PhD (Computer Sciences), North-West University, Potchefstroom Campus, 2016Information security has become a complex human-driven science. There is widespread recognition of the fact that technology on its own no longer offers complete solutions to the information security problem and that the human aspect of information security is the most important determinant of information security success. Despite this acknowledgement and the large number of research projects that deals with the human aspects of information security, there are still no absolute solutions for what may seem to be very basic information security behaviour problems. The so-called privacy paradox or knowing-doing gap is a good example of a problem that remains something of...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
Technology services offer users benefits, including travel assistance, reviews and recommendations, ...
[[abstract]]Organizations that lack security awareness can miss detecting many obvious security risk...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
The current publication presents selected risks resulting from the involvement of the human factor. ...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
The purpose of this study is to extend the legacy threat-vulnerability model to incorporate human a...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Information security inside the organization is becoming a major issue in the modern and global worl...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Today there are many hardware and software solutions to enhance information security, but there is l...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
The proliferation of information in modern society, as enabled by technologies such as portable pers...
Information security embodies the complex interaction between security policies, user perceptions of...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
Technology services offer users benefits, including travel assistance, reviews and recommendations, ...
[[abstract]]Organizations that lack security awareness can miss detecting many obvious security risk...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
The current publication presents selected risks resulting from the involvement of the human factor. ...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
The purpose of this study is to extend the legacy threat-vulnerability model to incorporate human a...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Information security inside the organization is becoming a major issue in the modern and global worl...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Today there are many hardware and software solutions to enhance information security, but there is l...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
The proliferation of information in modern society, as enabled by technologies such as portable pers...
Information security embodies the complex interaction between security policies, user perceptions of...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
Technology services offer users benefits, including travel assistance, reviews and recommendations, ...
[[abstract]]Organizations that lack security awareness can miss detecting many obvious security risk...