Spelling suggestions: "subject:"forminformation safety"" "subject:"informationation safety""
1 |
The establishment of a mobile phone information security culture: linking student awareness and behavioural intentBukelwa, Ngoqo January 2014 (has links)
The information security behaviour of technology users has become an increasingly popular research area as security experts have come to recognise that while securing technology by means of firewalls, passwords and offsite backups is important, such security may be rendered ineffective if the technology users themselves are not information security conscious. The mobile phone has become a necessity for many students but, at the same time, it exposes them to security threats that may result in a loss of information. Students in developing countries are at a disadvantage because they have limited access to information relating to information security threats, unlike their counterparts in more developed societies who can readily access this information from sources like the Internet. The developmental environment is plagued with challenges like access to the Internet or limited access to computers. The poor security behaviour exhibited by student mobile phone users, which was confirmed by the findings of this study, is of particular interest in the university context as most undergraduate students are offered a computer-related course which covers certain information security-related principles. During the restructuring of the South African higher education system, smaller universities and technikons (polytechnics) were merged to form comprehensive universities. Thus, the resultant South African university landscape is made up of traditional and comprehensive universities as well as universities of technology. Ordinarily, one would expect university students to have similar profiles. However in the case of this study, the environment was a unique factor which had a direct impact on students’ learning experiences and learning outcomes. Mbeki (2004) refers to two economies within South Africa the first one is financially sound and globally integrated, and the other found in urban and rural areas consists of unemployed and unemployable people who do not benefit from progress in the first economy. Action research was the methodological approach which was chosen for the purposes of this study to collect the requisite data among a population of university students from the ‘second economy’. The study focuses on the relationship between awareness and behavioural intention in understanding mobile phone user information security behaviour. The study concludes by proposing a behaviour profile forecasting framework based on predefined security behavioural profiles. A key finding of this study is that the security behaviour exhibited by mobile phone users is influenced by a combination of information security awareness and information security behavioural intention, and not just information security awareness.
|
2 |
Zneužití digitálních stop uživatelů ICT: vzdělávání v knihovnách jako prevence narušení soukromí / Misuse of ICT users digital footprint: library education as a prevention of privacy invasionKovářová, Pavla January 2015 (has links)
Title of the dissertation: Misuse of ICT users digital footprint: library education as a prevention of privacy invasion Author: PhDr. Pavla Kovářová Supervisor: Ing. Martin Souček, Ph.D. Digital footprints, within the meaning of digital information informing about a particular person, belongs to the basic of the information society. They can help (e.g. as a proof of professional quality), but also hurt (e.g. documents of inappropriate behaviour, information misused in information attack) a man whom they relate. Managing digital footprints is becoming important for increasing amount of people. Libraries can promote knowledge of procedures for the effective management of digital footprints by information literacy lessons, which is a prerequisite for their application. PhD thesis describes the theoretical, but especially the research level. Activities of Czech libraries in education are mapped for the correct setting of lessons. Questionnaires showed that the topic continues with the current activities and interest in libraries. Knowledge of librarians and library and information studies students about digital footprints was subsequently tested. Knowledge has been proven, however only to a basic, limited level, but they are enough for four lessons designed for children in elementary school in the dissertation....
|
3 |
Informační politika Finské republiky / Information Policy of Republic of FinlandRybářová, Kristýna January 2013 (has links)
This diploma thesis called Information policy of Republic of Finland is describing finnish e-government in present time. The text talking about Finnish Regulatory Authority - FICORA. This authority is subordinated to Ministry of transport and communications and it's main mission is making available information, protecting them, but also secure data transmission. With data protection organization helping the National Security Authority or the NSA. The text also describes finnish information policy, it's beggining, the present and the future strategy. It reveals the structure and organization of the whole information system, points out the obstacles it had to Finnish government in implementing e-government deal and what recommendations were given to the State by the OECD. Furthermore, this work demonstrates the most important portals, strategic plans and projects of the Ministry of Finance that the project e-government shielded.
|
Page generated in 0.1183 seconds