Marius Potgieter

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
A call for adopting information security awareness amongst end-users has been suggested over the years. Adoption can occur through various methods. These methods each hold their own characteristics, whether being of a positive or negative nature. The challenge to find an appropriate method on which to establish and engage in a security dialog with a user(More)
  • Mark Bertus, Rita A. Franks, Albert D. Spalding, Farideh A. Farazmand, Richard T. Grenci, Ranjini L. Thaver +12 others
  • 2012
Business Education & Accreditation, ISSN: 1944-5903 (print) and ISSN: 2157-0809 (online) publishes high-quality articles in all areas of business education, accreditation and related fields. Theoretical, empirical and applied manuscripts are welcome for publication consideration. The Journal is published twice per year by the Institute for Business and(More)
—Humans are poorly equipped to perform repetitive tasks without adversely affecting the efficiency with which they are performing the task. Assets within a secure environment are usually protected with various controls that are enforced by users who follow operational controls associated to those assets. The current approach to security monitoring by means(More)
  • 1