The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behavio...
Cyber-attacks threaten the security of computer users’ information, networks, machines, and privacy....
Higher education institutions have invested heavily in their high-tech infrastructure to ensure the ...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
The fact that information is ubiquitous throughout most modern organisations cannot be denied. Infor...
Information security has become increasingly important and is far more than a collection of physical...
Information is an important and valuable asset, in both our everyday lives and in various organisati...
A Project Report Submitted to the School of Science and Technology in Partial Fulfillment of the Req...
Organisations throughout the world face threats to the security of their information. In most organi...
Security breaches have attracted corporate attention and major organisations are now determined to s...
There is ever increasing growth of information systems and technology in terms pervasiveness and cap...
The study of employees’ intention to comply with information security policies in higher education i...
Information security programs are instituted by organizations to provide guidance to their users who...
The frequency, intensity and repercussions of information security breaches in higher education has ...
This dissertation addresses the general problem of managing information resources through considerat...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
Cyber-attacks threaten the security of computer users’ information, networks, machines, and privacy....
Higher education institutions have invested heavily in their high-tech infrastructure to ensure the ...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
The fact that information is ubiquitous throughout most modern organisations cannot be denied. Infor...
Information security has become increasingly important and is far more than a collection of physical...
Information is an important and valuable asset, in both our everyday lives and in various organisati...
A Project Report Submitted to the School of Science and Technology in Partial Fulfillment of the Req...
Organisations throughout the world face threats to the security of their information. In most organi...
Security breaches have attracted corporate attention and major organisations are now determined to s...
There is ever increasing growth of information systems and technology in terms pervasiveness and cap...
The study of employees’ intention to comply with information security policies in higher education i...
Information security programs are instituted by organizations to provide guidance to their users who...
The frequency, intensity and repercussions of information security breaches in higher education has ...
This dissertation addresses the general problem of managing information resources through considerat...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
Cyber-attacks threaten the security of computer users’ information, networks, machines, and privacy....
Higher education institutions have invested heavily in their high-tech infrastructure to ensure the ...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...