Search results
1 – 4 of 4Dirk P. Snyman and Hennie Kruger
This paper aims to present the development of a framework for evaluating group behaviour in information security in practice.
Abstract
Purpose
This paper aims to present the development of a framework for evaluating group behaviour in information security in practice.
Design/methodology/approach
Information security behavioural threshold analysis is used as the theoretical foundation for the proposed framework. The suitability of the proposed framework is evaluated based on two sets of qualitative measures (general frameworks and information security frameworks) which were identified from literature. The successful evaluation of the proposed framework, guided by the identified evaluation measures, is presented in terms of positive practical applications, as well as positive peer review and publication of the underlying theory.
Findings
A methodology to formalise a framework to analyse group behaviour in information security can successfully be applied in a practical environment. This application takes the framework from only a theoretical conceptualisation to an implementable solution to evaluate and positively influence information security group behaviour.
Practical implications
Behavioural threshold analysis is identified as a practical mechanism to evaluate information security group behaviour. The suggested framework, as implemented in a management decision support system (DSS), allows practitioners to assess the security behaviour and awareness in their organisation. The resulting information can be used to exert an influence for positive change in the information security of the organisation.
Originality/value
A novel conceptual mapping of two sets of qualitative evaluation measures is presented and used to evaluate the proposed framework. The resulting framework is made practical through its encapsulation in a DSS.
Details
Keywords
Dirk P. Snyman, Hennie Kruger and Wayne D. Kearney
The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security.
Abstract
Purpose
The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security.
Design/methodology/approach
Behavioural threshold analysis is used to test for the presence of the lemming effect in information security behaviour. Paradoxical behaviour may be caused by the influential nature of the lemming effect. The lemming effect is presented as a possible cause of the privacy paradox.
Findings
The behavioural threshold analysis indicates that the lemming effect is indeed present in information security behaviour and may lead to paradoxical information security behaviour.
Practical implications
The analysis of the lemming effect can be used to assist companies in understanding the way employees influence each other in their behaviour in terms of security. By identifying possible problem areas, this approach can also assist in directing their information security education endeavours towards the most relevant topics.
Originality/value
This research describes the first investigation of the lemming effect in information security by means of behavioural threshold analysis in practice.
Details
Keywords
The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.
Abstract
Purpose
The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.
Design/methodology/approach
Generic behavioural threshold analysis is presented and then applied in the domain of information security by collecting data on the behavioural thresholds of individuals in a group setting and how the individuals influence each other when it comes to security behaviour.
Findings
Initial experimental results show that behavioural threshold analysis is feasible in the context of information security and may provide useful guidelines on how to construct information security awareness programmes.
Practical implications
Threshold analysis may contribute in a number of ways to information security, e.g. identification of security issues that are susceptible to peer pressure and easily influenced by peer behaviour; serve as a countermeasure against security fatigue; contribute to the economics of information security awareness programmes; track progress of security awareness campaigns; and provide a new measure for determining the importance of security awareness issues.
Originality/value
This paper describes the very first experiment to test the behavioural threshold analysis concepts in the context of information security.
Details
Keywords
Nicozaan Finestone and Retha Snyman
Knowledge management in South Africa is still a very new field of management and knowledge managers are experiencing difficulties with the added dimension of multiculturalism. The…
Abstract
Purpose
Knowledge management in South Africa is still a very new field of management and knowledge managers are experiencing difficulties with the added dimension of multiculturalism. The history of South Africa, along with its current focus on cultural equality, complicates the matter. This research seeks to look at the challenges facing knowledge managers in a multicultural South African corporate environment.
Design/methodology/approach
An exploratory study, using in‐depth interviewing and a focus group as information collection methods, was launched to explore South African knowledge‐management practices in a cross‐section of companies in the economy.
Findings
Results showed that companies were afraid to acknowledge cultural differences because of major cultural sensitivity and, as a result, corporate culture was seen as the great equaliser of cultural exchanges. Knowledge managers, along with top management's support, must rather create a cooperative knowledge‐sharing environment in which South Africa's diverse cultures can interact, learn from one another and innovate.
Research limitations/implications
Serves as a pilot study that aims to explore new territory. From this explorative research, a new and extensive study of the contributing factors should be conducted. This study does not proclaim to be representative of all companies, as only a cross‐section of the South African corporate market was targeted for participation.
Practical implications
Company management and knowledge workers will see the necessity of incorporating different approaches to knowledge‐management implementation to suit individual needs.
Originality/value
Very little research has been done on this subject from a South African corporate‐environment perspective. These researchers hope to make knowledge workers more sensitive to the influence of multiculturalism on potential implementation of a knowledge‐management strategy.
Details