Browsing Research Output by Author "10059199 - Steyn, Tjaart"
Now showing items 1-15 of 15
-
An assessment of the role of cultural factors in information security awareness
Kruger, H.A.; Drevin, L.; Steyn, T.; Flowerday, S. (IEEE, 2011)An information security awareness program is regarded as an important instrument in the protection of information assets. In this study, the traditional approach to an information security awareness program is extended to ... -
Determinants of password security: some educational aspects
Drevin, Lynette; Kruger, Hennie; Steyn, Tjaart (Springer, 2013)Development and integration of technology give organisations the opportunity to be globally competitive. However, the potential misuse of Information Technology (IT) is a reality that has to be dealt with by management, ... -
A diet expert system utilizing linear programming models in a rule-based inference engine
Van der Merwe, Annette; Kruger, Hennie; Steyn, Tjaart (ORLab Analytics, 2014)Linear programming is commonly used for solving complex problems in various fields, such as dietetics. Expert systems use expertise and inference procedures to solve problems that require advanced expert knowledge and are ... -
Efficient waste reduction algorithms based on alternative underestimates for the modified Wang method
Oberholzer, J.A.; Hattingh, J.M.; Steyn, T. (Operations Research Society of South Africa, 2014)This paper is concerned with wastage reduction in constrained two-dimensional guillotine- cut cutting stock problems, often called trim loss problems. A number of researchers report in the literature on algorithmic ... -
Email security awareness: a practical assessment of employee behaviour
Kruger, Hennie; Drevin, Lynette; Steyn, Tjaart (Springer, 2007)Email communication is growing as a main method for individuals and organizations to communicate. Sadly, this is also an emerging means of conducting crime in the cyber world, e.g. identity theft, virus attacks etc. ... -
An empirical assessment of factors impeding effective password management
Kruger, Hennie; Steyn, Tjaart; Drevin, Lynette; Medlin, B. Dawn (Taylor & Francis, 2009)Since passwords are one of the main mechanisms used to protect data and information, it is important to ensure that passwords are managed correctly and that those factors which will have a significant impact on password ... -
An exact algorithm for the N-sheet two dimensional single stock-size cutting stock problem
Steyn, T.; Hattingh, J.M. (ORSSA (Operations Research Society of South Africa), 2015)The method introduced in this paper extends the trim-loss problem or also known as 2D rect- angular SLOPP to the multiple sheet situation where N same size two-dimensional sheets have to be cut optimally producing demand ... -
Identity theft: empirical evidence from a phishing exercise
Steyn, T.; Kruger, H.A.; Drevin, L. (Springer, 2007)Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security awareness; however, IT management ... -
A linguistic approach to information security awareness education in a healthcare environment
Drevin, Lynette; Kruger, Hennie; Bell, Anna-Marie; Steyn, Tjaart (Springer, 2017)It is widely accepted that healthcare information security is extremely important and that security breaches will have serious consequences in many areas. Despite controls, such as legal frameworks, as well as ongoing ... -
'n Model van faktore wat die sukses van onderrigleer van tegnologie-gebaseerde modules beïnvloed
Goede, Roelien; Steyn, Tjaart; Taylor, Estelle (LitNet, 2011)Dit wil voorkom asof daar groepe studente is wat meer probleme ondervind met die bemeestering van tegnologiegebaseerde modules as ander modules. Bestaande navorsing dui op spesifieke faktore wat sterk figureer in die sukses ... -
'n Model van faktore wat die sukses van onderrigleer van tegnologie–gebaseerde onderwerpe beinvloed
Estelle Taylor; Roelien Goede; Tjaart Steyn (Universiteit van Stellenbosch, 2011)There appear to be groups of students who experience more problems with the mastering of technology-based subjects (where technology is used, but is not the main subject of the study) than other (non-technology-based) ... -
The use of an information security vocabulary test to assess information security awareness: an exploratory study
Kruger, Hennie; Drevin, Lynette; Steyn, Tjaart (Centre for Security, Communications and Network Research (CSCAN), 2010)The dependence on human involvement and human behavior to protect information assets makes it necessary to have an information security awareness program to make people aware of their roles and responsibilities towards ... -
Value-focused assessment of ICT security awareness in an academic environment
Drevin, L.; Kruger, H.A.; Steyn, T. (Elsevier, 2007)Security awareness is important to reduce human error, theft, fraud, and misuse of computer assets. A strong ICT security culture cannot develop and grow in a company without awareness programmes. This paper focuses on ICT ... -
Value-focused assessment of information communication and technology security awareness in an academic environment
Drevin, Lynette; Kruger, Hennie; Steyn, Tjaart (Springer, 2006)The aim of this paper is to introduce the approach of value-focused thinking when identifying information and communications technology (ICT) security awareness aspects. Security awareness is important to reduce human ... -
A vocabulary test to assess information security awareness
Kruger, Hennie; Drevin, Lynette; Steyn, Tjaart (Emerald, 2010)Purpose – The dependence on human involvement and human behavior to protect information assets necessitates an information security awareness program to make people aware of their roles and responsibilities towards information ...