All intellectual property rights, including copyright in this publication, except for those attributed to named sources, are owned by the author(s) of this research memorandum. No part of this publication may be copied or transmitted in any form without the prior written consent from the author(s) whose contact address is given on the title page of the research memorandum. 3 This paper is drawn from an ongoing eight-year research study that was motivated by evidence that Information Security predominantly focuses on technical issues within an environment that clearly affects and is affected by people. To address this, and give a richer understanding of the domain, Information Security (ISec) has been deconstructed using an evaluative model,...
With the transfer of sensitive information through a borderless and vulnerable cyber world in-format...
Organisations are under constant pressure to comply with information security requirements. However,...
The technological scenario always played a critical role in Information Security. However, in recent...
This dissertation addresses the general problem of managing information resources through considerat...
This thesis is about grounding an increasingly common practice in an established theory where no exp...
The research problem, research question, research objectives, research approach, and thesis structur...
The relationship between information technology and information security historically has been quite...
Information technology has dramatically increased online business opportunities; however these oppor...
An important aspect of any system development activity is about ensuring the security of both the IT...
This paper reviews the complex environment of information security and looks at several elements of ...
The security of information that is processed and stored in Information and Communications Technolog...
The security of information that is processed and stored in Information and Communications Technolog...
(ICT) has become an agent of change in this 21st century. The deployment of information and communic...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Abstract. Information security has begun to receive an increasing amount of intention. The importanc...
With the transfer of sensitive information through a borderless and vulnerable cyber world in-format...
Organisations are under constant pressure to comply with information security requirements. However,...
The technological scenario always played a critical role in Information Security. However, in recent...
This dissertation addresses the general problem of managing information resources through considerat...
This thesis is about grounding an increasingly common practice in an established theory where no exp...
The research problem, research question, research objectives, research approach, and thesis structur...
The relationship between information technology and information security historically has been quite...
Information technology has dramatically increased online business opportunities; however these oppor...
An important aspect of any system development activity is about ensuring the security of both the IT...
This paper reviews the complex environment of information security and looks at several elements of ...
The security of information that is processed and stored in Information and Communications Technolog...
The security of information that is processed and stored in Information and Communications Technolog...
(ICT) has become an agent of change in this 21st century. The deployment of information and communic...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Abstract. Information security has begun to receive an increasing amount of intention. The importanc...
With the transfer of sensitive information through a borderless and vulnerable cyber world in-format...
Organisations are under constant pressure to comply with information security requirements. However,...
The technological scenario always played a critical role in Information Security. However, in recent...