Information Systems - Theses
Now showing items 1-10 of 33
Exploring knowledge leakage risk in knowledge-intensive organisations: behavioural aspects and key controls
Knowledge leakage poses a critical risk to the competitiveness advantages of knowledge-intensive organisations. Although knowledge leakage is a human-centric security issue, little is known in relation to the key factors ...
Towards a model that explains knowledge sharing behaviour for complex tasks
In organisations, knowledge sharing has been studied in many different contexts and settings, as it is an integral part of knowledge creation. This thesis presents and tests a model that explains motivations for knowledge ...
Understanding how cloud computing enables business model innovation in start-up companies
Start-up companies contribute significantly to the national economies of many countries but their failure rate is notably high. Successful start-ups typically depend on innovative business models to be competitive and ...
Brokering algorithms for data replication and migration across cloud-based data stores
Cloud computing provides users with highly reliable, scalable and flexible computing and storage resources in a pay-as-you-go manner. Data storage services are gaining increasing popularity and many organizations are ...
Player negotiated digital multiplayer game experiences
This thesis covers the negotiation of rules and experiences by players of digital multiplayer games. An examination of existing literature found that overall contemporary games studies can be seen to suffer from an ...
Towards intelligence-driven information security risk management: an intelligent information security method
Information security risk management (ISRM) methods aim to protect organizational information infrastructure from a range of security threats using efficient and cost‐effective means. A review of the literature identified ...
Enhancing the security and privacy of cloud-based health records systems
Electronic health records (EHR) and personal health records (PHR) are emerging services for electronic health. They allow healthcare providers, clinicians and patients to manage, access and share medical data. EHR and PHR ...
Designing digital memorials: commemorating the Black Saturday Bushfires
Digital memorials are novel technologies used for commemorative purposes. There is a growing interest in their design amongst HCI researchers. Existing studies focus on commemorating deceased loved ones, where personal and ...
Mitigating BYOD information security risks
BYOD is a trend in organizations to allow employees, contractors and suppliers to use their personal devices in the workplace. Users can access electronic organizational resources from their tablets, smartphones, laptops, ...
Information security manager as a strategist
The modern organisation operates within a highly complex and sophisticated security threat landscape that exposes its information infrastructure to a range of security risks. This threat landscape includes advanced persistent ...