Browsing by Author "Butler, M. J."
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- ItemBeyond King III : assigning accountability for IT governance in South African enterprises(AOSIS, 2010) Butler, R.; Butler, M. J.With the increasing dependence on IT in modern enterprises and the significant risks associated with omnipresent IT systems in business, IT governance is becoming imperative to all organisations. King III is based on the "apply or explain" approach, that forces South African entities for the first time to apply the IT governance principles as contained in the report, or explain the reasons for not applying these principles. This paper provides a macrolevel view of IT governance, derived from King III, and determined that it correlates strongly with the growing body of knowledge on IT governance. The paper investigates the responsibilities for IT governance within organisations and provides clear guidelines on the responsibilities of management roles, from the board to the operational level, involved in IT governance to ensure accountability.
- ItemTowards online security : key drivers of poor user behaviour and recommendations for appropriate interventions(AOSIS, 2014) Butler, M. J.Online commerce has grown significantly and securing this channel of commerce is of vital importance for organisations. In the quest to secure the online world, users are often referred to as the weakest link in online security since their behaviour could impact negatively on systems security. User education and awareness programmes to develop and enhance the required skills and appropriate frame of mind are common approaches to improve online security. Focussing on the drivers of change in user's online security behaviour can assist in defining appropriate interventions. Key human behaviour models where used to define these drivers. The drivers of change in online security behaviour was used to design an instrument used to survey South African online consumers to determine the prevalence, or not, of factors that determine secure or unsecure behaviour. The data from the survey was analysed to highlight the Knowledge, Capability and Motivation to behave in a secure manner, as well as te st for potential aspects that have influenced past behaviour and that could potentially influence future behaviour. Based on the determinants of behaviour, as well as identified deficiencies in password behaviour as identified by the survey, a list of potential considerations for the designers ofiS security interventions is presented.