The purpose of this study is to extend the legacy threat-vulnerability model to incorporate human and social factors. This is achieved by presenting the dynamics of threats and vulnerabilities in the human and social context. We examine costs and benefits as they relate to threats, exploits, vulnerabilities, defence measures, incidents, and recovery and restoration. We discuss privacy concerns and the implications of implementing employee surveillance technologies and we suggest a framework of fair practices which can be used for bridging the gap between the need to provide adequate protection for information systems, while preserving employees' rights to privacy. Organizations have to prioritize the security of their computer sys...
This study examines employee information privacy concerns (IPC) in relation to workplace electronic ...
In today’s rapidly changing scenario, individuals and organizations are relying heavily on automated...
In recent times the breach of security systems or cyber-attacks leading to unauthorized acquisitions...
The proliferation of information in modern society, as enabled by technologies such as portable pers...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
Due to the rise of data breaches, organisations constantly need to develop new strategies and securi...
PhD (Computer Sciences), North-West University, Potchefstroom Campus, 2016Information security has b...
Surveillance is a concept that is common in organizations in recent times. It is believed that this ...
Information technology includes all types of technology used to exchange, store, use or create infor...
Information security inside the organization is becoming a major issue in the modern and global worl...
Access to data is a nefralgic information security zone. On the one hand, we do everything to protec...
Information is an essential element for organizations today. Confidentiality, integrity, and availab...
The growing number of information security breaches in organisations presents a serious risk to the ...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
This chapter explains how present and past employees can pose a greater threat in the light of the e...
This study examines employee information privacy concerns (IPC) in relation to workplace electronic ...
In today’s rapidly changing scenario, individuals and organizations are relying heavily on automated...
In recent times the breach of security systems or cyber-attacks leading to unauthorized acquisitions...
The proliferation of information in modern society, as enabled by technologies such as portable pers...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
Due to the rise of data breaches, organisations constantly need to develop new strategies and securi...
PhD (Computer Sciences), North-West University, Potchefstroom Campus, 2016Information security has b...
Surveillance is a concept that is common in organizations in recent times. It is believed that this ...
Information technology includes all types of technology used to exchange, store, use or create infor...
Information security inside the organization is becoming a major issue in the modern and global worl...
Access to data is a nefralgic information security zone. On the one hand, we do everything to protec...
Information is an essential element for organizations today. Confidentiality, integrity, and availab...
The growing number of information security breaches in organisations presents a serious risk to the ...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
This chapter explains how present and past employees can pose a greater threat in the light of the e...
This study examines employee information privacy concerns (IPC) in relation to workplace electronic ...
In today’s rapidly changing scenario, individuals and organizations are relying heavily on automated...
In recent times the breach of security systems or cyber-attacks leading to unauthorized acquisitions...