TITLE

¿Cómo prevenir conductas abusivas y delitos tecnológicos en la empresa?

AUTHOR(S)
Agustina, Jose R.
PUB. DATE
June 2013
SOURCE
IDP: Revista de Internet, Derecho y Politica;jun2013, Issue 16, p7
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The study of improper behaviour of employees in the use of the computer resources that a company provides them (PC, email, mobile telephone, PDA, etc.) represents an area of research of growing interest, in great part due to the financial impact, both direct and indirect, it can have on profits. This article analyses the strategies for prevention and control of the use of new technologies by employees in a sample of Spanish companies. Governance and direction of people and the prevention of abusive behaviour requires, at the very least, management formulas that take into account the different ethical, motivational and legal aspects involved so that the necessary control does not impinge on the creation and maintenance of the climate of trust required at organizations. This study aims to contribute more knowledge on the reality of how different control mechanisms are introduced, in line with similar studies, though it focuses on the control activity itself and the company's reaction, rather than the disloyal or abusive acts of employees. In conclusion, certain practical guidelines for companies are suggested with regard to controlling the activities of employees when using ICTs.
ACCESSION #
97347336

 

Related Articles

  • iPods, business ethics, and sleeping well at night. Ponton, Kevin T. // hfm (Healthcare Financial Management);Nov2003, Vol. 57 Issue 11, p90 

    Focuses on preventing financial fraud. Examples of financial mismanagement in business; Handling of financial issues that raise ethical concerns; Key considerations when choosing between disclosure and action.

  • PRESIDENT'S MESSAGE. Keefe, Joe // American Intelligence Journal;Sep2011, Vol. 29 Issue 2, p1 

    An introduction is presented in which the editor discusses an article on counterintelligence, information assurance, and tools for cyber defense.

  • Frontmatter.  // IT: Information Technology;Oct2019, Vol. 61 Issue 5, pI 

    No abstract available.

  • Bush Adds Stiff Penalties to Corporate Fraud Plan. Heller, Michele // American Banker;7/10/2002, Vol. 167 Issue 130, p3 

    Reports on U.S. President George W. Bush's proposed corporate reform plan. Addition of criminal penalties for corporate fraud; Imposition of the same rules on public companies that banking firms have had to follow; Call for an ethic of personal responsibility in the business community; Proposed...

  • Corporate FRAUD. OMBLER, KATHY // NZ Business + Management;May2016, Vol. 30 Issue 4, pM6 

    The article explores corporate fraud. Topics covered include the vulnerability of any organization from fraud, such as trusted employees stealing from their employer, the significance of systems, audits, and careful employment processes to preventing fraud, and the role that company culture and...

  • Less-Risky Business. Katz, Deena // Financial Planning;Oct2012, Vol. 42 Issue 10, p33 

    The article offers guidelines to protect companies from fraud. According to the author, exposure to fraud comes from the software being used, the handling of secure data and the continual connection to the Internet. She notes that human resources and compliance are the other vulnerabilities that...

  • Attacking Human Implants: A New Generation of Cybercrime. Gasson, Mark N.; Koops, Bert-Jaap // Law, Innovation & Technology;Dec2013, Vol. 5 Issue 2, p248 

    The article discusses the results of a research study on the effectivity of human information and communication technology (ICT) implants in common clinical use for links between technology and the human body. It mentions the vulnerability of human implants in crime victimisation and foreign...

  • Pakistan faces legal vacuum as cybercrimes ordinance lapsed.  // Flare (Pakistan);10/15/2012, p37 

    The article focuses on the legal operations of the users of information and communication technology (ICT) in Pakistan following the lapse of the Prevention and Control of Cyber Crimes Ordinance in 2009. It states that the improvement in ICT led to advantages and opportunities as well as threats...

  • Keeping Your Network Safe. Romeo, Jim // HR Magazine;Dec2002, Vol. 47 Issue 12, p42 

    Focuses on the role of human resource (HR) executives in the protection of sensitive data from internal and external security threats in the workplace. Risks to HR management systems; Protection from Internet hacking; Prevention of a security breach.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics