56 research outputs found

    Critical analysis of information security culture definitions

    Get PDF
    This article aims to advance the understanding of information security culture through a critical reflection on the wide-ranging definitions of information security culture in the literature. It uses the hermeneutic approach for conducting literature reviews. The review identifies 16 definitions of information security culture in the literature. Based on the analysis of these definitions, four different views of culture are distinguished. The shared values view highlights the set of cultural value patterns that are shared across the organization. An action-based view highlights the behaviors of individuals in the organization. A mental model view relates to the abstract view of the individual’s thinking on how information security culture must work. Finally, a problem-solving view emphasizes a combination of understanding from shared value-based and action-based views. The paper analyzes and presents the limitations of these four views of information security culture definitions

    Concern for information privacy in South Africa: An empirical study using the OIPCI

    Get PDF
    Please follow the DOI link at the top of the record to access the published version of this article online on the website of the journal.The information privacy concern of consumers concerning the processing of their personal information by online organizations (websites) is investigated in this study by means of a quantitative approach. An overview of existing concerns about information privacy instruments are presented based on a literature review. The Online Information Privacy Concern Instrument (OIPCI) is used to study consumers’ expectations and experience regarding information privacy principles in order to identify their concerns about information privacy. The study was conducted in South Africa with a demographical representative sample of 1000 participants. Gaps were identified where consumers experienced that online organizations were not meeting their privacy expectations. This indicated that the regulatory requirements (in this case, the Protection of Personal Information Act (POPI) are perceived as not being met. The results indicate that while consumers in South Africa have a high expectation for privacy, it is not met in practice. Corrective action and interventions are required from a government and online organization perspective.Women in Research Grant of UNISA.School of Computin

    Calcium Regulation of EGF-Induced ERK5 Activation: Role of Lad1-MEKK2 Interaction

    Get PDF
    The ERK5 cascade is a MAPK pathway that transmits both mitogenic and stress signals, yet its mechanism of activation is not fully understood. Using intracellular calcium modifiers, we found that ERK5 activation by EGF is inhibited both by the depletion and elevation of intracellular calcium levels. This calcium effect was found to occur upstream of MEKK2, which is the MAP3K of the ERK5 cascade. Co-immunoprecipitation revealed that EGF increases MEKK2 binding to the adaptor protein Lad1, and this interaction was reduced by the intracellular calcium modifiers, indicating that a proper calcium concentration is required for the interactions and transmission of EGF signals to ERK5. In vitro binding assays revealed that the proper calcium concentration is required for a direct binding of MEKK2 to Lad1. The binding of these proteins is not affected by c-Src-mediated phosphorylation on Lad1, but slightly affects the Tyr phosphorylation of MEKK2, suggesting that the interaction with Lad1 is necessary for full Tyr phosphorylation of MEKK2. In addition, we found that changes in calcium levels affect the EGF-induced nuclear translocation of MEKK2 and thereby its effect on the nuclear ERK5 activity. Taken together, these findings suggest that calcium is required for EGF-induced ERK5 activation, and this effect is probably mediated by securing proper interaction of MEKK2 with the upstream adaptor protein Lad1

    Discovery of Inhibitors of Leishmania β-1,2-Mannosyltransferases Using a Click-Chemistry-Derived Guanosine Monophosphate Library

    Get PDF
    Leishmania spp. are a medically important group of protozoan parasites that synthesize a novel intracellular carbohydrate reserve polymer termed mannogen. Mannogen is a soluble homopolymer of β-1,2-linked mannose residues that accumulates in the major pathogenic stages in the sandfly vector and mammalian host. While several steps in mannogen biosynthesis have been defined, none of the enzymes have been isolated or characterized. We report the development of a simple assay for the GDP-mannose–dependent β-1,2-mannosyltransferases involved in mannogen synthesis. This assay utilizes octyl α-d-mannopyranoside to prime the formation of short mannogen oligomers up to 5 mannose residues. This assay was used to screen a focussed library of 44 GMP-triazole adducts for inhibitors. Several compounds provided effective inhibition of mannogen β-1,2-mannosyltransferases in a cell-free membrane preparation. This assay and inhibitor compounds will be useful for dissecting the role of different mannosyltransferases in regulating de novo biosynthesis and elongation reactions in mannogen metabolism

    A conceptual framework for the adoption of big data analytics by e-commerce startups: a case-based approach

    Get PDF
    E-commerce start-ups have ventured into emerging economies and are growing at a significantly faster pace. Big data has acted like a catalyst in their growth story. Big data analytics (BDA) has attracted e-commerce firms to invest in the tools and gain cutting edge over their competitors. The process of adoption of these BDA tools by e-commerce start-ups has been an area of interest as successful adoption would lead to better results. The present study aims to develop an interpretive structural model (ISM) which would act as a framework for efficient implementation of BDA. The study uses hybrid multi criteria decision making processes to develop the framework and test the same using a real-life case study. Systematic review of literature and discussion with experts resulted in exploring 11 enablers of adoption of BDA tools. Primary data collection was done from industry experts to develop an ISM framework and fuzzy MICMAC analysis is used to categorize the enablers of the adoption process. The framework is then tested by using a case study. Thematic clustering is performed to develop a simple ISM framework followed by fuzzy analytical network process (ANP) to discuss the association and ranking of enablers. The results indicate that access to relevant data forms the base of the framework and would act as the strongest enabler in the adoption process while the company rates technical skillset of employees as the most important enabler. It was also found that there is a positive correlation between the ranking of enablers emerging out of ISM and ANP. The framework helps in simplifying the strategies any e-commerce company would follow to adopt BDA in future. © 2019, Springer-Verlag GmbH Germany, part of Springer Nature

    ERK5 MAP Kinase Regulates Neurogenin1 during Cortical Neurogenesis

    Get PDF
    The commitment of multi-potent cortical progenitors to a neuronal fate depends on the transient induction of the basic-helix-loop-helix (bHLH) family of transcription factors including Neurogenin 1 (Neurog1). Previous studies have focused on mechanisms that control the expression of these proteins while little is known about whether their pro-neural activities can be regulated by kinase signaling pathways. Using primary cultures and ex vivo slice cultures, here we report that both the transcriptional and pro-neural activities of Neurog1 are regulated by extracellular signal-regulated kinase (ERK) 5 signaling in cortical progenitors. Activation of ERK5 potentiated, while blocking ERK5 inhibited Neurog1-induced neurogenesis. Furthermore, endogenous ERK5 activity was required for Neurog1-initiated transcription. Interestingly, ERK5 activation was sufficient to induce Neurog1 phosphorylation and ERK5 directly phosphorylated Neurog1 in vitro. We identified S179/S208 as putative ERK5 phosphorylation sites in Neurog1. Mutations of S179/S208 to alanines inhibited the transcriptional and pro-neural activities of Neurog1. Our data identify ERK5 phosphorylation of Neurog1 as a novel mechanism regulating neuronal fate commitment of cortical progenitors

    Privacy concerns and behavior of Pokémon go players in Germany

    No full text
    We investigate privacy concerns and the privacy behavior of users of the AR smartphone game Pokémon Go. Pokémon Go accesses several functionalities of the smartphone and, in turn, collects a plethora of data of its users. For assessing the privacy concerns, we conduct an online study in Germany with 683 users of the game. The results indicate that the majority of the active players are concerned about the privacy practices of companies. This result hints towards the existence of a cognitive dissonance, i.e. the privacy paradox. Since this result is common in the privacy literature, we complement the first study with a second one with 199 users, which aims to assess the behavior of users with regard to which measures they undertake for protecting their privacy. The results are highly mixed and dependent on the measure, i.e. relatively many participants use privacy-preserving measures when interacting with their smartphone. This implies that many users know about risks and might take actions to protect their privacy, but deliberately trade-off their information privacy for the utility generated by playing the game
    corecore