Human related vulnerability challenges continue to increase as organisations intensify their use of interconnected technologies for operations particularly due to the emergence of …
Good security cannot be achieved through technical means alone and a solid understanding of the issues and how to protect one's self is required from users. Whilst many …
SM Furnell, I Vasileiou - Research anthology on advancements in …, 2022 - igi-global.com
This chapter sets the scene for the book as a whole, establishing the need for cybersecurity awareness, training, and education in order to enable us to understand and meet our …
Deep penetration of computer networks into all spheres of organization's life requires new approaches to ensuring security for survival in a context of continuous renewal of cyber …
This paper examines three scenarios of insider fraud based on empirical data from an upper- tier budget hotel in London, as part of a thought experiment on insider fraud. The scenarios …
ABSTRACT “One-chance” criminality has become public transport threat in Lagos State where passengers are trapped through deceit, robbed, and victimized by individuals or …
R Rastogi, R von Solms - Systemics, Cybernetics and Informatics, 2012 - iiisci.org
End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on …
The proliferation of the Bring Your Own Device (BYOD) policy has instigated a widespread change across organizations. However, employees' compliance toward BYOD security …