Why users (fail to) read computer usage policies

نویسندگان

  • C. Bryan Foltz
  • Paul H. Schwager
  • John E. Anderson
چکیده

Purpose – This paper aims to improve understanding of individuals’ awareness and perceptions of computer usage policies (CUPs) and why individuals elect not to read these policies. Design/methodology/approach – MBA students were asked to complete an online survey evaluating their behavioral intention to read CUPs, as well as their performance of this behavior. Factors contributing to the intention to read policies were also examined. The resulting data were analyzed with Smart PLS. Findings – Results suggest that three factors influence individual intention to read CUPs. These factors include attitude, apathy, and social trust. The model explained about 70 percent of individual intention to read CUPs and about 44 percent of the variability in actually reading these policies. Research limitations/implications – The sample is limited to MBA students from a single university. Practical implications – Although written policy statements are often considered the cornerstone of computer security, many individuals elect not to read these policies. Thus, other methods of communication must be used. Originality/value – This paper examines the reasons individuals elect not to read CUPs. Given the importance of these policies as deterrents to information systems misuse and computer crime, understanding why individuals fail to read policies is a critical first step in enhancing user knowledge of computer security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بررسی شکایات چشمی و عوامل مرتبط در کاربران رایانه

Abstract Background: It is nearly twenty years passed from introducing of computer to human life and it is now an inseparable part of our life, because of widespread use of computer, many studies have been done for finding safety and health principle for these users, the aim of this study is determination of ophthalmic complains in Shahid Sadoughi University computer users. Methods: This des...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Immediate Effects of Different Screen Sizes on Visual Fatigue in Video Display Terminal Users

Background: Computer usage has rapidly grown. This is because it helps to resolve problems, i.e., encountered in daily life by individuals. Various monitor screens that have been developed affect the userchr('39')s eyes. Screen size is one of the relevant impacts. Thus, this study compared the immediate effects of two computer screen sizes on visual fatigue in Video Display Terminal (VDT) users...

متن کامل

The invisible computer - why good products can fail, the personal computer is so complex, and information appliances are the solution

Imagine that you get such certain awesome experience and knowledge by only reading a book. How can? It seems to be greater when a book can be the best thing to discover. Books now will appear in printed and soft file collection. One of them is this book the invisible computer why good products can fail the personal computer is so complex and information appliances are the solution harvard orien...

متن کامل

User Perceptions Email users , expect - ing privacy , risk embarassment , law - suits , and worse . of Email Privacy Managing

Why do email users perceive their communications to be private when email provides virtually no safeguards against privacy violations? The ethical and legal controversies regarding email are increasingly debated by computer professionals, philosophers, politicians, journalists, and legal experts. Much of the debate focuses on employee expectations of privacy in their communications and their em...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Industrial Management and Data Systems

دوره 108  شماره 

صفحات  -

تاریخ انتشار 2008