Now showing items 1-5 of 5
The password practices applied by South African online consumers : perception versus reality
(AOSIS Publishing, 2015-07)
Background: The ability to identify and authenticate users is regarded as the foundation of computer security. Although new authentication technologies are evolving, passwords are the most common method used to control ...
Hacker risk in e-commerce systems with specific reference to the disclosure of confidential information
(AOSIS OpenJournals, 2004-12)
In a Web-centric environment, transactions between various parties, such as the e-commerce company, its client and a bank, are done electronically. Merging the business processes of this extended enterprise with the ...
Significant risks relating relating to mobile technology
(AOSIS Publishing, 2016)
The consumerisation of mobile technology is driving the large-scale adoption of mobile solutions in business models. Each component of mobile technology, however, introduces specific risks into the enterprise and those ...
Assessment of current practices in creating and using passwords as a control mechanism for information access
(AOSIS OpenJournals, 2007-06)
One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control ...
Some password users are more equal than others : towards customisation of online security initiatives
(AOSIS Publishing, 2018)
Background: Online security is a growing concern and user authentication through passwords remains an important mechanism to protect online assets. Research to date has highlighted the need to address human behaviour but ...