Skip to main content
Mobile
  • Finance, Accounting & Economics
  • Global Business Management
  • Management, Leadership & Organisation
  • Marketing & Sales
  • Strategy
  • Technology & Operations
HS Talks HS Talks
Subjects  
Search
  • Notifications
    Notifications

    No current notifications.

  • User
    Welcome Guest
    You have Limited Access The Business & Management Collection
    Login
    Get Assistance
    Login
    Forgot your password?
    Login via your organisation
    Login via Organisation
    Get Assistance
Finance, Accounting & Economics
Global Business Management
Management, Leadership & Organisation
Marketing & Sales
Strategy
Technology & Operations
Practice paper

Computer misuse in the workplace

H. M. P. S. Herath and W. M. J. I. Wijayanayake
Journal of Business Continuity & Emergency Planning, 3 (3), 259-270 (2009)
https://doi.org/10.69554/PCCK1622

Abstract

Many information security specialists believe that promoting good end-user behaviour and restricting inappropriate end-user behaviour are vital for effective information security. Because of the importance of security-related end-user behaviour, it is important to have a systematic viewpoint on the different kinds of benefits for managers, auditors, information technologists and others with an interest in assessing and/or influencing end-user behaviour.

Keywords: computer security; user behaviour; acceptable use policy (AUP); password policy; security policy

The full article is available to subscribers to the journal.

Already a subscriber? Login or review other options.

Author's Biography

H. M. P. S. Herath is a business analyst/consultant at abas ERP Sri Lanka. He earned his BSc from the University of Kelaniya and BSc in information systems from the British Computer Society. He is currently studying for his MPhil research degree in business continuity management. His research interests are crisis and disaster management, business continuity and business readiness. Padmika is a Member of the UK Institution of Engineering and Technology, Member of the British Computer Society and a Chartered IT Professional.

W. M. J. I. Wijayanayake is a senior lecturer in information technology at the Department of Industrial Management, University of Kelaniya. His research interests include data engineering, telework, e-commerce, knowledge management and information system analysis/design. His research has been published in journals such as Journal of Information & Management, Journal of DATABASE and the Sri Lanka Journal of Management, and presented at many national and international academic conferences. He is also a consultant at the Center for Enterprise Management Information Service, funded by the UN Industrial Development Organization, and provides IT/management training to small and medium-size enterprise managers on management information systems (MIS) development, productivity improvement etc. He holds a bachelor’s degree in industrial management from the University of Kelaniya, a master’s degree in industrial engineering and management from the Tokyo Institute of Technology, and a PhD in management information systems, also from the Tokyo Institute of Technology.

Citation

Herath, H. M. P. S. and Wijayanayake, W. M. J. I. (2009, May 1). Computer misuse in the workplace. In the Journal of Business Continuity & Emergency Planning, Volume 3, Issue 3. https://doi.org/10.69554/PCCK1622.

Options

  • Download PDF
  • Share this page
    Share This Article
    Messaging
    • Outlook
    • Gmail
    • Yahoo!
    • WhatsApp
    Social
    • Facebook
    • X
    • LinkedIn
    • VKontakte
    Permalink
cover image, Journal of Business Continuity & Emergency Planning
Journal of Business Continuity & Emergency Planning
Volume 3 / Issue 3
© Henry Stewart
Publications LLP

The Business & Management Collection

  • ISSN: 2059-7177
  • Contact Us
  • Request Free Trial
  • Recommend to Your Librarian
  • Subscription Information
  • Match Content
  • Share This Collection
  • Embed Options
  • View Quick Start Guide
  • Accessibility

Categories

  • Finance, Accounting & Economics
  • Global Business Management
  • Management, Leadership & Organisation
  • Marketing & Sales
  • Strategy
  • Technology & Operations

Librarian Information

  • General Information
  • MARC Records
  • Discovery Services
  • Onsite & Offsite Access
  • Federated (Shibboleth) Access
  • Usage Statistics
  • Promotional Materials
  • Testimonials

About Us

  • About HSTalks
  • Editors
  • Contact Information
  • About the Journals

HSTalks Home

Follow Us On:

HS Talks
  • Site Requirements
  • Copyright & Permissions
  • Terms
  • Privacy
  • Sitemap
© Copyright Henry Stewart Talks Ltd

Personal Account Required

To use this function, you need to be signed in with a personal account.

If you already have a personal account, please login here.

Otherwise you may sign up now for a personal account.

HS Talks

Cookies and Privacy

We use cookies, and similar tools, to improve the way this site functions, to track browsing patterns and enable marketing. For more information read our cookie policy and privacy policy.

Cookie Settings

How Cookies Are Used

Cookies are of the following types:

  • Essential to make the site function.
  • Used to analyse and improve visitor experience.

For more information see our Cookie Policy.

Some types of cookies can be disabled by you but doing so may adversely affect functionality. Please see below:

(always on)

If you block these cookies or set alerts in your browser parts of the website will not work.

Cookies that provide enhanced functionality and personalisation. If not allowed functionality may be impaired.

Cookies that count and track visits and on website activity enabling us to organise the website to optimise the experience of users. They may be blocked without immediate adverse effect.