blog




  • Essay / Mitigating Computer Misuse at Work - 1865

    Computer misuse is a pervasive behavior in many organizations. This has a serious influence on system security which should be considered by every organization. Inappropriate computer use in the workplace is increasing every year and this deviant behavior has a negative influence on both organizations and employees (Bock, Park & ​​Zhang, 2010). D'Arcy, Hovav and Galletta (2009) mention that 50 to 75% of security problems were detected inside a company and that the majority of internal threats are linked to the dangerous operation of an individual on their computer . Therefore, it is necessary for organizations to optimize system security by implementing a rational measure to moderate unsafe behaviors of individuals on their computers at their workplace. Employees, who play a key role in protecting security, must be supported to increase compliance with the information security policy. This essay will discuss which approach is more effective, reward (encouraging employees to comply with the security policy and use the computer in a prescriptive manner in the workplace) or punishment (preventing abuse and unsecured operations), while analyzing the impact of each mechanism and the reaction of employees to draw a conclusion that punishment is a more effective means than reward to moderate abuse and dangerous behavior of employees regarding computer use at work. Certainly, reward should be a more acceptable policy than punishment for employees. Employees would continue to perform well in their jobs after being rewarded (Patel and Conklin, 2012). According to Gardner and Quigleym (2010), employees who have been rewarded in their work will be motivated to conform more to their work goals. Appropriate reward is directly linked to employee job satisfaction. They will be more satisfied with a...... middle of paper organization. European Journal of Information Systems, 18,106–125Liao, Q., Luo, X., Gurung, A. and Li, L. (2009). Workplace Management and Employee Abuse: Does Punishment Matter? The Journal of Computer Information Systems, 50(20), 49-59 Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T. and Vance, A. (2009). What levels of moral reasoning and values ​​explain compliance with information security rules? An empirical study. European Journal of Information Systems, 18, 126-139Patel, P. and Conklin, B. (2012). Perceived work productivity in small businesses: Effects of high-performance work systems and group culture through employee retention. Theory and Practice, 36(2), 205-235Spitzmuller, C. and Stanton, J.M. (2006). Review employee compliance with organizational monitoring and control. Journal of Work and Organizational Psychology, 79, 245–272