ipl-logo

Anti-Spyware Compliance Case Study

1552 Words7 Pages

H3: The positive relationship between the attitude or beliefs toward anti-spyware and behavioral intention to use anti-spyware will be stronger for full-time employees than for part-time employees. Simple gestures such as responding to pop-up advertisements can be used as caution to perform due diligence. Organizations have the ability to implement security plans in order to prevent spyware from continuously entering the environment. Business invest a large amount of money and time into programs in order to keep the entity running. According to Siponen & Vance (2010), business plans for IT security make it assessable for employees to get security support on software. A full time employee has more range of being able to know what is going on …show more content…

Siponen & Vance (2010) studied how work procedures play an imperative role in employees' behavioral intentions. If an employee is not aware of the security requirements, he or she is more likely to participate in activities such as gaining unauthorized access and or copying confidential data (Siponen & Vance, 2010). There are many possible noncompliance issues that could take place when an employee is not aware of workplace regulations (Bulgurcu, 2010). The information security behavior that happens in the workplace cannot be avoided at employees homes because users home environment provides a more relaxed nature. According to Bulgurcu (2010), employees need to conform to work place regulations so that they are responsible for what is done at the end of the day. The lack of supervision and management can create a bigger challenge in ensuring that all employees are engaging in security behavior methods. For this particular setting a user's information security behavior may directly rely on personal awareness and decisions. A business can take concern when employees partake in non-work at the workplace. Employees may use organizational information system resources for personal purpose during and after working hours which may cause spyware programs their initial gateway (D'Arcy et al. 2009). The behavior can lead to a waste of informational system resources and even a loss of assets for the organization. For the most part, most organizations prohibit the behavior of the noncompliance. Behavioral studies on abuse of IT were conducted by Tuglular & Spafford (1997). They concurred, employees use their data systems for personal use such as online shopping, playing online games, web chatting and many other resources. Although, it may seem as a senseless harm to access these websites, they in turn can cause much damage to the organization's

More about Anti-Spyware Compliance Case Study

    Open Document