/

GlobalView
  • Change Site
  • GlobalView
  • Research Output
  • Past Exam Papers
  • Special Collections
  • Advanced Search
  • Expert Search
  • Sign In
    • Help
    • Search History
    • Clear Session
  • Browse
    • Entire Repository  
    • Recent Additions
    • Communities & Collections
    • By Title
    • By Creator
    • By Subject
    • By Contributor
    • Most Accessed Papers
    • Most Accessed Items
    • Most Accessed Authors
  • Quick Collection  
Sign In
  • Help
  • Search History
  • Clear Session

Showing items 1 - 2 of 2

Your selections:

  • Proceedings of PICMET '12: Technology Management for Emerging Technologies.
Creator
1Grobler, M. 1Kruger, David 1Pretorius, Jan-Harm C. 1Veerasamy, N. 1Vermeulen, Andre 1Von Solms, S.
Subject
1Business processes - South Africa 1Cybercrime 1Cyberterrorism 1Optimisation
Facets
Creator
1Grobler, M. 1Kruger, David 1Pretorius, Jan-Harm C. 1Veerasamy, N. 1Vermeulen, Andre 1Von Solms, S.
Subject
1Business processes - South Africa 1Cybercrime 1Cyberterrorism 1Optimisation
  • Title
  • Creator
  • Date

Quick View

Towards a cyberterrorism life-cycle (CLC) model

- Veerasamy, N., Von Solms, S., Grobler, M.


  • Authors: Veerasamy, N. , Von Solms, S. , Grobler, M.
  • Date: 2012
  • Subjects: Cybercrime , Cyberterrorism
  • Type: Article
  • Identifier: uj:6282 , ISSN 978-1-4673-2853-1 , http://hdl.handle.net/10210/9888
  • Description: Cyberterrorism has emerged as a new threat in the Information and Communication Technology (ICT) landscape. The ease of use, affordability, remote capabilities and access to critical targets makes cyberterrorism a potential threat to cause wide-scale damage. Cyberterrorism is often incorrectly perceived as encompassing all cybercrimes. However, cyberterrorism differs from cybercrime in various ways including motivation, attack goals, techniques and effects. Motivations for cyberterrorism, which is similar to terrorism in general, stem from religious, social and political views. Cyberterrorists generally would seek to have high impact in order to gain publicity for their cause, whereas cybercriminals often prefer to have their acts undetected in order to hide their financial theft, fraud or espionage. Therefore, there are various factors that drive the development of a cyberterrorist. This paper proposes a model for the development of cyberterrorism in order to show the various influential forces. The Cyberterrorism Life-Cycle (CLC) model presented in this paper is composed of five phases: Prepare, Acquaint, Choose, Execute, and Deter (PACED). In addition the paper looks at various factors, including social, practices, objectives, targets and countermeasures, which are mapped onto the PACED phases in order to show the interaction and dynamic nature during the life-cycle development.
  • Full Text:

Towards a cyberterrorism life-cycle (CLC) model

  • Authors: Veerasamy, N. , Von Solms, S. , Grobler, M.
  • Date: 2012
  • Subjects: Cybercrime , Cyberterrorism
  • Type: Article
  • Identifier: uj:6282 , ISSN 978-1-4673-2853-1 , http://hdl.handle.net/10210/9888
  • Description: Cyberterrorism has emerged as a new threat in the Information and Communication Technology (ICT) landscape. The ease of use, affordability, remote capabilities and access to critical targets makes cyberterrorism a potential threat to cause wide-scale damage. Cyberterrorism is often incorrectly perceived as encompassing all cybercrimes. However, cyberterrorism differs from cybercrime in various ways including motivation, attack goals, techniques and effects. Motivations for cyberterrorism, which is similar to terrorism in general, stem from religious, social and political views. Cyberterrorists generally would seek to have high impact in order to gain publicity for their cause, whereas cybercriminals often prefer to have their acts undetected in order to hide their financial theft, fraud or espionage. Therefore, there are various factors that drive the development of a cyberterrorist. This paper proposes a model for the development of cyberterrorism in order to show the various influential forces. The Cyberterrorism Life-Cycle (CLC) model presented in this paper is composed of five phases: Prepare, Acquaint, Choose, Execute, and Deter (PACED). In addition the paper looks at various factors, including social, practices, objectives, targets and countermeasures, which are mapped onto the PACED phases in order to show the interaction and dynamic nature during the life-cycle development.
  • Full Text:
Quick View

Business processes capability and performance : a South African perspective

- Vermeulen, Andre, Pretorius, Jan-Harm C., Kruger, David


  • Authors: Vermeulen, Andre , Pretorius, Jan-Harm C. , Kruger, David
  • Date: 2012
  • Subjects: Optimisation , Business processes - South Africa
  • Type: Article
  • Identifier: uj:6031 , ISSN 978-1-4673-2853-1 , http://hdl.handle.net/10210/10053
  • Description: Successful organisations depend on leadership, process optimisation, and utilisation of resources. Optimisation is achievable through well-defined systems and supporting processes that guide organisations towards excellence. Organisations need to understand operational and individual business processes as well as the strategic impact on the supply network. Effective optimisation impacts strategically on quality cost, revenue, investment, and capabilities. Business Process Capability measurements forces organisational leaders, managers and employees to critically analyse existing business processes, and determine gaps identifying existing performances and sub-optimal states. Many organizations in South Africa misunderstand business process capability and measure success on revenue and profits generated hiding inefficiencies that could be concealed by the profits. One of the contributing factors might be that some companies in South Africa lack international competitiveness, do not optimize their business processes nor align business processes and available resources to adhere to organizational goals and calls for radical redesign of business processes resulting from end-to-end fulfilling internal and external customer needs. The paper will show why organisations should base their competitiveness on a value chain and end - to - end business processes optimisation rather than only profit.
  • Full Text:

Business processes capability and performance : a South African perspective

  • Authors: Vermeulen, Andre , Pretorius, Jan-Harm C. , Kruger, David
  • Date: 2012
  • Subjects: Optimisation , Business processes - South Africa
  • Type: Article
  • Identifier: uj:6031 , ISSN 978-1-4673-2853-1 , http://hdl.handle.net/10210/10053
  • Description: Successful organisations depend on leadership, process optimisation, and utilisation of resources. Optimisation is achievable through well-defined systems and supporting processes that guide organisations towards excellence. Organisations need to understand operational and individual business processes as well as the strategic impact on the supply network. Effective optimisation impacts strategically on quality cost, revenue, investment, and capabilities. Business Process Capability measurements forces organisational leaders, managers and employees to critically analyse existing business processes, and determine gaps identifying existing performances and sub-optimal states. Many organizations in South Africa misunderstand business process capability and measure success on revenue and profits generated hiding inefficiencies that could be concealed by the profits. One of the contributing factors might be that some companies in South Africa lack international competitiveness, do not optimize their business processes nor align business processes and available resources to adhere to organizational goals and calls for radical redesign of business processes resulting from end-to-end fulfilling internal and external customer needs. The paper will show why organisations should base their competitiveness on a value chain and end - to - end business processes optimisation rather than only profit.
  • Full Text:

  • «
  • ‹
  • 1
  • ›
  • »
  • English (United States)
  • English (United States)
  • Disclaimer
  • Privacy
  • Copyright
  • Contact
  • About Vital

‹ › ×

    Clear Session

    Are you sure you would like to clear your session, including search history and login status?