Share these talks and lectures with your colleagues
Invite colleaguesComputer misuse in the workplace
Abstract
Many information security specialists believe that promoting good end-user behaviour and restricting inappropriate end-user behaviour are vital for effective information security. Because of the importance of security-related end-user behaviour, it is important to have a systematic viewpoint on the different kinds of benefits for managers, auditors, information technologists and others with an interest in assessing and/or influencing end-user behaviour.
The full article is available to subscribers to the journal.
Author's Biography
H. M. P. S. Herath is a business analyst/consultant at abas ERP Sri Lanka. He earned his BSc from the University of Kelaniya and BSc in information systems from the British Computer Society. He is currently studying for his MPhil research degree in business continuity management. His research interests are crisis and disaster management, business continuity and business readiness. Padmika is a Member of the UK Institution of Engineering and Technology, Member of the British Computer Society and a Chartered IT Professional.
W. M. J. I. Wijayanayake is a senior lecturer in information technology at the Department of Industrial Management, University of Kelaniya. His research interests include data engineering, telework, e-commerce, knowledge management and information system analysis/design. His research has been published in journals such as Journal of Information & Management, Journal of DATABASE and the Sri Lanka Journal of Management, and presented at many national and international academic conferences. He is also a consultant at the Center for Enterprise Management Information Service, funded by the UN Industrial Development Organization, and provides IT/management training to small and medium-size enterprise managers on management information systems (MIS) development, productivity improvement etc. He holds a bachelor’s degree in industrial management from the University of Kelaniya, a master’s degree in industrial engineering and management from the Tokyo Institute of Technology, and a PhD in management information systems, also from the Tokyo Institute of Technology.
Citation
Herath, H. M. P. S. and Wijayanayake, W. M. J. I. (2009, May 1). Computer misuse in the workplace. In the Journal of Business Continuity & Emergency Planning, Volume 3, Issue 3. https://doi.org/10.69554/PCCK1622.Publications LLP