Sunday, March 24, 2019

Mitigating Computer Misuse at Work Essay -- Business Management

computer misuse is a ubiquitous behaviour in many organizations. It has a serious influence on system trade protection which should be considered by every organization. Inappropriate use of computer in workplace is increasing every year and this deviant behaviour has a negative influence on both organizations and employees (Bock, Park & Zhang, 2010). DArcy, Hovav and Galletta (2009) make that 50%-75% security issues have been found from the inside of an enterprise, and a legal age of internal threats are relating to individuals grave operation on computer. Therefore, it is necessary for organizations to optimize system security by implementing a keen-witted measure to moderate individuals unsafe behaviour on computer in workplace. Employees, who play a key role in security protection, need to be helped increase residency on reading security policy. This essay give discuss which is a more stiff approach, reward (encouraging employees comply with security policy and normative ly use computer in workplace) or punishment (preventing misuse and insecure operation), though analysing the impact of individually mechanism and employees reaction to draw a conclusion that punishment is a more effective way than reward to moderate employees misuse and unsafe behaviour regarding computer use at work.Admittedly, reward should be a more acceptable policy than punishment for employees. Employees would keep performing thoroughly in their work after being rewarded (Patel & Conklin, 2012). According to Gardner and Quigleym (2010), employees, who have been rewarded in their job, will be aroused to have a higher compliance on the purpose of their work. Appropriate reward is directly relating to employees working satisfaction. They will be more satisfied an... ...rganisations. European journal of Information Systems, 18,106 one hundred twenty-fiveLiao, Q., Luo, X., Gurung, A., & Li, L. (2009). Workplace management and employee misuse Does punishment matter? The Journal of Computer Information Systems, 50(20), 49-59Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to knowledge security rules? An empirical study. European Journal of Information Systems, 18, 126-139Patel, P., & Conklin, B. (2012). Perceived repel productivity in small firmsthe effects of high-performance work systems and assembly culture through employee retention. Theory and Practice, 36(2), 205-235Spitzmuller, C., & Stanton, J.M. (2006). Examining employee compliance with organizational surveillance and monitoring. Journal of Occupational and Organizational Psychology, 79, 245272

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.