{"title":"Enforcement strategies for computer use violations at a public university","authors":"J. Craig","doi":"10.1145/245211.245218","DOIUrl":null,"url":null,"abstract":"Crafting appropriate use policies (AUP), is only the first step in addressing issues of inappropriate use of electronic resources on our college and university campuses. Many AUP's are intentionally general in order to cover as many contingencies as possible. Older AUP's may not have addressed many of the violations that have become more common with the advent of World Wide Web servers. The proliferation of computing activities and expanded body of users unfortunately has spawned an equally growing number of questionable activities. When confronted with these perceived inappropriate uses, computer resource managers must organize rational enforcement responses which assure due process and the protection of constitutional rights and privileges for all individuals.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"285 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1996-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Siguccs Newsletter","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/245211.245218","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Crafting appropriate use policies (AUP), is only the first step in addressing issues of inappropriate use of electronic resources on our college and university campuses. Many AUP's are intentionally general in order to cover as many contingencies as possible. Older AUP's may not have addressed many of the violations that have become more common with the advent of World Wide Web servers. The proliferation of computing activities and expanded body of users unfortunately has spawned an equally growing number of questionable activities. When confronted with these perceived inappropriate uses, computer resource managers must organize rational enforcement responses which assure due process and the protection of constitutional rights and privileges for all individuals.