This paper addresses the issue of cyberloafing, a widespread problem for many organizations. Some researchers propose a deterrence approach, using acceptable use policies for internet-based applications along with mechanisms to monitor employee internet usage and detect unauthorized usage, as an effective solution. However, studies examining the effects of acceptable use policies and detection mechanisms on reducing cyberloafing have produced mixed results. This study aims to resolve these inconsistencies by using an experiment to demonstrate that the deterrence model impacts different types of cyberloafing in varied ways. The findings suggest that threats of termination and detection mechanisms individually serve as effective deterrents against activities such as viewing pornography, managing personal finances, and personal shopping. However, to discourage activities like personal emailing and social networking, these measures must be combined and actively enforced.
Critical success factors for security education, training and awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives
Cyber security has never been more important than it is today in an ever more connected and pervasive digital world....