Abstract
Surveying use policies of three organizations--- educational institutions, ISPs, and non-ISPs.
- 1 Conlin, M. Workers, surf at your own risk. Business Week Online. (Aug. 4 1997);.www.businessweek.com/2000/00_24/b3685257.htm.Google Scholar
- 2 Csinger, A. and Siau, K. The global public key infrastructure: Terms and concepts. IEEE Comput. 31, 9 (Sept. 1998), 30-31.Google Scholar
- 3 Center for On-Line Addiction. Dealing with Internet misuse in the workplace; www.netaddiction.com/workplace.htm.Google Scholar
- 4 Greengard, S. The high cost of cyberslacking. Workforce Online. (Dec. 2000); www.workforce.com/archive/article/000/58/01.xci.Google Scholar
- 5 InternetWeek Online. Internet usage policies (Oct. 15, 1999); www.internetwk. com/numbers/numbers101599.htm.Google Scholar
- 6 Kallman, E.A. and Grillo, J.P. Ethical Decision Making and Information Technology: An Introduction with Cases. McGraw-Hill, New York, 1996. Google ScholarDigital Library
- 7 Schwartz, K.D. We've got mail. CIO Magazine (Sept. 15, 2000); www2.cio.com/archive/091500_mail_content.htmlGoogle Scholar
- 8 Siau, K., Lim, E., and Shen, Z. Mobile commerce-Promises, challenges, and research agenda. J. Database Manag. 12, 3 (Jul.-Sept. 2001), 4-13Google Scholar
- 9 Websense Inc. Online. Web@Work study. (Feb. 2001); www. web-sense. com/Google Scholar
- 10 DVD Software, Inc. Workers abuse computer games. Futurist 31, 3 (May/June 1997), 13.Google Scholar
- 11 Yasin, R. Web slackers put on notice. Internet Week Online Archives (Oct. 15, 1999); www.internetwk.com/lead/lead101599.htm.Google Scholar
Index Terms
Acceptable internet use policy
Recommendations
Policy change analysis based on "policy target---policy instrument" patterns: a case study of China's nuclear energy policy
Policy documents are the carriers of policy and provide a channel for researchers to observe the main contents of a policy and the policy process. Policy documents are different from traditional scientific texts (including papers and patents) because ...
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement
The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically ...
Conflicts in Policy-Based Distributed Systems Management
Modern distributed systems contain a large number of objects and must be capable of evolving, without shutting down the complete system, to cater for changing requirements. There is a need for distributed, automated management agents whose behavior also ...
Comments