Abstract is missing.
- Information Security Culture – Status Quo in SwitzerlandThomas Schlienger, Stephanie Teufel, Raphael Rues.
- A Framework for Evaluation of Information Systems SecurityJob Asheri Chaula, Louise Yngström, Stewart Kowalski. 1-11 [doi]
- An assessment of Information Security Policies within the Polokwane area: A case studyS. A. Mlangeni, E. Biermann. 1-9 [doi]
- Security for Distributed Web-Services via Aspect-Oriented ProgrammingAndreas U. Schmidt, Nicolai Kuntze, Thomas Rauch. 1-12 [doi]
- Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streamsBarry Irwin. 1-10
- Invasion of the RFIDs: are we heading towards “Modern Times”?Fabio Ghioni. 1-5 [doi]
- Trust on the WebRussell Cloran, Barry Irwin. 1-9 [doi]
- Measuring the effectivness of an internal control systemWilliam List, David Brewer. 1-13 [doi]
- An overview of image steganographyT. Morkel, Jan H. P. Eloff, Martin S. Olivier. 1-11 [doi]
- Metadata for trust in service-oriented architecturesMarijke Coetzee, Jan H. P. Eloff. 1-12 [doi]
- A new framework for bridging the gap between IT Service Management and IT Governance from a security perspectiveEduardo Da Cruz, Les Labuschagne. 1-12 [doi]
- Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of RedistributorsShingo Okamura, Maki Yoshida, Toru Fujiwara. 1-12 [doi]
- Secure Authentication combined with Anonymity: The end of an oxymoron?Evangelos Frangopoulos, Lucas M. Venter, Mariki M. Eloff. 1-11 [doi]
- Fighting spam in a corporate environment using open-source solutions - a case studyPieter Blaauw. 1-11 [doi]
- Revisiting Reachability Management as a Multilateral Security MechanismJacques A. Ophoff, Reinhardt Botha. 1-12 [doi]
- The Proliferation of Wireless Devices and its Role in Corporate GovernanceR. Mulder, Rossouw von Solms. 1-11 [doi]
- Developing Threat Networks for Risk Analysis of Information SystemsDennis Longley, Mark Branagan. 1-10 [doi]
- A security framework for an ERP systemCarl Marnewick, Les Labuschagne. 1-15 [doi]
- An approach to enhance the security of ICT infrastructure through legal, regulatory influencesCharles N. Tarimo, Louise Yngström, Stewart Kowalski. 1-12 [doi]
- Securing SOAP Messages with a Global Message Handler and a Standardized EnvelopeMaree Pather, L. M. Venter. 1-13 [doi]
- Attacking Signed BinariesMarco Slaviero, Jaco Kroon, Martin S. Olivier. 1-10 [doi]
- IT Forensics: the collection of and presentation of digital evidenceJohann Hershensohn. 1-14 [doi]
- Access to copyrighted work: right or privelege?M. Jansen. 1-11 [doi]
- Cryptographic Key Management principles applied in South African Internet BankingEmile Parkin. 1-12 [doi]
- Analysis of the financial institutions strategic e-business security solutions: Technical and non-TechnicalNorman Tinyiko Baloyi. 1-12 [doi]
- A holistic framework for the fostering of an information security sub-culture in organizationsJohan Van Niekerk, Rossouw von Solms. 1-13 [doi]
- A new Access Control model based on the Chinese Wall Security Policy ModelM. Loock, Jan H. P. Eloff. 1-10 [doi]
- Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune systemJeffy Mwakalinga, Louise Yngström. 1-11 [doi]
- Measuring Information Security Awareness - A West Africa Gold Mining Environment CaseH. A. Kruger, W. D. Kearney. 1-10 [doi]
- A Framework for Information Security Risk Management CommunicationWerner Bornman, Les Labuschagne. 1-11 [doi]
- Requirement Analysis of Enterprise DRM SystemsAlapan Arnab, Andrew Hutchison. 1-14 [doi]
- Information Security Management and Regulatory Compliance in the South African Health SectorT. Tuyikeze, Dalenca Pottas. 1-12 [doi]
- Foiling an Attack - Defeating IPSec Tunnel FingerprintingVafa D. Izadinia, Jan H. P. Eloff, Derrick G. Kourie. 1-14 [doi]
- Introduction to Assessing and Securing Web ServicesChristoff Breytenbach. 1-14 [doi]