This paper reports on a study that examined the perceptions of computer users in regard to the risks to their organisation’s information systems (ISs). A total of 12 employees from a local government organisation were interviewed in accordance with the Repertory Grid Technique (RGT). These structured interviews elicited a total of 110 constructs which represented individual thoughts, beliefs and views pertaining to information security (InfoSec) risks. These constructs were hermeneutically allocated into 28 categories of risk perception and then analysed via Content Analysis and Principal Component Analysis (PCA) to identify perceptions of IS risks and to uncover the major situational factors that influence these perceptions. The findin...
Purpose – The purpose of this paper is to investigate the human-based information security (InfoSec)...
In today’s business environment, almost all information is captured and stored in electronic form. T...
Organisations and especially Government departments develop information systems for their own specif...
This paper reports on a study that examined the perceptions of computer users in regard to the risks...
The increasing dependence on information systems (ISs) together with the emergence of new technologi...
This paper proposes a research method that investigates the risk perceptions of computer end-users r...
This paper will examine the difference between management’s perception of the information security r...
To protect information technology assets, effective risk management strategies need to be implemente...
The information security (IS) risk assessment process is an essential part to organisation's their p...
Despite impressive advances in technology and a plethora of Information Systemsdevelopment methods t...
Abstract: In the technology-people-management chain, people are predominantly identified as the weak...
In their efforts to implement an effective IT-governance framework, many companies have acquired IS-...
This paper reports on a study conducted by The University of Adelaide with the support of the Defenc...
In todays dynamic and changing economic environment, businesses are subjected to greater risks than ...
Electronic Data Interchange (EDI) is the inter-change of business documents between organisations in...
Purpose – The purpose of this paper is to investigate the human-based information security (InfoSec)...
In today’s business environment, almost all information is captured and stored in electronic form. T...
Organisations and especially Government departments develop information systems for their own specif...
This paper reports on a study that examined the perceptions of computer users in regard to the risks...
The increasing dependence on information systems (ISs) together with the emergence of new technologi...
This paper proposes a research method that investigates the risk perceptions of computer end-users r...
This paper will examine the difference between management’s perception of the information security r...
To protect information technology assets, effective risk management strategies need to be implemente...
The information security (IS) risk assessment process is an essential part to organisation's their p...
Despite impressive advances in technology and a plethora of Information Systemsdevelopment methods t...
Abstract: In the technology-people-management chain, people are predominantly identified as the weak...
In their efforts to implement an effective IT-governance framework, many companies have acquired IS-...
This paper reports on a study conducted by The University of Adelaide with the support of the Defenc...
In todays dynamic and changing economic environment, businesses are subjected to greater risks than ...
Electronic Data Interchange (EDI) is the inter-change of business documents between organisations in...
Purpose – The purpose of this paper is to investigate the human-based information security (InfoSec)...
In today’s business environment, almost all information is captured and stored in electronic form. T...
Organisations and especially Government departments develop information systems for their own specif...