Information security breaches have serious consequences for companies. And information security breaches in the defence industry negatively impact national security. Selling information concerning industrial design, organisational strategic plans, customers, experts and other valuable information for monetary benefit, revenge, bribery and embezzlement are just some examples of the human dimension of information security
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2010.A supply chain is an integrated process...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
Information security breaches and privacy violations are major concerns for many organisations. Huma...
Internet of Things (IoT) has been acknowledged as a new revolution in technology. IoT play an import...
To ensure business continuity the security of corporate information is extremely important. Previous...
The current publication presents selected risks resulting from the involvement of the human factor. ...
Reports on supply chains as major sources of cybersecurity threats. Companies and organizations incr...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
This study draws on information theory and aims to provide simulated evidence using real historical ...
The current world of post industrial value generation sees companies increasingly analyzing their in...
Information security inside the organization is becoming a major issue in the modern and global worl...
Supply chain security continues to be an overlooked field with consequences that can disrupt industr...
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
This issue of Out-of-the-Box addresses the threat of information warfare for commercial organisation...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2010.A supply chain is an integrated process...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
Information security breaches and privacy violations are major concerns for many organisations. Huma...
Internet of Things (IoT) has been acknowledged as a new revolution in technology. IoT play an import...
To ensure business continuity the security of corporate information is extremely important. Previous...
The current publication presents selected risks resulting from the involvement of the human factor. ...
Reports on supply chains as major sources of cybersecurity threats. Companies and organizations incr...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
This study draws on information theory and aims to provide simulated evidence using real historical ...
The current world of post industrial value generation sees companies increasingly analyzing their in...
Information security inside the organization is becoming a major issue in the modern and global worl...
Supply chain security continues to be an overlooked field with consequences that can disrupt industr...
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
This issue of Out-of-the-Box addresses the threat of information warfare for commercial organisation...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2010.A supply chain is an integrated process...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...