Items in UNISA Institutional Repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please acknowledge publications according to acceptable standards and norms.
Da Veiga, Adele(Information Security Group South Africa (no trading as Wolfpack), 2011-09)
This document provides an overview of the impact of the Protection of Personal Information Act of South Africa. The document was compiled by the Privacy Interest Group in South Africa under the Information Security Group ...
In Africa, and globally, organisations and Information Technology (IT) are pervasive and, hence, impact and influence millions of African livelihoods every day. Thus, facilitating successful IT and organisational structuring ...
The processing of personal information by companies should be in line with ethical and
regulatory requirements. Whilst respecting the right to privacy, personal information can be used to
create value in the economy as ...
This research proposes an Information Privacy Culture Index Framework (IPCIF) with a
related Information Privacy Culture Index Instrument (IPCII) to measure privacy perceptions
across nations. The proposed framework is ...
one could be related to legal and regulatory requirements. While employees must comply with
organisational policies, external factors like data protection legislation might influence the
manner in which employees protect ...
In a country like Ethiopia, where information and communication systems are in the early
stage of development, software projects may face several challenges. Risk is one of the
factors that challenges project performance, ...
Da Veiga, Adele(SAI Computing Conference, 2016-07-13)
A cybersecurity culture must be promoted at an
international, national, organizational, and individual level to aid
in minimizing risks from a human perspective in cyberspace. To
promote such a culture it has to be ...
Personal information is being generated and distributed at an increasingly rapid pace. This
phenomenon provides both opportunity and risk in equal measure. The flow of personal
information allows corporations to use ...
Da Veiga, Adele; Swartz, P.(Information Security South Africa (ISSA) 2016, 2016-08-17)
Personal information is collected and processed by various companies when individuals buy products and services, share their information on social media or enter their details in competitions and so on. This personal ...
Da Veiga, Adele(Information & Computer Security (Emerald Journal), 2016)
Purpose – This study aims, firstly, to determine what influence the information security policy has on
the information security culture by comparing the culture of employees who read the policy to those
who do not, and, ...
Da Veiga, Adele; Martins, Nico(Computers & Security (Elsevier Journal), 2017-05-12)
consider the possibility of several information security subcultures that could be present in
the organisation. This means that different geographical, ethnic or age groups of employees
could have different assumptions, ...
Howard, Grant(Academic Conferences and Publishing International Limited (ACPI), 2017-03-16)
Information Technology (IT) is indispensable to modern, competitive organisations and is instrumental in the many changes experienced by these organisations. The paper argues that IT-related organisational change follows ...
A strong information protection culture is required in organisations where the confidentiality, sensitivity and privacy of information are understood and handled accordingly. This is necessary to reduce the risk of human ...
The human aspect, together with technology and process controls, needs to be considered as part of an information security programme. Current and former employees are still regarded as one of the root causes of information ...
Efforts have been made by researchers to comprehend the nature and factors that contribute to the digital divide in developing countries and several attempts have been made to bridge this divide. Literature mostly investigates ...
Marin, Mike A; Lotriet, Hugo; Van Der Poll, John A(SAICSIT, 2015-09-28)
The Case Management Modeling and Notation (CMMN)
speci cation, published by the Object Management Group
(OMG) in 2014, describes a declarative style for modeling
business processes. The declarative nature of CMMN is ...
Marin, Mike A; Lotriet, Hugo; Van Der Poll, John A(SAICSIT, 2014-09-29)
In 2014, the Object Management Group (OMG) published
the Case Management Modeling and Notation (CMMN) ver-
sion 1.0 speci cation, which is a new process modeling spec-
i cation to complement its Business Process Modeling ...
This paper proposes an IS theory of reciprocal change. The research problem addressed in the paper is the absence of an IS theory that explains the reciprocity of change within IS. The questions that the paper answers is, ...
The term ‘digital divide’ was introduced in the mid-1990s and has become popular as an area of interdisciplinary concern. The term has received much attention from many researchers and policy makers. However it remains an ...