Browsing by Subject "Information security"
Now showing items 1-10 of 13
-
The application of behavioural thresholds to analyse collective behaviour in information security
(Emerald, 2017)Purpose The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns. Design/methodology/approach Generic ... -
Behavioural threshold analysis: methodological and practical considerations for applications in information security
(Taylor & Francis, 2019)The application of behavioural threshold analysis to analyse group behaviour in information security presents a unique challenge in terms of the measurement instruments and methodology used to gather relevant attitude data. ... -
Behavioural thresholds in the context of information security
(HAISA, 2016)This research presents the exploratory application of behavioural threshold theory on group behaviour related to information security. Behavioural threshold analysis is presented as a possible tool for aiding the development ... -
Cancelable biometrics using hand geometry-based steganographic techniques
(North-West University (South Africa), 2019)Biometrics have long been used as an accepted user authentication method and have been implemented as a security measure in many real-world systems including personal computers, mobile devices, and physical access control. ... -
Considering the influence of human trust in practical social engineering exercises
(IEEE, 2014)There are numerous technical advances in the field of information security. However, the application of information security technologies alone is often not sufficient to address security issues. Human factors play an ... -
I shall, we shall, and all others will: paradoxical information security behaviour
(Emerald, 2018)Purpose – The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security. Design/methodology/approach – Behavioural threshold analysis is used to test ... -
Identifying information security risks in a social network using self-organising maps
(Springer, 2019)Managing information security risks in an organisation is one of the most important tasks an organisation has. Unfortunately, due to the complexity of most organisational systems, identifying information security risks can ... -
Information management : best practices in broad base industries
(North-West University, 2006)Many organisations recognise the importance of Information Management (IM) and are implementing it into the structure and culture of their organisation and the roles of their managers and employees. More and more, organisations ... -
Information security education. Information security in action
(Springer, 2020)This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to ... -
Reflections on the ethical content of the IT Honours program project module
(Springer, 2015)Honours programs in South African universities must include a research project module. There are external pressures from professional bodies and government that influences the nature of the project module. This paper ...