Inappropriate use of computer technology and resources
Computer-related mistakes: Errors, failures, and other computer problems that make computer output incorrect or not useful, caused mostly by human error
Cyberterrorist intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and information stored on them
Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as governmental focal point for fighting cyberterrorism
Fundamental truths or rules that serve as a foundation for behavior or thought; in the context of computer use, principles might include following established procedures to ensure proper use of equipment, adhering to policies that protect against computer crime, and prioritizing ergonomic considerations to promote positive health effects
Policies and procedures
Established rules and guidelines that outline how an organization expects its members to behave; in the context of computer use, policies and procedures might include guidelines for disposing of outdated computer equipment to minimize waste, protocols for reporting and responding to computer crime, and standards for setting up workstations to promote employee health and comfort
Computer crime
Illegal activity that involves a computer or network; examples of computer crime might include hacking or unauthorized access to a computer system, spreading malware or viruses, and using a computer to commit fraud or identity theft
Jobs, equipment, and working conditions
Factors that can impact an employee's health and well-being while using a computer; considerations might include providing ergonomic equipment to promote good posture and reduce strain, encouraging regular breaks and stretching to prevent repetitive stress injuries, and ensuring that workspaces are well-ventilated and free from glare to reduce eye strain and fatigue