Many more corporate entities today are utilizing ICTs to identify opportunities for innovative and customer-centric, value-added products and services. Indeed, information systems have been key characteristic of any growing and successful businesses, as they utilize ICTs for business value creation. The key motivation for the huge investment in IT infrastructures is to ensure an upsurge in revenue and retention of sizeable market share. Computer Usage policy is a document that provides guidelines that regulates the acceptable usage of these systems by end-users. The provision of these guidelines also serve as benchmark metrics in assessing the abuse or misuse of corporate information systems. These misuse and/or abuse are referred to as vio...
This research provides a "rich insight'' into the management of Information Systems (IS) security wi...
Forensic or security auditing is not simply related to the detection of fraud and corruption within ...
Companies are increasing their investment in technologies to enable better access to information and...
In this paper we examine the legal aspects of corporate computer usage policies including their crea...
While computer technology is generally intended to increase employee productivity and effectiveness ...
Organizations introduce acceptable use policies to deter employee computer misuse. Despite the contr...
Computer security remains an important issue in the management of organizational information systems...
Organizations face growing liability with regard to employee use of electronic resources. To mitigat...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Purpose: The purpose of the study is to investigate the role of information security policy complian...
As computers enter the business environment with increasing regularity, their introduction is also c...
It is a known fact that some employees misuse the organizational computers to do their personal work...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
The advent of IT has created unprecedented opportunities for the occurrence of computer crime like f...
In recent years, computer crimes are posing a growing and major threat to organisations around the w...
This research provides a "rich insight'' into the management of Information Systems (IS) security wi...
Forensic or security auditing is not simply related to the detection of fraud and corruption within ...
Companies are increasing their investment in technologies to enable better access to information and...
In this paper we examine the legal aspects of corporate computer usage policies including their crea...
While computer technology is generally intended to increase employee productivity and effectiveness ...
Organizations introduce acceptable use policies to deter employee computer misuse. Despite the contr...
Computer security remains an important issue in the management of organizational information systems...
Organizations face growing liability with regard to employee use of electronic resources. To mitigat...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Purpose: The purpose of the study is to investigate the role of information security policy complian...
As computers enter the business environment with increasing regularity, their introduction is also c...
It is a known fact that some employees misuse the organizational computers to do their personal work...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
The advent of IT has created unprecedented opportunities for the occurrence of computer crime like f...
In recent years, computer crimes are posing a growing and major threat to organisations around the w...
This research provides a "rich insight'' into the management of Information Systems (IS) security wi...
Forensic or security auditing is not simply related to the detection of fraud and corruption within ...
Companies are increasing their investment in technologies to enable better access to information and...