78 REFERENCES Asian Development Bank 2001, Report and Recommendation of President to the Board of Directors on Proposed Loan, Partial Credit Guarantee and Technical Assistance to Democratic Socialist Republic of Sri Lanka for the SME Sector Development Program, RRP: SRI 33246, Retrieved August 10, 2007 from http://www.adb.org/Documents/RRPS/SRI/rrp_33246.pdf Case, CJ & Young, KS 2001, ‘Internet Risk Management: Building a Framework for Research’, Proceedings of the American Society of Business and Behavioral Sciences, pp. 16-18. Case, CJ & Young, KS 2002, Employee Internet Use Policy: An Examination of Perceived Effectiveness. Retrieved March 11, 2007 from http://www.iacis.org/iis/2002_iis/PDF%20Files/CaseYoung.pdf Chang, SE & Lin, CS 2007, ‘Exploring Organizational Culture for Information Security Management’, Industrial Management & Data Systems, vol.107, no. 3, pp.438-48. Department of Census and Statistics – Sri Lanka 2004, Computer Literacy of Sri Lanka. Retrieved August 26, 2007 from http://www.statistics.gov.lk/cls2004/index.htm Dhillon, G 1999, ‘Managing and Controlling Computer Misuse’, Information Management & Computer Security, vol. 7, no. 4, pp. 171-175. Enbysk, M n.d, Should You Monitor Your Employee’s Web Use?. Retrieved February 22, 2007, from http://www.microsoft.com/smallbusiness/resources/ management/ employee-relations/should-you-monitor-your-employees-web-use.mspx Foltz, CB, Cronan, TP & Jones, TW 2005, ‘Have You Met Your Organization's Computer Usage Policy?’, Industrial Management & Data Systems, vol.105, no.2, pp.137-146, February. 79 Gattiker, E & Kelley, H 1999, ‘Morality and Computers: Attitudes and Differences in Judgments’, Information Systems Research, vol. 10, no. 3, pp. 233 – 254, March. Harrington, SJ 1996, ‘The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions’, MIS Quarterly, vol. 20, no. 3, pp. 257-278. Indiana Department of Education, 2007, State Recommendations for Public School Internet Acceptable Use Policy and Guidelines. Retrieved October 6, 2007 from http://doe.state.in.us/olr/aup/aupreq.html Information and Communication Technology Agency of Sri Lanka 2005, Information Systems Acceptable Use, Retrieved October 8, 2007 from http://www.icta.lk/Insidepages/ReGov/ICTPolicy/ICTPolicyDocs/12-Information% 20Systems%20Acceptable% 20Use.pdf Kanungo, S 1998, ‘An Empirical Study of Organizational Culture and Network-Based Computer Use’, Computer in Human Behavior, vol. 14, no.1, pp. 79-91. Kentucky Government, 2007, Acceptable Use Policy Guidelines and State Requirements for Student and Staff Access to Electronic Information Resources. Retrieved October 6, 2007 from http://www.education.ky.gov/KDE/Administrative+Resources/Technology/ Additional+Technology+Resources/Acceptable+Use+Policy+Guidelines+and+State+Req uirements+for+Student+and+Staff+Access+to+Electronic+I.htm Kreie, J & Cronan, TP 1998, ‘How Men and Women View Ethics’, Communications of the ACM, vol. 31, no. 9, pp.70-76, September. Kapurubandara, M & Lawson, R 2006, Barriers to ICT and e-commerce with SMEs in Developing Countries: An Exploratory study in Sri Lanka, Retrieved August 10, 2007 from http://www.collecter2006.unisa.edu.au/Paper%209%20Mahesha%20Kapurubandara.pdf 80 Lawrence, P n.d., Acceptable Use: Whose Responsibility is it?. Retrieved February 12, 2007, from http://www.attackprevention.com/article/Acceptable_Use_Whose_ Responsibility_ Is_It-792.html Leonard, LNK & Cronan, TP 2005, ‘Attitude toward Ethical Behavior in Computer Use’, Industrial Management & Data Systems, vol. 105, no. 9, pp. 1150 – 1171. Lichtenstein, S & Swatman, PMC 1997, ‘Internet Acceptable Usage Policy for Organizations’, Information Management and Computer Security, vol. 5, no. 2, pp. 182- 190, December. Loch, KD & Conger, S 1996, ‘Evaluating Ethical Decision Making and Computer Use’, Communications of the ACM, vol. 39, no. 7, pp. 74 – 83, July. Marson, CD 2000, Are workers cyber-moonlighting? Retrieved June 18, 2007 from http://archives.cnn.com/2000/TECH/computing/03/08/moonlight.idg/index.html Mastrangelo, P M , Everton, W & Jolton, JA 2006, ‘Personal Use of Work Computers: Distraction versus Destruction’, Cyber Psychology & Behavior, vol. 9, no. 6, pp.730 – 741, November McShane, SL & Glinow, MAV 2005, Organizational Behavior, 3rd edn, Tata McGraw- Hill, New Delhi. Peterson, DK 2002, ‘Computer Ethics: The Influence of Guidelines and Universal Moral Beliefs’, Information Technology & People, vol. 15, no. 4, pp. 346 – 361. Pierce, MA & Henry, JW 1996, ‘Computer Ethics: The Role of Personal, Informal and Formal Codes’, Journal of Business Ethics, vol. 15, no. 4, April, pp.425- 437. Pierce, MA & Henry, JW 2000, ‘Judgements about Computer Ethics: Do Individual, Co- worker, and Company Judgements Differ? Do Company Codes Make a Difference’, Journal of Business Ethics, vol. 28, no. 4, December, 307 – 322. 81 Schulman, A 2001, The Extent of Systematic Monitoring of Employee Email and Internet Use. Retrieved March 10, 2007, from http://www.diogenesllc.com/Internetmonitoring.pdf Sekaran, U 2006, Research Methods for Business A Skill-Building Approach, 4th edn, John Wiley & Sons (Asia), Singapore. Sri Lanka Information and Communication Technology Association 2007, Rising Demand: The increasing demand for IT workers spells a challenging opportunity for the IT industry. Retrieved 03 September, 2007 from http://www.icta.lk/Insidepages/downloadDocs/ICTWorkforcSurvey2007.pdf Sri Lanka Telecom Official Site n.d, SLTNET Internet Prepaid Card (IPC), Retrieved on October 9, 2007 from http://www.slt.lk/data/forhome/093sltnet_prepaid.htm Stephan, B & Petropoulakis, L 2007, ‘The Design and Implementation of an Agent-based Framework for Acceptable Usage Policy Monitoring and Enforcement’, Journal of Network and Computer Applications, vol. 30, no. 2, pp. 445-465. Totten, JA 2004, ‘The Misuse of Employer Technology by Employees to Commit Criminal Acts’, Proceedings of the ABA Section of Labor and Employment Law Technology Committee Midyear Meeting, Labor and Employment Law Technology Committee, Miami. Verespej, MA 2000, Inappropriate Internet Surfing, Industry Week, 02 July 02. Retrieved March 10, 2007, from http://www.industryweek.com/CurrentArticles/asp/ articles.asp? ArticleId=740 Vitell, SJ & Davis, DL 1990, ‘Ethical Beliefs of MIS Professionals: The Frequency and Opportunity for Unethical Behavior’, Journal of Business Ethics, vol. 9, pp. 63 – 70, January. Walsham, G 1996, ‘Ethical Theory, Codes of Ethics and IS Practice’, Information Systems Journal, vol. 6, pp. 69 – 81. 82 WeComply Inc., 2007, Nothing Personal: Survey of Computer Use at Work. Retrieved March 11, 2007, from http://www.wecomply.com/media/Nothing_Personal_Report.pdf Wheelen, TL, Hunger, JD & Rangarajan K 2006, Concepts in Strategic Management and Business Policy, 9th edn, Korling Kindersley Pvt. Ltd., Delhi. Zetter, K 2007, ‘Is Your Boss Spying on You? It’s legal, it’s happening and it can get you fired’, Reader’s Digest, November, pp. 97 - 103. Zhang, D, Oh, LB & Teo, HH 2006, ‘An Experimental Study of the Factors Influencing Non-Work Related Use of IT Resources at Workplace’, Proceedings of the thirty ninth Hawaii International Conference on System Sciences, Hawaii International Conference, Hawaii, p 206a. Retrieved June 18, 2007 from http://csdl.computer.org/comp/proceedings/hicss/2006/2507/08/250780206a.pdf 83 BIBLIOGRAPHY Brace, I 2005, Questionnaire Design, Kogan Page India – New Delhi. Data Security Policies, 2007, Email Acceptable Use Policy. Retrieved October 6, 2007 from http://www.datasecuritypolicies.com/tag/acceptable-use-policy/ Aczel, AD, Sounderpandian, J 2006, Complete Business Statistics, 6th edn, Tata McGraw-Hill, New Delhi.