dc.contributor.author |
Padayachee, Keshnee
|
|
dc.contributor.author |
Eloff, Jan H.P.
|
|
dc.date.accessioned |
2012-08-30T10:22:02Z |
|
dc.date.available |
2012-08-30T10:22:02Z |
|
dc.date.issued |
2012-06 |
|
dc.description.abstract |
This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects
than do traditional access control models. Deterrent controls are intended to discourage individuals from intentionally violating
information security policies or procedures. In this context, an adaptation of usage control is assessed as a proactive means of
deterrence control to protect information that cannot be adequately or reasonably protected by access control. These deterrents are
evaluated using the design science methodology. Parallel prototypes were developed with the aim of producing multiple alternatives,
thereby shifting the focus from purely usability testing to model testing. |
en_US |
dc.description.uri |
http://www.journals.co.za/ej/ejour_comp.html |
en_US |
dc.identifier.citation |
Padayachee, K & Eloff, JHP 2012, 'Evaluating usage control deterrents', South African Computer Journal, no. 48, pp. 1-8. |
en_US |
dc.identifier.issn |
1015-7999 |
|
dc.identifier.uri |
http://hdl.handle.net/2263/19667 |
|
dc.language.iso |
en |
en_US |
dc.publisher |
Computer Society of South Africa |
en_US |
dc.rights |
Computer Society of South Africa |
en_US |
dc.subject |
Access control |
en_US |
dc.subject |
Usage control |
en_US |
dc.subject |
Deterrent control |
en_US |
dc.title |
Evaluating usage control deterrents |
en_US |
dc.type |
Article |
en_US |