Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Acceptable internet use policy

Published: 01 January 2002 Publication History

Abstract

Surveying use policies of three organizations--- educational institutions, ISPs, and non-ISPs.

References

[1]
Conlin, M. Workers, surf at your own risk. Business Week Online. (Aug. 4 1997);.www.businessweek.com/2000/00_24/b3685257.htm.
[2]
Csinger, A. and Siau, K. The global public key infrastructure: Terms and concepts. IEEE Comput. 31, 9 (Sept. 1998), 30-31.
[3]
Center for On-Line Addiction. Dealing with Internet misuse in the workplace; www.netaddiction.com/workplace.htm.
[4]
Greengard, S. The high cost of cyberslacking. Workforce Online. (Dec. 2000); www.workforce.com/archive/article/000/58/01.xci.
[5]
InternetWeek Online. Internet usage policies (Oct. 15, 1999); www.internetwk. com/numbers/numbers101599.htm.
[6]
Kallman, E.A. and Grillo, J.P. Ethical Decision Making and Information Technology: An Introduction with Cases. McGraw-Hill, New York, 1996.
[7]
Schwartz, K.D. We've got mail. CIO Magazine (Sept. 15, 2000); www2.cio.com/archive/091500_mail_content.html
[8]
Siau, K., Lim, E., and Shen, Z. Mobile commerce-Promises, challenges, and research agenda. J. Database Manag. 12, 3 (Jul.-Sept. 2001), 4-13
[9]
Websense Inc. Online. Web@Work study. (Feb. 2001); www. web-sense. com/
[10]
DVD Software, Inc. Workers abuse computer games. Futurist 31, 3 (May/June 1997), 13.
[11]
Yasin, R. Web slackers put on notice. Internet Week Online Archives (Oct. 15, 1999); www.internetwk.com/lead/lead101599.htm.

Cited By

View all
  • (2021)Intent-Based Network Policy to Solution Architecting RecommendationsInternational Journal of Business Data Communications and Networking10.4018/IJBDCN.202101010417:1(1-20)Online publication date: 1-Jan-2021
  • (2021)The Challenges and Policy Issues Faced by Saudi HEIs When Adopting or Formulating Social Media PoliciesSocial Computing and Social Media: Applications in Marketing, Learning, and Health10.1007/978-3-030-77685-5_13(161-173)Online publication date: 24-Jul-2021
  • (2019)Employees' ProtectionCyber Law, Privacy, and Security10.4018/978-1-5225-8897-9.ch066(1329-1348)Online publication date: 2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 45, Issue 1
Internet abuse in the workplace and Game engines in scientific research
January 2002
116 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/502269
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 2002
Published in CACM Volume 45, Issue 1

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)359
  • Downloads (Last 6 weeks)27
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Intent-Based Network Policy to Solution Architecting RecommendationsInternational Journal of Business Data Communications and Networking10.4018/IJBDCN.202101010417:1(1-20)Online publication date: 1-Jan-2021
  • (2021)The Challenges and Policy Issues Faced by Saudi HEIs When Adopting or Formulating Social Media PoliciesSocial Computing and Social Media: Applications in Marketing, Learning, and Health10.1007/978-3-030-77685-5_13(161-173)Online publication date: 24-Jul-2021
  • (2019)Employees' ProtectionCyber Law, Privacy, and Security10.4018/978-1-5225-8897-9.ch066(1329-1348)Online publication date: 2019
  • (2019)‘To be understood as to understand’: A readability analysis of public library acceptable use policiesJournal of Librarianship and Information Science10.1177/096100061987159852:3(713-725)Online publication date: 28-Aug-2019
  • (2019)ІМПЛЕМЕНТАЦІЯ КЕЙС-МЕТОДУ У ФОРМУВАННІ КЛІНІЧНОГО МИСЛЕННЯ СТУДЕНТІВ-МЕДИКІВМедична освіта10.11603/me.2414-5998.2019.2.10348(79-85)Online publication date: 15-Aug-2019
  • (2019)Workplace internet leisure and employees’ productivityInternet Research10.1108/IntR-05-2017-0191Online publication date: 4-Feb-2019
  • (2018)Assessing the impact of cyberloafing on cyber riskProceedings of the Annual Simulation Symposium10.5555/3213032.3213043(1-9)Online publication date: 15-Apr-2018
  • (2018)Employees' ProtectionWearable Technologies10.4018/978-1-5225-5484-4.ch052(1133-1152)Online publication date: 2018
  • (2018)Employees' ProtectionSocial Issues in the Workplace10.4018/978-1-5225-3917-9.ch048(951-970)Online publication date: 2018
  • (2018)Les questionnements éthiques en systèmes d’informationRevue Française de Gestion10.3166/rfg.2018.0022144:271(99-129)Online publication date: 27-Jun-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media