Browsing by Subject "Social network analysis"
Now showing items 1-6 of 6
-
The feasibility of raising information security awareness in an academic environment using SNA
(Springer, 2018)The human aspect is one of the key success factors in information security (InfoSec). Its impact on InfoSec is so significant that multiple studies have shown that a balanced approach combining technology and security ... -
Identifying information security risks in a social network using self-organising maps
(Springer, 2019)Managing information security risks in an organisation is one of the most important tasks an organisation has. Unfortunately, due to the complexity of most organisational systems, identifying information security risks can ... -
A machine learning-based framework for anomaly detection
(North-West University (South Africa), 2023)With the expansion of modern technology and the increased adoption of digital payment methods, fraudsters are becoming more sophisticated in their approach. Organisations attempting to mitigate fraudulent attacks can ... -
Metacognitive locale : a design-based theory of students' metacognitive language and networking in mathematics
(2015)The purpose of this study was to design a local theory explaining the relationship between metacognitive language and networks as constructs of a local instructional theory in the context of a fourth-year intermediate ... -
’n Verkenning van Suid-Afrika se veranderende posisie in die wêreldhandelnetwerk 1948–1994
(AOSIS, 2017)An exploration of South Africa’s changing position in the World Trade Network 1948–1994. The World Trade Network (WTN) has been studied as a network in numerous studies. However, countries with smaller economies are usually ... -
Social network analysis in the context of information security risk management
(North-West University (South Africa), 2020)One of the primary factors that determines the efficacy of information security is addressing the risks associated with the human actors involved. This is usually accomplished through the use of security policies that aim ...