Ease of access to information is a major concern in today’s world, which is heavily
dependent on information systems. Defending one’s information from unauthorized access is one
of the major challenges facing individuals and business entities in today’s society (Anderson
2001). Information security can be defined as the practice of defending one’s or an entity’s
information from unauthorized access, perusal, inspection, destruction or recording, disclosure
and use (Katsikas, ISC 2006 and Information Security Conference 2006). With the recent
technological advancements in the world, defending one’s information from malicious users can
be a challenge. For example, several governments including the United States government have
been victims of information security breaches (bbc.com).