EconPapers    
Economics at your fingertips  
 

Computer misuse in the workplace

H. M. P. S. Herath and W. M. J. I. Wijayanayake

Journal of Business Continuity & Emergency Planning, 2009, vol. 3, issue 3, 259-270

Abstract: Many information security specialists believe that promoting good end-user behaviour and restricting inappropriate end-user behaviour are vital for effective information security. Because of the importance of security-related end-user behaviour, it is important to have a systematic viewpoint on the different kinds of benefits for managers, auditors, information technologists and others with an interest in assessing and/or influencing end-user behaviour.

Keywords: computer security; user behaviour; acceptable use policy (AUP); password policy; security policy (search for similar items in EconPapers)
JEL-codes: M1 M10 M12 (search for similar items in EconPapers)
Date: 2009
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/3099/download/ (application/pdf)
https://hstalks.com/article/3099/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:jbcep0:y:2009:v:3:i:3:p:259-270

Access Statistics for this article

More articles in Journal of Business Continuity & Emergency Planning from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:jbcep0:y:2009:v:3:i:3:p:259-270