Topic > Mitigating Computer Misuse at Work - 1865

Computer misuse is a ubiquitous behavior in many organizations. It has a serious influence on system security that should be considered by every organization. Inappropriate computer use in the workplace increases every year, and this deviant behavior has a negative influence on both organizations and employees (Bock, Park & ​​​​Zhang, 2010). D'Arcy, Hovav, and Galletta (2009) state that 50%-75% of security issues have been found within an organization and that most insider threats are related to the insecure operation of individual computers. Therefore, it is necessary for organizations to optimize system security by implementing a rational measure to moderate the unsafe behavior of individual computers in the workplace. Employees, who play a key role in protecting security, must be helped to increase compliance with information security policy. This essay will discuss which approach is more effective, reward (encourage employees to comply with the security policy and regulatory use of computers in the workplace) or punishment (prevent misuse and unsafe operation) , analyzing the impact of each mechanism and employee reaction to draw a conclusion that punishment is a more effective way than reward to moderate employee abuse and unsafe behavior regarding computer use at work. Of course, reward should be a more acceptable policy than punishment for employees. Employees would continue to perform their jobs well after being rewarded (Patel & Conklin, 2012). According to Gardner and Quigleym (2010), employees who have been rewarded in their work will be stimulated to have greater conformity to the purpose of their work. Adequate reward is directly related to employee job satisfaction. They will be more satisfied and... halfway than...... paper organizations. European Journal of Information Systems, 18,106–125Liao, Q., Luo, X., Gurung, A., & Li, L. (2009). Workplace management and employee abuse: Does punishment matter? The Journal of Computer Information Systems, 50(20), 49-59Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of reasoning and moral values ​​explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18, 126-139Patel, P., & Conklin, B. (2012). Perceived work productivity in small businesses: The effects of high-performance work systems and team culture through employee retention. Theory and Practice, 36(2), 205-235Spitzmuller, C., & Stanton, J.M. (2006). Examine employee compliance with organizational surveillance and monitoring. Journal of Work and Organizational Psychology, 79, 245–272