Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lucas M. Venter is active.

Publication


Featured researches published by Lucas M. Venter.


Technological and Economic Development of Economy | 2012

A sustainable information security framework for e-Government – case of Tanzania

Carina Kabajunga Wangwe; Maria Margaretha Eloff; Lucas M. Venter

Abstract The government of Tanzania adopted an e-Government strategy in 2009 that is aimed at improving efficiency in government and providing better services to citizens. Information security is identified as one of the requirements for the successful e-Government implementation although the government has not adopted any standards or issued guidelines to government agencies with regards to information security. Comprehensive addressing of information security can be an expensive undertaking and without guidelines information security implementations may be more prone to failure. In a resource poor country such as Tanzania, there is a need for a cost effective and sustainable means of addressing information security in e-Government implementations. In this paper the authors present a case study of an e-Government interaction between a ministry and a government agency and the information security challenges identified in the implementation. In order to address these challenges an information security fram...


Information Management & Computer Security | 2013

Psychosocial risks: Can their effects on the security of information systems really be ignored?

Evangelos D. Frangopoulos; Mariki M. Eloff; Lucas M. Venter

Purpose – The purpose of this paper is to highlight the relation of psychosocial risks to information security (IS). Although psychosocial risks at the workplace have been extensively researched from a managerial point of view, their effect on IS has not been formally studied to the extent required by the gravity of the topic. Design/methodology/approach – Based on existing research on psychosocial risks, their potential effects on IS are examined. Findings – It is shown that as psychosocial risks affect people at the workplace, they diminish their ability to defend IS. Research limitations/implications – Psychosocial risks are identified as a factor in IS breakdown. Future research should be directed towards assessing the significance of the effects of various psychosocial risks on IS, creating an assessment methodology for the resulting IS posture of the organisation and devising mitigation methodologies. Practical implications – The proposed approach will provide a significant part of the answer to the question of why IS fails when all prescribed measures and controls are in place and active. More effective controls for psychosocial risks at the workplace can be created as the incentive of upholding IS will be added to the equation of their mitigation. Social implications – The organisational environment in which human beings are called upon to function in a secure manner will be redefined, along with what constitutes a “reasonable request” from human operators in the context of IS. Originality/value – Bringing together psychosocial risks and IS in research will provide a better understanding of the shortcomings of human nature with respect to IS. Organisations and employees will benefit from the resulting psychosocial risk mitigation.


south african institute of computer scientists and information technologists | 2011

Towards the formalisation of object-oriented methodologies

Ayodele Adesina-Ojo; John A. van der Poll; Lucas M. Venter

Formal methods have been shown to be beneficial in increasing the quality of and confidence in software systems. The adoption of formal methods in industry has however been limited where the use of informal and semi-formal notations is favoured. To bridge the gap between the ease-of-use of semi-formal notations and correctness of formal methods, a number of approaches to the formalisation of semi-formal notations have been proposed. Two of these approaches are discussed in this paper on the strength of a case study. It is shown that each approach offers results that differ in terms of levels of abstraction, requisite knowledge of the formal target specification language and potential for automation.


information security for south africa | 2008

Social Aspects of Information Security.

Evangelos D. Frangopoulos; Mariki M. Eloff; Lucas M. Venter


HAISA | 2014

Human Aspects of Information Assurance: A Questionnaire-based Quantitative Approach to Assessment

Evangelos D. Frangopoulos; Mariki M. Eloff; Lucas M. Venter


information security for south africa | 2009

Too many laws but very little progress! Is South African highly acclaimed information security legislation redundant?

Rabelani Dagada; Mariki M. Eloff; Lucas M. Venter


HAISA | 2012

Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?.

Evangelos D. Frangopoulos; Mariki M. Eloff; Lucas M. Venter


Archive | 2009

e-Government Readiness: An Information Security Perspective from East Africa

Carina Kabajunga Wangwe; Mariki M. Eloff; Lucas M. Venter


South African Computer Journal | 2003

Agents, security and ethics: a framework for analysis

E. Smith; Mariki M. Eloff; Lucas M. Venter; Andries Barnard; Laurette Pretorius


Archive | 2015

Cybersecurity Economics - Induced Risks, Latent Costs and Possible Controls

Evangelos D. Frangopoulos; Mariki M. Eloff; Lucas M. Venter

Collaboration


Dive into the Lucas M. Venter's collaboration.

Top Co-Authors

Avatar

Mariki M. Eloff

University of South Africa

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andries Barnard

University of South Africa

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

E. Smith

University of South Africa

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manoj Lall

Tshwane University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge