scholarly journals The password practices applied by South African online consumers: Perception versus reality

2015 ◽  
Vol 17 (1) ◽  
Author(s):  
Rika Butler ◽  
Martin Butler

Background: The ability to identify and authenticate users is regarded as the foundation of computer security. Although new authentication technologies are evolving, passwords are the most common method used to control access in most computer systems. Research suggests that a large portion of computer security password breaches are the result of poor user security behaviour. The password creation and management practices that online consumers apply have a direct effect on the level of computer security and are often targeted in attacks. Objectives: The objective of this study was to investigate South African online consumers’ computer password security practices and to determine whether consumers’ perceptions regarding their password security ability is reflected in the password creation and management practices that they apply. Method: A Web-based survey was designed to (1) determine online consumers’ perceptions of their skills and competence in respect of computer password security and (2) determine the practices that South African online consumers apply when creating and managing passwords. The measures applied were then compared to (1) the users’ perceptions about their computer password security abilities and (2) the results of international studies to determine agreement and inconsistencies. Results: South African online consumers regard themselves as proficient password users. However, various instances of unsafe passwords practices were identified. The results of this South African study correspond with the results of various international studies confirming that challenges to ensure safe online transacting are in line with international challenges. Conclusion: There is a disparity between South African online consumers’ perceived ability regarding computer password security and the password creation and management practices that they apply.

Author(s):  
Diane Banks ◽  
Gert Roodt

Orientation: Call centres have become principal channels of communication with customers. Therefore, companies attempt to reduce costs and improve the quality of their interactions with customers simultaneously. These objectives are often conflicting and call centre managers struggle to balance the efficiency and quality priorities of the business.Research purpose: This study explored the key performance indicators that drive management practices in the South African call centre industry in the context of the dilemma between efficiency and quality.Motivation for the study: The South African government has identified call centres as a method of creating jobs and foreign investment. Management practices affect centres’ performance. Understanding these practices will help to achieve these aims.Research design: The researchers used a web-based questionnaire in a survey with South African call centre managers in more than 44 different organisations that represented nine industry sectors.Main findings: This study indicated that the dilemma between efficiency and quality is prevalent in South African call centres and that efficiency key performance indicators drive management practices.Practical/managerial implications: The inconsistencies the study reported mean that South African organisations should assess the alignment between their organisational visions, the strategic intentions of their call centres and the performance measures they use to assess their call centre managers.Contribution/value-add: This study adds to the relatively small amount of empirical research available on the call centre industry in South Africa. It contributes to the industry’s attempt to position itself favourably for local and international outsourcing opportunities.


Author(s):  
S. E. Kruck ◽  
Faye P. Teer

The purpose of this chapter is to present the results of an empirical study of the computer security practices and perceptions of the next generation of corporate computer users, undergraduate university students. The authors surveyed undergraduate university students who represented 42 different majors. The findings relate to the students’ usage of antivirus programs, firewalls, password security, and security patches. Student perceptions of computer security and its importance are also reported. Research in this area is important for two reasons. First, potential employers may find the results useful in assessing their vulnerability to unsafe practices from entry level employees. Secondly, research in this area can give those responsible for providing computer security education a better understanding of students’ computer security training needs.


2016 ◽  
Vol 24 (1) ◽  
pp. 93-115 ◽  
Author(s):  
Xiaoying Yu ◽  
Qi Liao

Purpose – Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical to the security of our systems. However, due to the explosion of user accounts and increasing complexity of password rules, users are struggling to find ways to make up sufficiently secure yet easy-to-remember passwords. This paper aims to investigate whether there are repetitive patterns when users choose passwords and how such behaviors may affect us to rethink password security policy. Design/methodology/approach – The authors develop a model to formalize the password repetitive problem and design efficient algorithms to analyze the repeat patterns. To help security practitioners to analyze patterns, the authors design and implement a lightweight, Web-based visualization tool for interactive exploration of password data. Findings – Through case studies on a real-world leaked password data set, the authors demonstrate how the tool can be used to identify various interesting patterns, e.g. shorter substrings of the same type used to make up longer strings, which are then repeated to make up the final passwords, suggesting that the length requirement of password policy does not necessarily increase security. Originality/value – The contributions of this study are two-fold. First, the authors formalize the problem of password repetitive patterns by considering both short and long substrings and in both directions, which have not yet been considered in past. Efficient algorithms are developed and implemented that can analyze various repeat patterns quickly even in large data set. Second, the authors design and implement four novel visualization views that are particularly useful for exploration of password repeat patterns, i.e. the character frequency charts view, the short repeat heatmap view, the long repeat parallel coordinates view and the repeat word cloud view.


2022 ◽  
Author(s):  
Benjamin N. Kelley ◽  
Walter J. Waltz ◽  
Andrew Miloslavsky ◽  
Ralph A. Williams ◽  
Abraham K. Ishihara ◽  
...  

Author(s):  
Mamokgadi Z. Masete ◽  
Chengedzai Mafini

Background: The demand for higher education in South Africa continues to increase, placing pressure on public higher education institutions to satisfy this demand. Supply chain management is one of the practices that may be implemented to ensure that public universities improve their operations and can, therefore, meet the increased demand for higher education in the country.Objectives: This study aimed to explore the barriers to the implementation of supply chain management practices at a South African public university.Method: The study used a qualitative case study approach using a sample of 17 members of management and staff at a South African traditional university in the Limpopo Province. Data were collected using a combination of a focus group discussion and semi-structured in-depth interviews.Results: The study generated eight themes that embody the barriers to the implementation of supply chain management at the institution. These themes were labelled as stakeholder buy-in, knowledge of supply chain management, supply chain systems and processes, procurement policy and practices, implementation of supply chain management, stakeholder change management, human resource management and organisational culture.Conclusion: Various internal barriers impair the implementation of supply chain management practices at the institution. Administration at the institution has invested limited resources, time and initiatives to ensure the successful implementation of supply chain management. The focus should be directed to finding lasting solutions to each of the barriers identified in this study. Further studies should address the issue of external barriers to supply chain management in public higher education institutions.


2019 ◽  
Vol 35 (5) ◽  
pp. 723-731 ◽  
Author(s):  
Gurdeep Singh ◽  
Dharmendra Saraswat ◽  
Naresh Pai ◽  
Benjamin Hancock

Abstract. Standard practice of setting up Soil and Water Assessment Tool (SWAT) involves use of a single land use (LU) layer under the assumption that no change takes place in LU condition irrespective of the length of simulation period. This assumption leads to erroneous conclusions about efficacy of management practices in those watersheds where land use changes (LUCs) (e.g. agriculture to urban, forest to agriculture etc.) occur during the simulation period. To overcome this limitation, we have developed a user-friendly, web-based tool named LUU Checker that helps create a composite LU layer by integrating multiple years of LU layers available in watersheds of interest. The results show that the use of composite LU layer for hydrologic response unit (HRU) delineation in 2474-km2 L’Anguile River Watershed in Arkansas was able to capture changed LU at subbasin level by using LU data available in the year 1999 and 2006, respectively. The web-based tool is applicable for large size watersheds and is accessible to multiple users from anywhere in the world. Keywords: Land use, Web-based tool, SWAT, LUU Checker.


2008 ◽  
Vol 65 (9) ◽  
pp. 1676-1688 ◽  
Author(s):  
Janet C. Coetzee ◽  
Carl D. van der Lingen ◽  
Laurence Hutchings ◽  
Tracey P. Fairweather

Abstract Coetzee, J. C., van der Lingen, C. D., Hutchings, L., and Fairweather, T. P. 2008. Has the fishery contributed to a major shift in the distribution of South African sardine? – ICES Journal of Marine Science, 65: 1676–1688. A major shift in the distribution of South African sardine (Sardinops sagax) has resulted in a significant spatial mismatch in fishing effort vs. fish abundance in recent years. The sardine fishery started on the west coast during the 1940s, and processing capacity there increased rapidly. This trend together with increases in annual landings continued up to the early 1960s, but then the fishery collapsed as a consequence of overfishing. The population then recovered steadily during the 1980s and 1990s, coincident with, but perhaps not entirely attributable to, the inception of conservative management practices, to support catches similar to pre-collapse levels. Since 2001, however, most of the sardine population has been situated on South Africa’s south coast, far from processing facilities. Fishing effort has increased concomitantly on that coast, particularly during the past three years, reflecting the continued decline in the abundance of sardine on the west coast. Three hypotheses explaining the change in the distribution of sardine have been proposed: (i) intensely localized (i.e. west coast) fishing pressure depleted that part (or functionally distinct unit) of the population; (ii) the shift was environmentally induced; and (iii) successful spawning and recruit survival on the south coast contributed disproportionately more towards the bulk of recruitment, and progeny spawned there now dominate the population and exhibit natal homing. The first of these hypotheses is evaluated, and management implications of the shift discussed.


2017 ◽  
Vol 9 (2) ◽  
pp. 39-58 ◽  
Author(s):  
Valerie J.M. Watzlaf ◽  
Leming Zhou ◽  
Dilhari R. DeAlmeida ◽  
Linda M. Hartman

The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P). PubMed, CINAHL and INSPEC from 2003 – 2016 were searched and returned 25,404 papers (after duplications were removed). Inclusion and exclusion criteria were strictly followed to examine title, abstract, and full text for 21 published papers which reported on privacy and security practices used by healthcare providers using telehealth.  Data on confidentiality, integrity, privacy, informed consent, access control, availability, retention, encryption, and authentication were all searched and retrieved from the papers examined. Papers were selected by two independent reviewers, first per inclusion/exclusion criteria and, where there was disagreement, a third reviewer was consulted. The percentage of agreement and Cohen’s kappa was 99.04% and 0.7331 respectively. The papers reviewed ranged from 2004 to 2016 and included several types of telehealth specialties. Sixty-seven percent were policy type studies, and 14 percent were survey/interview studies. There were no randomized controlled trials. Based upon the results, we conclude that it is necessary to have more studies with specific information about the use of privacy and security practices when using telehealth technologies as well as studies that examine patient and provider preferences on how data is kept private and secure during and after telehealth sessions.Keywords: Computer security, Health personnel, Privacy, Systematic review, Telehealth 


2017 ◽  
Author(s):  
◽  
Misheck Nyirenda

Research has become one of the major activities of higher education institutions (HEIs) worldwide. Increasingly important is research information that emanates from the published research as it has now become one of the major sources of funding especially within the South African higher education landscape. However, many HEIs are facing numerous problems managing research information to sustain and attract more funding. The lack of resources to build or acquire appropriate systems for managing research information has been identified as one of the major challenges in HEIs. However, recent studies show that advancements have been made in some countries to address the challenge. For instance, in South Africa, a proprietary research information management system (RIMS) has been implemented in some HEIs. Nevertheless, some HEIs still face problems regarding the use of RIMS. Studies further show that most proprietary systems do not adequately satisfy requirements as desired by the HEIs. This is mostly because proprietary systems are developed without fully understanding the user requirements of individual HEIs. Moreover, most proprietary systems are developed following ad hoc approaches which neglect the requirements specification stage in the development life cycle. Requirements specification is important as it brings developers and users to a common understanding about the requirements of the system before development. The initial lack of consensus about system requirements results in systems that have technical barriers which make users shun from using them. For instance, such systems do not adapt very well to devices with small screens such as mobile phones, and do not have attractive interfaces to make users want to use them. Proprietary systems are also costly to acquire and maintain. Moreover, HEIs may not be able to immediately implement the new desired features in the system because proprietary systems usually do not allow them access to the source code. This study develops a web-based research administration and management system (RAMS) as a proposed solution to the problems of using a proprietary system to manage research information at a South African higher education institution. The study emphasises the use of formal methods for requirements specification to build an optimal system. Consequently, the Zermelo-Fraenkel Z specification language was used to specify the requirements of the proposed system which was developed in close collaboration with the intended users who also assessed its usability. The system evaluation responses were made on a 5-point Likert scale ranging from Strongly Disagree to Strongly Agree. The overall results of the evaluation show that RAMS is usable and suitable for managing research information, nonetheless improvements are recommended.


Sign in / Sign up

Export Citation Format

Share Document