Why users (fail to) read computer usage policies
نویسندگان
چکیده
Purpose – This paper aims to improve understanding of individuals’ awareness and perceptions of computer usage policies (CUPs) and why individuals elect not to read these policies. Design/methodology/approach – MBA students were asked to complete an online survey evaluating their behavioral intention to read CUPs, as well as their performance of this behavior. Factors contributing to the intention to read policies were also examined. The resulting data were analyzed with Smart PLS. Findings – Results suggest that three factors influence individual intention to read CUPs. These factors include attitude, apathy, and social trust. The model explained about 70 percent of individual intention to read CUPs and about 44 percent of the variability in actually reading these policies. Research limitations/implications – The sample is limited to MBA students from a single university. Practical implications – Although written policy statements are often considered the cornerstone of computer security, many individuals elect not to read these policies. Thus, other methods of communication must be used. Originality/value – This paper examines the reasons individuals elect not to read CUPs. Given the importance of these policies as deterrents to information systems misuse and computer crime, understanding why individuals fail to read policies is a critical first step in enhancing user knowledge of computer security.
منابع مشابه
بررسی شکایات چشمی و عوامل مرتبط در کاربران رایانه
Abstract Background: It is nearly twenty years passed from introducing of computer to human life and it is now an inseparable part of our life, because of widespread use of computer, many studies have been done for finding safety and health principle for these users, the aim of this study is determination of ophthalmic complains in Shahid Sadoughi University computer users. Methods: This des...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملImmediate Effects of Different Screen Sizes on Visual Fatigue in Video Display Terminal Users
Background: Computer usage has rapidly grown. This is because it helps to resolve problems, i.e., encountered in daily life by individuals. Various monitor screens that have been developed affect the userchr('39')s eyes. Screen size is one of the relevant impacts. Thus, this study compared the immediate effects of two computer screen sizes on visual fatigue in Video Display Terminal (VDT) users...
متن کاملThe invisible computer - why good products can fail, the personal computer is so complex, and information appliances are the solution
Imagine that you get such certain awesome experience and knowledge by only reading a book. How can? It seems to be greater when a book can be the best thing to discover. Books now will appear in printed and soft file collection. One of them is this book the invisible computer why good products can fail the personal computer is so complex and information appliances are the solution harvard orien...
متن کاملUser Perceptions Email users , expect - ing privacy , risk embarassment , law - suits , and worse . of Email Privacy Managing
Why do email users perceive their communications to be private when email provides virtually no safeguards against privacy violations? The ethical and legal controversies regarding email are increasingly debated by computer professionals, philosophers, politicians, journalists, and legal experts. Much of the debate focuses on employee expectations of privacy in their communications and their em...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Industrial Management and Data Systems
دوره 108 شماره
صفحات -
تاریخ انتشار 2008