Using Deterrence to Mitigate Employee Internet Abuse

This study looks at the question of how to reduce/eliminate employee Internet Abuse. Companies have used acceptable use policies (AUP) and technology in an attempt to mitigate employees' personal use of company resources. Research shows that AUPs do not do a good job at this but that technology does. Research also shows that while technology can be used to greatly restrict personal use of the internet in the workplace, employee satisfaction with the workplace suffers when this is done. In this research experiment we used technology not to restrict employee use of company resources for personal use, but to make the employees more aware of the current Acceptable Use Policy, and measured the decrease in employee internet abuse. The results show that this method can result in a drop from 27 to 21 percent personal use of the company networks.

[1]  Joseph C. Ugrin,et al.  Exploring Internet Abuse in the Workplace: How Can We Maximize Deterrence Efforts? , 2008 .

[2]  Jo Ann Oravec Constructive approaches to internet recreation in the workplace , 2002, CACM.

[3]  Craig Van Slyke,et al.  End-User Learning through Application Play. , 2000 .

[4]  Donald F. Roy “Banana Time” Job Satisfaction and Informal Interaction , 1959 .

[5]  Gee-Woo Bock,et al.  Non-work related computing (NWRC) , 2009, CACM.

[6]  Leonard M. Jessup,et al.  Does electronic monitoring of employee internet usage work? , 2002, CACM.

[7]  Keng Siau,et al.  Acceptable internet use policy , 2002, CACM.

[8]  Daniel Gruhl,et al.  Sound index: charts for the people, by the people , 2009, CACM.

[9]  Jeffrey J. Johnson,et al.  Identifying Employee Internet Abuse , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[10]  Zsolt Ugray,et al.  EMPLOYEE INTERNET ABUSE: POLICY VERSUS REALITY , 2007 .

[11]  Claire A. Simmers Aligning internet usage with business priorities , 2002, CACM.

[12]  Raymond R. Panko,et al.  Monitoring for pornography and sexual harassment , 2002, CACM.

[13]  Thompson S. H. Teo,et al.  How do I loaf here? let me count the ways , 2002, CACM.

[14]  Dinesh A. Mirchandani,et al.  Reducing Internet Abuse in the Workplace , 2003 .

[15]  Karen A. Forcht,et al.  Computer Security Management , 1993 .

[16]  France Bélanger,et al.  Abuse or learning? , 2002, CACM.

[17]  Barry A. Friedman,et al.  Workplace Privacy: Employee Relations and Legal Implications of Monitoring Employee E-mail Use , 2007 .

[18]  Ronald R. Sims,et al.  Designing and Delivering Business Ethics Teaching and Learning , 2006 .

[19]  Thompson S. H. Teo,et al.  Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study , 2005, Inf. Manag..

[20]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[21]  James R. Rest Moral Development: Advances in Research and Theory , 1986 .

[22]  Ronald R. Sims,et al.  Teaching Business Ethics: Targeted Outputs , 2005 .