The role of risky cyber-security behaviours on effective utilisation of high-performance computing systems in historically disadvantaged institutions
- Authors: Skritshi, Caron
- Date: 2023
- Subjects: Computer security -- South Africa , High performance computing -- Evaluation -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10353/29555 , vital:77983
- Description: This research study explores the impact of risky cybersecurity behaviours on effectively utilising High-Performance Computing Systems within Historically Disadvantaged Institutions in South Africa. The investigation utilises the Theory of Planned Behaviour and the Security Behaviour Intentions Scale to examine the attitudes, intentions, and actual usage patterns of High-Performance Computing Systems among students and staff members. Following the positivism paradigm, this study formulated hypotheses aimed at achieving the objectives. The research sample comprised of 306 users of High-Performance Computing systems selected through the convenience sampling. Employing a quantitative approach, the study used a crosssectional survey research design to collect and analyse data to achieve the study's objectives. The study's findings revealed a significant negative relationship between risky cybersecurity behaviours and attitudes toward High-Performance Computing Systems, highlighting the adverse impact of such behaviours on users' perceptions and acceptance of these systems. However, an insignificant relationship was found between attitudes toward High-Performance Computing Systems and the intention to use them. This suggests that attitudes alone may not substantially influence user behaviour in this context, contradicting the initially proposed relationship. Furthermore, the investigation identified an insignificant correlation between the intention to use High-Performance Computing Systems and the actual utilization of these systems, indicating a gap between intention and behaviour. This implies that the study's hypothesized relationship between these latent variables was not supported. Lastly, a noteworthy correlation emerged between social influence and the effective use of High- Performance Computing Systems, supporting the relationship between these variables. In summary, this research significantly enhances comprehension of the challenges and repercussions associated with cybersecurity behaviour in adopting and utilising High- Performance Computing Systems across five South African Historically Disadvantaged Institutions. It underscores the importance of addressing risky behaviours, enhancing user education, and implementing secure systems. These actions are essential for fostering the effective utilisation of High-Performance Computing Systems and unlocking their potential benefits for economic growth and educational advancements in South Africa. , Thesis (MIS) -- Faculty of Management and Commerce, 2023
- Full Text:
- Authors: Skritshi, Caron
- Date: 2023
- Subjects: Computer security -- South Africa , High performance computing -- Evaluation -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10353/29555 , vital:77983
- Description: This research study explores the impact of risky cybersecurity behaviours on effectively utilising High-Performance Computing Systems within Historically Disadvantaged Institutions in South Africa. The investigation utilises the Theory of Planned Behaviour and the Security Behaviour Intentions Scale to examine the attitudes, intentions, and actual usage patterns of High-Performance Computing Systems among students and staff members. Following the positivism paradigm, this study formulated hypotheses aimed at achieving the objectives. The research sample comprised of 306 users of High-Performance Computing systems selected through the convenience sampling. Employing a quantitative approach, the study used a crosssectional survey research design to collect and analyse data to achieve the study's objectives. The study's findings revealed a significant negative relationship between risky cybersecurity behaviours and attitudes toward High-Performance Computing Systems, highlighting the adverse impact of such behaviours on users' perceptions and acceptance of these systems. However, an insignificant relationship was found between attitudes toward High-Performance Computing Systems and the intention to use them. This suggests that attitudes alone may not substantially influence user behaviour in this context, contradicting the initially proposed relationship. Furthermore, the investigation identified an insignificant correlation between the intention to use High-Performance Computing Systems and the actual utilization of these systems, indicating a gap between intention and behaviour. This implies that the study's hypothesized relationship between these latent variables was not supported. Lastly, a noteworthy correlation emerged between social influence and the effective use of High- Performance Computing Systems, supporting the relationship between these variables. In summary, this research significantly enhances comprehension of the challenges and repercussions associated with cybersecurity behaviour in adopting and utilising High- Performance Computing Systems across five South African Historically Disadvantaged Institutions. It underscores the importance of addressing risky behaviours, enhancing user education, and implementing secure systems. These actions are essential for fostering the effective utilisation of High-Performance Computing Systems and unlocking their potential benefits for economic growth and educational advancements in South Africa. , Thesis (MIS) -- Faculty of Management and Commerce, 2023
- Full Text:
Towards an information security awareness process for engineering SMEs in emerging economies
- Authors: Gundu, Tapiwa
- Date: 2013
- Subjects: Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11138 , http://hdl.handle.net/10353/d1007179 , Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Description: With most employees in Engineering Small and Medium Enterprises (SME) now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms’ important information has increased. These Engineering SMEs tend to be more concerned with vulnerabilities from external threats, although industry research suggests that a substantial proportion of security incidents originate from insiders within the firm. Hence, technical preventative measures such as antivirus software and firewalls are proving to solve only part of the problem as the employees controlling them lack adequate information security knowledge. This tends to expose a firm to risk and costly mistakes made by naïve/uninformed employees. This dissertation presents an information security awareness process that seeks to cultivate positive security behaviours using a behavioural intention model based on the Theory of Reasoned Action, Protection Motivation Theory and the Behaviourism Theory. The process and model have been refined and verified using expert review and tested through action research at an Engineering SME in South Africa. The main finding was information security levels of employees within the firm were low, but the proposed information security awareness process increased their knowledge thereby positively altering their behaviour.
- Full Text:
- Authors: Gundu, Tapiwa
- Date: 2013
- Subjects: Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11138 , http://hdl.handle.net/10353/d1007179 , Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Description: With most employees in Engineering Small and Medium Enterprises (SME) now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms’ important information has increased. These Engineering SMEs tend to be more concerned with vulnerabilities from external threats, although industry research suggests that a substantial proportion of security incidents originate from insiders within the firm. Hence, technical preventative measures such as antivirus software and firewalls are proving to solve only part of the problem as the employees controlling them lack adequate information security knowledge. This tends to expose a firm to risk and costly mistakes made by naïve/uninformed employees. This dissertation presents an information security awareness process that seeks to cultivate positive security behaviours using a behavioural intention model based on the Theory of Reasoned Action, Protection Motivation Theory and the Behaviourism Theory. The process and model have been refined and verified using expert review and tested through action research at an Engineering SME in South Africa. The main finding was information security levels of employees within the firm were low, but the proposed information security awareness process increased their knowledge thereby positively altering their behaviour.
- Full Text:
- «
- ‹
- 1
- ›
- »