The human component is a significant factor in information security, with a large numbers of breaches occurring due to unintentional user error. Technical solutions can only protect information so far and thus the human aspect of security has become a major focus for discussion. Therefore, it is important for organisations to create a security conscious culture. However, currently there is no established representation of security culture from which to assess how it can be manoeuvred to improve the overall information security of an organization. This is of particular importance for small organizations who lack the resources in information security and for whom the culture of the organization exerts a strong influence. A review of multiple ...
Information security programs are instituted by organizations to provide guidance to their users who...
Part 10: Organizational SecurityInternational audienceAn increasing number of information security b...
It is generally accepted that the protection of the organization’s information assets begins with th...
The human component is a significant factor in information security, with a large numbers of breache...
A significant volume of security breaches occur as a result of the human aspects and it is consequen...
The current study originated from the realisation that information security is no longer solely depe...
Information security is a relevant fact for current organizations. There are factors inextricably li...
B1 - Research Book ChaptersIn organizations, employee behaviour has a considerable impact on informa...
The ideal or strong information security culture can aid in minimising the threat of humans to infor...
The ideal or strong information security culture can aid in minimising the threat of humans to infor...
A significant volume of security breaches occur as a result of human aspects and it is consequently ...
Nowadays organisations operate in a global environment which enables organisations to collaborate an...
Information security is a challenge facing organisations, as security breaches pose a serious threat...
The modern organisation relies heavily on information to function effectively. With such reliance on...
Managing Information Security is becoming more challenging in today’s business because people are bo...
Information security programs are instituted by organizations to provide guidance to their users who...
Part 10: Organizational SecurityInternational audienceAn increasing number of information security b...
It is generally accepted that the protection of the organization’s information assets begins with th...
The human component is a significant factor in information security, with a large numbers of breache...
A significant volume of security breaches occur as a result of the human aspects and it is consequen...
The current study originated from the realisation that information security is no longer solely depe...
Information security is a relevant fact for current organizations. There are factors inextricably li...
B1 - Research Book ChaptersIn organizations, employee behaviour has a considerable impact on informa...
The ideal or strong information security culture can aid in minimising the threat of humans to infor...
The ideal or strong information security culture can aid in minimising the threat of humans to infor...
A significant volume of security breaches occur as a result of human aspects and it is consequently ...
Nowadays organisations operate in a global environment which enables organisations to collaborate an...
Information security is a challenge facing organisations, as security breaches pose a serious threat...
The modern organisation relies heavily on information to function effectively. With such reliance on...
Managing Information Security is becoming more challenging in today’s business because people are bo...
Information security programs are instituted by organizations to provide guidance to their users who...
Part 10: Organizational SecurityInternational audienceAn increasing number of information security b...
It is generally accepted that the protection of the organization’s information assets begins with th...