Despite the vast research in Information Security, the human factor has been found to lack interest from the research community, with most security research giving focus on the technological component of an Information Technology system. Regardless of any introduced technological solutions, the human factor is still subject to attacks and thus, in need of auditing and addressing any existing vulnerabilities. This research evaluates the human factor by the creation of a survey which examines five distinct user properties. Each of these properties comprise a series of questions, which with their turn assist on confirmation or refutation of five hypotheses. The survey was conducted on two higher academic institutions and distributed to all mem...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Considering that many organizations today are extremely dependent on information technology, compute...
Abstract: – Any security system, no matter how well designed and implemented, will have to rely on ...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
Today there are many hardware and software solutions to enhance information security, but there is l...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
The human factor is the weakest link in all information systems regarding security but the users are...
AbstractIt is widely acknowledged that employees of an organization are often a weak link in the pro...
The research objective was to develop a model for evaluating the human impact that password authenti...
The research objective was to develop a model for evaluating the human impact that password authenti...
The research objective was to develop a model for evaluating the human impact that password authenti...
AbstractIt is widely acknowledged that employees of an organization are often a weak link in the pro...
Considering that many organizations today are extremely dependent on information technology, compute...
Human element plays a critical role in cyberwarfare scenarios: a malicious adversary can launch targ...
It is a well-know fact that there is no unbreakable system in the world. Nowadays, creating secure ...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Considering that many organizations today are extremely dependent on information technology, compute...
Abstract: – Any security system, no matter how well designed and implemented, will have to rely on ...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
Today there are many hardware and software solutions to enhance information security, but there is l...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
The human factor is the weakest link in all information systems regarding security but the users are...
AbstractIt is widely acknowledged that employees of an organization are often a weak link in the pro...
The research objective was to develop a model for evaluating the human impact that password authenti...
The research objective was to develop a model for evaluating the human impact that password authenti...
The research objective was to develop a model for evaluating the human impact that password authenti...
AbstractIt is widely acknowledged that employees of an organization are often a weak link in the pro...
Considering that many organizations today are extremely dependent on information technology, compute...
Human element plays a critical role in cyberwarfare scenarios: a malicious adversary can launch targ...
It is a well-know fact that there is no unbreakable system in the world. Nowadays, creating secure ...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Considering that many organizations today are extremely dependent on information technology, compute...
Abstract: – Any security system, no matter how well designed and implemented, will have to rely on ...