Evaluating usage control deterrents

Show simple item record

dc.contributor.author Padayachee, Keshnee
dc.contributor.author Eloff, Jan H.P.
dc.date.accessioned 2012-08-30T10:22:02Z
dc.date.available 2012-08-30T10:22:02Z
dc.date.issued 2012-06
dc.description.abstract This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to discourage individuals from intentionally violating information security policies or procedures. In this context, an adaptation of usage control is assessed as a proactive means of deterrence control to protect information that cannot be adequately or reasonably protected by access control. These deterrents are evaluated using the design science methodology. Parallel prototypes were developed with the aim of producing multiple alternatives, thereby shifting the focus from purely usability testing to model testing. en_US
dc.description.uri http://www.journals.co.za/ej/ejour_comp.html en_US
dc.identifier.citation Padayachee, K & Eloff, JHP 2012, 'Evaluating usage control deterrents', South African Computer Journal, no. 48, pp. 1-8. en_US
dc.identifier.issn 1015-7999
dc.identifier.uri http://hdl.handle.net/2263/19667
dc.language.iso en en_US
dc.publisher Computer Society of South Africa en_US
dc.rights Computer Society of South Africa en_US
dc.subject Access control en_US
dc.subject Usage control en_US
dc.subject Deterrent control en_US
dc.title Evaluating usage control deterrents en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record