Passphrase and Keystroke Dynamics Authentication: Usable Security
- Authors: Bhana, Bhaveer , Flowerday, Stephen
- Date: 2020
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158372 , vital:40178 , https://doi.org/10.1016/j.cose.2020.101925
- Description: It was found that employees spend a total of 2.25 days within 60 days on password-related activities. The time consumed by this is unproductive and has a negative impact on usability. The problem is caused by current text-based user authentication policies in use. This study aims to address this research problem by assessing the effectiveness of a proposed two-tier user authentication solution involving passphrases and keystroke dynamics.
- Full Text:
- Date Issued: 2020
Privacy risk and the use of Facebook Apps: a gender-focused vulnerability assessment
- Authors: Van der Schyff, Karl , Flowerday, Stephen , Furnell, Steven
- Date: 2020
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/149054 , vital:38800 , https://doi.org/10.1016/j.cose.2020.101866
- Description: The surveillance and subsequent privacy risks (i.e., misuse of personal information) of Facebook App data constitute a persistent problem that affects millions of users. However, despite Facebook App research on specifics such as privacy concerns, value of information, and demographics, none of them has conducted vulnerability assessments on the use of Facebook Apps as influenced by specific factors such as age, gender, and information privacy attitudes. As such, the purpose of this study was to predict the extent to which these factors influence an individual's intention to continue using Facebook Apps as part of a gender-focused vulnerability assessment. We evaluate two hypotheses by way of ordinal logistic regression using data gathered from 621 respondents. The results are indicative of the following: First, females are particularly vulnerable to privacy risks as a function of continued use of Facebook Apps. More specifically, those risks related to Facebook's access to personal information. Second, results indicate that a user's age is nonsignificant in relation to the continued use of Facebook Apps. We conclude with several theoretical and practice-oriented information privacy recommendations.
- Full Text:
- Date Issued: 2020
Information security and the dark side of trust
- Authors: Flowerday, Stephen
- Date: 2013-08-07
- Subjects: Information security , Information age , Cyber fraud , Social media , Internet , Trust , Systems theory
- Language: English
- Type: Inaugural lecture
- Identifier: vital:11970 , http://hdl.handle.net/10353/d1007234 , Information security , Information age , Cyber fraud , Social media , Internet , Trust , Systems theory
- Full Text:
- Date Issued: 2013-08-07
Restoring trust by verifying information integrity through continuous auditing
- Authors: Flowerday, Stephen
- Date: 2006
- Subjects: Auditing, Internal , Corporate governance
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9796 , http://hdl.handle.net/10948/504 , http://hdl.handle.net/10948/d1011920 , Auditing, Internal , Corporate governance
- Description: Corporate scandals such as Enron, WorldCom and Parmalat, have focused recent governance efforts in the domain of financial reporting due to fraudulent and/or erroneous accounting practices. In addition, the ineffectiveness of the current system of controls has been highlighted, including that some directors have been weak and ineffective monitors of managers. This board of director ‘weakness’ has called for additional mechanisms for monitoring and controlling of management, focusing on financial reporting. This problem intensifies in that today companies function in real-time, and decisions are based on available realtime financial information. However, the assurances provided by traditional auditing take place months after the transactions have occurred and therefore, a trust problem arises because information is not verified in real-time. Consequently, the errors and fraud concealed within the financial information is not discovered until months later. To address this trust problem a conceptual causal model is proposed in this study based on the principles of systems theory. The emergent property of the causal model is increased trust and control. This study establishes that mutual assurances assist in building trust and that information security assists in safeguarding trust. Subsequently, in order to have a positive relationship between the company directors and various stakeholders, uncertainty needs to be contained, and the level of trust needs to surpass the perceived risks. The study concludes that assurances need to be provided in real-time to restore stakeholder confidence and trust in the domain of financial reporting. In order to provide assurances in real-time, continuous auditing is required to verify the integrity of financial information when it becomes available, and not months later. A continuous auditing process has its foundations grounded in information technology and attends to the challenges in real-time by addressing the standardisation of data to enable effective analysis, the validation of the accuracy of the data and the reliability of the system.
- Full Text:
- Date Issued: 2006