behaviour.
Keywords: computer security; user behaviour; acceptable use policy (AUP); password policy; security policy (search for similar items in EconPapers)
JEL-codes: M1 M10 M12 (search for similar items in EconPapers)
Date: 2009
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/3099/download/ (application/pdf)
https://hstalks.com/article/3099/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:jbcep0:y:2009:v:3:i:3:p:259-270
Access Statistics for this article
More articles in Journal of Business Continuity & Emergency Planning from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().