2,929 research outputs found
How does intellectual capital align with cyber security?
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their responsibilities and accountabilities in this respect.Design/Methodology/Approach – The research methodology is desk research. In other words, we gathered facts and existing research publications that helped us to define key terms, to formulate arguments to convince BoDs of the need to secure their intellectual capital, and to outline actions to be taken by BoDs to do so.Findings – Intellectual capital, as a valuable business resource, is related to information, knowledge and cyber security. Hence, preservation thereof is also related to cyber security governance, and merits attention from boards of directors.Implications – This paper clarifies boards of directors’ intellectual capital governance responsibilities, which encompass information, knowledge and cyber security governance.Social Implications – If boards of directors know how to embrace their intellectual capital governance responsibilities, this will help to ensure that such intellectual capital is preserved and secured.Practical Implications – We hope that boards of directors will benefit from our clarifications, and especially from the positioning of intellectual capital in cyber space.Originality/Value – This paper extends a previous paper published by Von Solms and Von Solms (2018), which clarified the key terms of information and cyber security, and the governance thereof. The originality and value is the focus on the securing of intellectual capital, a topic that has not yet received a great deal of attention from cyber security researchers
Information security drivers for e-Learning Management Systems (e-LMS)
E-Learning Management Systems (e-LMSs) do provide some form of technical counter measures like password based identification and authentication to protect the valuable system's information assets. Having only technical information security counter measures in place don't necessarily ensure the security of e-LMS environment is maintained at all times. Therefore, information should be taken as multi-dimensional discipline. This article identifies and discusses the most important information security dimensions for creating a secure e-LMS environment
Customers repurchase intention formation in e-commerce
Background: Electronic loyalty (e-loyalty) has become important in the context of electronic commerce (e-commerce) in recent years. Loyal customers bring long-term revenue to companies and are known to be a valuable asset to them. However, firms lose their customers in a competitive environment on the Internet because of a lack of trust, satisfaction and loyalty.
Objectives: This study explains how e-loyalty, e-trust and e-satisfaction form in e-commerce with a focus on customer purchase intention formation.
Method: A conceptual framework was formed based upon the literature review. Data were collected from e-customers of online firms in South Africa. After data clarification, confirmatory factor analysis was conducted. The structural equation modelling was applied to test the hypotheses. IBM SPSS AMOS 20 was used for this purpose.
Results: Firstly, convenience, customer benefit and enjoyment affect customer satisfaction in e-commerce. In other words, when customers do business activities easily with enjoyment and take benefit, they are satisfied and they will purchase again in future. Secondly, our study demonstrated that customer perception of security, clear shopping process and reliable payment system have a positive relationship with e-trust. Finally, e-satisfaction and e-trust have a positive and strong relationship with e-loyalty formation in e-commerce.
Conclusion: The results of the study shed light on important issues relating to e-loyalty formation from a new perspective. Online companies are interested in launching e-loyalty programmes because of the long-term benefits that come from loyal customers. To remain competitive, e-commerce companies should constantly work at enhancing customer trust, satisfaction and loyalty
Recommended from our members
Cloud-based Email Adoption at Higher Education Institutions in South Africa
Cloud computing, in general, is having an impact on organizations today. Cloud-based email, in particular, is being adopted by educational institutions around the world on a large scale. This paper reports on the state of cloud-based email adoption at higher education institutions in South Africa; it does this by describing the findings of a survey of IT managers at sixteen of these institutions. It will show that South Africa follows the global trend of a large uptake of cloud- based email for higher education institutions. The fact that although organizations are satisfied with the service they receive from cloud-based email service providers, they have several noteworthy concerns regarding the adoption of this service. The fact that IT managers at such South African higher education institutions feel that they would benefit from the guidelines for the compliant adoption of cloud-based email is also highlighted
Recommendations for mitigating information disclosure from point of sale devices in South Africa
Abstract: Please refer to full text to view abstrac
The Community-oriented Computer Security, Advisory and Warning Team
Critical information infrastructure protection is vital for any nation. Many of a country’s critical systems are interconnected via an information infrastructure, such as the Internet. Should the information infrastructure be targeted by remote attacks, it would have a devastating effect on functioning of a country. Developing nations are no exception. As broadband penetration rates increase, and as Internet access speeds increase, developing nations have to implement safeguards to ensure that their information infrastructure is not target or abused by cyber attackers. Many nations implement CSIRT structures to aid in the protection of their information infrastructure. However these structures are expensive to set up and maintain. In this paper we introduce a Community-oriented Advisory, Security and Warning (C-SAW) Team, which aims to be a cost effective alternative to a CSIRT. C-SAW Teams aims to combine cost-effectiveness with the ability to mutate into a full-scale CSIRT structure over time
BITTER PEPTIDES, OCCURRENCE AND STRUCTURE
The bitter taste of many protein rich foods resides in the peptide fraction. 61 bitter tasting peptides, isolated from natural systems, and 145 bitter tasting synthetic peptides are reviewed. The relationships between average hydrophobicity and bitter taste are then discusse
Building an ontology for cyberterrorism
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, the defining and differentiating characteristics of cyberterrorism can easily be misunderstood. The use of an ontology specifically developed for cyberterrorism, will provide a common framework to share conceptual models. By using an ontology, the internal and external environment of a field (in this case, cyberterrorism) can be captured together with the relationships between the environments. This paper proposes an ontology to identify whether a cyber event can be classified as a cyberterrorist attack or a support activity. The role of the cyberterrorism ontological model will be to provide a better structure and depiction of relationships, interactions and influencing factors by capturing the content and boundaries in the field of cyberterrorism
- …
