Written in EnglishRead online
Thesis (M. Phil) - De Montfort University, Leicester 2002.
|Contributions||De Montfort University.|
Download Management of computer misuse committed by employees within organisations
MANAGEMENT Misuse of an employer’s data and computer systems is hardly a new issue, although T-Mobile’s recent experience (p) of a rogue employee apparently selling thou-sands of its customer records has brought the issue firmly back into the spotlight.
Where misuse of data and/or computer systems is suspected, the. The paper draws on the findings in the two case studies to identify some core ethical principles that organisations need to adopt in order to minimise or prevent computer misuse Discover the world. Security Threats in Employee Misuse of IT Resources Employees and other insiders are using computers and the Internet more and more in their day-to-day work.
Although these resources can greatly increase worker productivity, they can also be misused, leading to serious security threats.
This Research Byte is based on our full report, which analyzes 14 forms of insider misuse in detail. This recent case in the Employment Tribunal demonstrates that employers should be extremely careful when dealing with cases of misuse of computers at work.
A failure to deal properly with such cases could lead to a (potentially successful) claim for unfair dismissal by the employee concerned. We’ll therefore look at the following in this post to analyse how employers can avoid treating their. In summary, an employee’s misuse of a workplace computer for pornographic or racist purposes negatively affects an employer’s professional, ethical and operational integrity.
Employers are not required to tolerate the misuse of their computers and Internet access any more than they are required to put up with serious incidents of dishonesty.
Computer Crime and Security Survey, ) IM There are more than 43 million users misuse IM at workplace (IDC, ) P2P 45% of the executable files downloaded through popular P2P network Kazaa contain malicious code (TrueSecure, ) Legal A company can be liable to $k per pirated work for allowing employees toFile Size: 48KB.
By Jonathan T. Marks, CPA, CFF, CITP, CFE, and Pete A. Ugo, CPA The risk of fraud is a serious concern for all types of enterprises, but fraud can be particularly damaging to a nonprofit organization, for which a damaged reputation can have devastating consequences.
The Costs of Fraud in Nonprofit Organizations According to the Continued. Essay about The Computer Misuse Act - The Computer Misuse Act The Computer Misuse act is in place to prevent users using computers in an abusive way to the owner, whether this is a single owner or business/organisation.
It covers activities such as hacking & viruses E.g. Trojans & Worms. Computer Misuse Act The created three new offences in response to the Law Commission Working Paper No. on Criminal Law: Computer Misuse (Cm ), published in October Even before the Act, dishonest computer activities were quite well-covered by the criminal law, and in particular by theft, and related offences.
This paper focuses upon computer fraud committed by employees because reports claim that it is the employees who pose one of the greatest threats to organisations today.
Management organization and the computer; Paperback – January 1, See all formats and editions Hide other formats and editions. Price New from Used from Paperback, "Please retry" — Manufacturer: Free Press.
The Role of Leaders in Influencing Unethical Behavior in the Workplace Linda Klebe Treviño Michael E. Brown A fter years of focusing on explaining and predicting positive employee attitudes (e.g., job satisfaction, employee commitment) and behaviors (e.g., employee citizenship, work performance), organizational behaviorFile Size: KB.
Human resources, as a name for employees, was first used in a book published in according to Wikipedia and was regularly used in the early 's. The modern use of the term, human resources, dates from the 's. Now, most organizations call employees and the department or office designated to assist the organization and its people Author: Susan M.
Heathfield. Computer Misuse. Businesses, government and academic institutions are increasingly reliant on the Internet for their day-to-day business, while consumers are using e-commerce more and more for purchasing goods and services. This implies ever-increasing opportunities for hackers and virus writers to disrupt the activities of their fellow citizens.
Employee misuse of employers' computer, email or internet facilities is a common issue in the workplace. For example, non-work-related use of the internet at work, viewing of inappropriate material such as pornography, and harassment of colleagues or criticism of the employer on social media might all constitute employee misconduct.
Employers should have in place an email and internet policy. Workplace e-mail and Internet use: employees and employers beware An employee’s personal use of an employer’s e-mail system and of Internet access is not protected under the law, and employers can face legal liability for employees’ inappropriate use thereof groups view non-work-related use of the InternetCited by: That view is shared by a large majority of the odd organisations and individuals who made submissions to the Law Commission of England and Wales when it conducted its year-long study of the nature and extent of computer misuse, following the publication of its working green paper No.
The Computer Misuse Act (CMA) is a key piece of legislation that criminalises the act of accessing or modifying data stored on a computer system. Misuse of Company Time: How the Internet and Social Media are Creating a New Time Theft By Ryan Hancock Advisor: Dr. Dan Worrell!!!.
An Honors Thesis in partial fulfillment of the requirements for the degree Bachelor of Science in Business Administration in Supply Chain Management. Sam M. Walton College of Business University of ArkansasCited by: 1. IT misuse. Non-malicious IT misuse by an employee can occur when the employee improvises, takes short cuts, or works around IT procedures and guidelines in order to perform their job responsibilities, without malicious intent.
Specifically, employees might seek ways to continue use of obsolete or unauthorized software due to familiarity, or toAuthor: Randy G Colvin. Vendor fraud can be committed by employees acting alone or in collusion with vendors. This type of fraud can also be committed by vendors on their own.
Step 1: Examine your vendor files. To find out what to look for, download the free cheat sheet: 16 Ways to Identify Fictitious Vendors. Examples of vendor fraud are: Billing Schemes. Stephen D. Gantz, Daniel R. Philpott, in FISMA and the Risk Management Framework, Introduction.
Contemporary organizations depend on information technology. Both public and private sector organizations rely on information and information systems to enable business operations, enhance productivity, and support the efficient delivery of products and services.
Types of Technology Policies. Every company or organization with computer systems needs to have information technology policies in place to govern the use and management of those systems.
Technology policies clarify what you expect of your employees and users of your system and serve as a framework for IT business. There is a range of organisations that provide reporting systems and advice; for example, the Global Reporting Initiative.
The GRI produces e-newsletters. There are members of the GRI whose advice and systems will meet the GRI standard. Information on emissions trading can be gained from the Australian Government’s Department of the Size: KB.
Computers play a central role in an organization’s management information system. They serve as information hubs, shuttling data between various activities in a business.
With computers excelling at repetitive calculations, MIS and computers can process large amounts of data quickly. The aim of this study is to gain an understanding of why employees misuse information systems resources (commit IS resource misuse) in the workplace.
Rather than consider “intention,” as existing behavioral research commonly does, this study investigates actual behavior and employs IS resource misuse as the dependent by: Principles of Computer Systems and Network Management presents the algorithms, architectures, and design techniques for different aspects of system management.
The focus of the material is on showing the design principles underlying systems management tools and how concepts from various mathematical domains are applied to better manage computer by: 9. Internet Misuse By Employees In An Organization Cyber crime is the web world’s newest menace and internet misuse by employees at work has cost businesses in India and around the world losses worth millions of dollars.
And according to sources, it lightens the industrial purses in America by about two hundred billion dollars every year. Computer Misuse Policy. 3 Human Resource Policies and Procedures Introduction 1 Our human resource policies and procedures are formal commitments to how we treat employees.
The following policies and procedures have been developed, over time, taking account wherever possible of. The Association of Certified Fraud Examiners’ (ACFE) “ Report to the Nation” is one study that describes the losses that an entity may experience as a result of fraud: A typical organization loses approximately 5 percent of its annual revenue to fraudulent acts.
Nature of Job − Employees are satisfied and committed when they feel that their job provides the ability to use their inherent skills, having autonomy at work, performing a seemingly significant task, having healthy feedback mechanism, etc.
Employees also tend to be more satisfied when their jobs help them build new skills and improve themselves. Such employee Internet misuse creates new management dilemmas on how to respond to incidences of such misuse as well poses network security risks and drains on network bandwidth.
Within an organization, it is imperative to ensure that employees are using computing resources effectively and Cited by: Fraud risk management: a guide to good practice Management accountants, whose professional training includes the analysis of information and systems, can have a signiﬁ cant role to play in the development and implementation of anti-fraud measures within their organisations.
This guide is intended to help. Five years ago The Gallup Organization decided to create a better feedback process for employers large and small. The primary goal was to identify and measure the elements of worker engagement that are most powerfully linked to improved business outcomes -- be they sales growth, productivity, customer loyalty, and so forth -- and the generation of value.
The result was a 12. The Computer Misuse Act corrects this by making it an offence to use a computer to commit a crime in another country and to commit a crime in this country from a computer in another country.
Also in certain circumstances, where access occurs from abroad, it may be possible to bring in prosecution. Internet misuse has infiltrated offices, opening the door to lost productivity, liability and creation of a hostile work environment.
Many incidents of Internet misuse, similar to those below, have been reported in the media: Revenue Canada suspended six employees after an internal audit revealed that the employees were trading offensive.
The Serious Fraud Office is an arm of the Government of the United Kingdom, accountable to the Attorney-General. The National Fraud Authority (NFA) was, untila government agency co-ordinating the counter-fraud response in the UK.
Cifas is a British fraud prevention service, a not-for-profit membership organisation for all sectors that enables organisations to share and access fraud. The number of laws and regulations that have an impact on organisations operating within the EU can be bewildering.
Many of these European privacy laws have a direct bearing on how organisations Author: Michael Cobb. Some computer and information systems managers may experience considerable pressure in meeting technical goals with short deadlines or tight budgets.
As networks continue to expand and more work is done remotely, computer and information systems managers have to communicate with and oversee offsite employees using laptops, e-mail, and the Internet. 50 Journal of Computer Information Systems Winter threats deterrence, and human ethics to develop the theoretical model and hypotheses.
recent Studies Internet misuse, according to Lim , is “any voluntary acts of employees using their companies’ Internet access during office. Employee computer crime on the rise. (industry insider) David L. Ahl. Employee Computer Crime on the Rise Most computer crimes are not committed by hackers but by trusted employees--programmers, managers, clerks, and consultants--who turn against their employers, using company computers for extortion, theft, and sabotage.Could your organization benefit from high efficiency and increased productivity?
The obvious answer is ‘yes’. A good way to achieve these outcomes, and a myriad of other benefits, is through dedicated organizational development (OD). OD is the practice of planned, systemic change in the beliefs, attitudes and values of employees for individual and company growth.A code of conduct is a formal document companies prepare that outlines standards of acceptable workplace behavior and ethical decisions for employees.
It is designed to help companies develop a professional image and establish a strong ethical culture. For employees, a code of conduct offers clear guidance on what to.