acceptable use policy
Recently Published Documents


TOTAL DOCUMENTS

12
(FIVE YEARS 3)

H-INDEX

2
(FIVE YEARS 0)

2021 ◽  
Vol 11 (3) ◽  
pp. 226-233
Author(s):  
Amadi Chukwuemeka Augustine ◽  
Juliet Nnenna Odii ◽  
Stanley A Okolie

This paper review seeks to identify the need for a revamped data life cycle security in the era of pervasive threat from skill cyber criminals at this time of internet of things. The motivation is to fill the knowledge gap by presenting some of the ways of data leakages and the likely protection in the organization. The aim is to present a good practice that encourages data confidentiality, acceptable use policy, knowledge of personnel and physical security policy. The building blocks of information security infrastructure across the entire organization is implemented by Enterprise Security Architecture. Rather than focus on individual functional and non-functional components in an individual application, it focuses on a strategic design for a set of security services that can be leveraged by multiple applications, systems, or business processes.


2021 ◽  
Vol 8 (3) ◽  
pp. 25-41
Author(s):  
Mario A. Pulido ◽  
Chris W. Johnson ◽  
Ahmed Alzahrani

The purpose of this paper consists of implementing an educational board game to evaluate the information security awareness level of healthcare personnel. The National Health Service Greater Glasgow and Clyde (NHSGGC) Information Security Acceptable Use Policy was used as a basis to generate the educational content of the board game and Lev Vygotsky’s social development theory was followed for the learning process of the participants. Two evaluations were carried out during this study. The results obtained during the first evaluation showed that it is fundamental to design the board game based on a set of rules in information security enacted by an organization to properly guide the participants with the knowledge they need to counter security incidents. The second evaluation showed that redesigning the content of the board game based on the information security policies of the NHSGGC, resulted in a more effective way of guiding participants on the procedures required for compliance with the policies of this health institution and offer them an understanding of the risks behind security incidents. This was demonstrated during this evaluation since the results obtained gave an approximation that it is possible to increase the level of awareness of information security in people regardless of their area of work or studies.


2016 ◽  
pp. 487-493
Author(s):  
Charles Edge ◽  
Daniel O’Donnell

2008 ◽  
Vol 10 (2) ◽  
Author(s):  
P. Laughton ◽  
C. Rensleigh

The on-line user of today has access to a vast collection of information resources. In addition, the developments in Internet and Web technologies have made it even easier for surfers to anonymously get access to on-line pornography. The purpose of this research was to investigate the extent to which access to on-line pornography at the University of Johannesburg can be managed. For the empirical part of this research 1037 questionnaires were proportionally distributed to and completed by students on all five campuses of the university. The questionnaire consisted of four sections: biographical information; university computer facility usage; university acceptable use policy; and personal experience with university computer facilities. The gender distribution for the sample was almost even, with a total of 49,4% male participants and 50,6% female, with the largest grouping of respondents (61,6%) aged between 19 years and 21 years. Of the respondents, 36,7% indicated that exposure to unsolicited pornography did not bother them. When asked to what extent students should have access to pornography, 60,5% stated 'None' while 32,6% believed that 'Restricted' access should be granted for research purposes and 6,9% believed that students should be granted 'Total' access to pornography. Results from the research will be used to manage access to on-line resources at the University of Johannesburg better.


2007 ◽  
Vol 9 (4) ◽  
Author(s):  
P. Laughton ◽  
C. Rensleigh

The on-line user of today has access to a vast collection of information resources. In addition, the developments in Internet and Web technologies have made it even easier for surfers to anonymously get access to on-line pornography. The purpose of this research was to investigate the extent to which access to on-line pornography at the University of Johannesburg can be managed. For the empirical part of this research 1037 questionnaires were proportionally distributed to and completed by students on all five campuses of the university. The questionnaire consisted of four sections: biographical information; university computer facility usage; university acceptable use policy; and personal experience with university computer facilities. The gender distribution for the sample was almost even, with total of 49,4% male participants and 50,6% female, with the largest grouping of respondents(61,6%) aged between 19 years and 21 years. Of the respondents, 36,7% indicated that exposure to unsolicited pornography did not bother them. When asked to what extent students should have access to pornography, 60,5% stated 'None' while 32,6% believed that 'Restricted' access should be granted for research purposes and 6,9% believed that students should be granted 'Total' access to pornography. Results from the research will be used to manage access to on-line resources at the University of Johannesburg better.


Sign in / Sign up

Export Citation Format

Share Document