Evaluating usage control deterrents

dc.contributor.authorPadayachee, Keshnee
dc.contributor.authorEloff, Jan H.P.
dc.contributor.emaileloff@cs.up.ac.zaen_US
dc.date.accessioned2012-08-30T10:22:02Z
dc.date.available2012-08-30T10:22:02Z
dc.date.issued2012-06
dc.description.abstractThis paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to discourage individuals from intentionally violating information security policies or procedures. In this context, an adaptation of usage control is assessed as a proactive means of deterrence control to protect information that cannot be adequately or reasonably protected by access control. These deterrents are evaluated using the design science methodology. Parallel prototypes were developed with the aim of producing multiple alternatives, thereby shifting the focus from purely usability testing to model testing.en_US
dc.description.urihttp://www.journals.co.za/ej/ejour_comp.htmlen_US
dc.identifier.citationPadayachee, K & Eloff, JHP 2012, 'Evaluating usage control deterrents', South African Computer Journal, no. 48, pp. 1-8.en_US
dc.identifier.issn1015-7999
dc.identifier.urihttp://hdl.handle.net/2263/19667
dc.language.isoenen_US
dc.publisherComputer Society of South Africaen_US
dc.rightsComputer Society of South Africaen_US
dc.subjectAccess controlen_US
dc.subjectUsage controlen_US
dc.subjectDeterrent controlen_US
dc.titleEvaluating usage control deterrentsen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Padayachee_Evaluating(2012).pdf
Size:
489.73 KB
Format:
Adobe Portable Document Format
Description:
Article

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: