Showing 1 - 10 of 21
Persistent link: https://www.econbiz.de/10007742476
Persistent link: https://www.econbiz.de/10007730536
Purpose: Penetration tests have become a valuable tool in the cyber security defence strategy in terms of detecting vulnerabilities. Although penetration testing has traditionally focussed on technical aspects, the field has started to realise the importance of the human in the organisation,...
Persistent link: https://www.econbiz.de/10012068607
Purpose: The purpose of this paper is to position the preservation and protection of intellectual capital as a cyber security concern. The paper outlines the security requirements of intellectual capital to help boards of directors (BoDs) and executive management teams to understand their...
Persistent link: https://www.econbiz.de/10012187032
Purpose: To investigate the links between IC and the protection of data, information and knowledge in universities, as organizations with unique knowledge-relatedfociand challenges. Design/methodology/approach: The authors gathered insights from existing IC-related research publications to...
Persistent link: https://www.econbiz.de/10012278252
Persistent link: https://www.econbiz.de/10012283879
Purpose: The purpose of this paper is to reveal the lived experiences of dyslexics in engaging with all kinds of alphanumeric authentication mechanisms. Design/methodology/approach: A significant proportion of the world’s population experiences some degree of dyslexia, which can lead to...
Persistent link: https://www.econbiz.de/10012638376
Persistent link: https://www.econbiz.de/10009787925
Persistent link: https://www.econbiz.de/10009792620
Users are often considered the weakest link in the security chain because of their natural propensity for choosing convenience over safe practice. One area with a vast amount of evidence related to poor user behaviour is that of password management. For example, when hackers gain unauthorised...
Persistent link: https://www.econbiz.de/10010671706