Visible to the public Biblio

Filters: Author is Poll, J. A. van der  [Clear All Filters]
2017-11-20
Buthelezi, M. P., Poll, J. A. van der, Ochola, E. O..  2016.  Ambiguity as a Barrier to Information Security Policy Compliance: A Content Analysis. 2016 International Conference on Computational Science and Computational Intelligence (CSCI). :1360–1367.

Institutions use the information security (InfoSec) policy document as a set of rules and guidelines to govern the use of the institutional information resources. However, a common problem is that these policies are often not followed or complied with. This study explores the extent to which the problem lies with the policy documents themselves. The InfoSec policies are documented in the natural languages, which are prone to ambiguity and misinterpretation. Subsequently such policies may be ambiguous, thereby making it hard, if not impossible for users to comply with. A case study approach with a content analysis was conducted. The research explores the extent of the problem by using a case study of an educational institution in South Africa.

2017-03-08
Tonder, J. van, Poll, J. A. van der.  2015.  Cloud-based technologies for addressing long vehicle turnaround times at recycling mills. 2015 International Conference on Computing, Communication and Security (ICCCS). :1–8.

Transportation costs for road transport companies may be intensified by rising fuel prices, levies, traffic congestion, etc. Of particular concern to the Mpact group of companies is the long waiting times in the queues at loading and offloading points at three processing mills in the KZN (KwaZulu-Natal) province in South Africa. Following a survey among the drivers who regularly deliver at these sites, recommendations for alleviating the lengthy waiting times are put forward. On the strength of one of these recommendations, namely the innovative use of ICTs, suggestions on how cloud-based technologies may be embraced by the company are explored. In the process, the value added by a cloud-based supply chain, enterprise systems, CRM (Customer Relationship Management) and knowledge management is examined.