Abstract is missing.
- Examining End-user Perceptions of Information Risks: An Application for the Repertory Grid TechniqueMalcolm Robert Pattinson, Cate Jerram. 7-12 [doi]
- The Use of an Information Security Vocabulary Test to Assess Information Security Awareness - An Exploratory StudyHennie A. Kruger, Lynette Drevin, Tjaart Steyn. 13-22 [doi]
- Social Engineering: Towards A Holistic SolutionKenny Olof Robert Jansson, Rossouw von Solms. 23-34 [doi]
- Empirical Analysis of Human-Related Problems on Information Security in Cross-Cultural Environment -The Case of the East African Community-Tatsuo Asai, Aline Uwera Hakizabera. 35-46 [doi]
- Community Awareness and Involvement: An Overlooked Security ControlNkqubela Ruxwana, Marlien Herselman, Dalenca Pottas. 47-60 [doi]
- Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal PrivacyBenjamin George Sanders, Paul Dowland, Steven Furnell. 61-73 [doi]
- The Wild Wide West of Social NetworkingEdwin Donald Frauenstein, Rossouw von Solms. 74-87 [doi]
- The 14 layered framework for including social and organisational aspects in security managementYngve Monfelt, Sofie Pilemalm, Jonas Hallberg, Louise Yngström. 90-99 [doi]
- From the Resource to the Business Process Risk LevelStefan Fenz. 100-109 [doi]
- A model to measure the maturity of smartphone security at software consultanciesStephen Flowerday, Sean Allam. 110-121 [doi]
- Security and Quality Issues in IT ProjectsHassan El Desouki, Helen Armstrong. 122-131 [doi]
- Organizational Risk using Network AnalysisHelen Armstrong, Ian McCulloh. 132-141 [doi]
- Information security in hospitality SMMEs in Cape Metropole area: The management and culture perspectiveDavid Seikokotlelo Bedi, Stuart Warden. 142-153 [doi]
- A Model of Security Culture for e-ScienceShamal Faily, Ivan Flechais. 154-164 [doi]
- An Information Security Policy Development Life Cycle Tite Tuyikeze, Dalenca Pottas. 165-176 [doi]
- Information Security Management Systems in the Healthcare ContextSinovuyo Tyali, Dalenca Pottas. 177-187 [doi]
- Unifying ISO Security Standards Practices into a Single Security FrameworkAggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis. 188-203 [doi]
- A Course Applying Network Analysis to Organizational Risk in Information SecurityHelen Armstrong, Colin J. Armstrong, Ian McCulloh. 204-214 [doi]
- An Integrative Approach to Information Security Education: A South African PerspectiveLynn Futcher, cheryl schroder, Rossouw von Solms. 215-222 [doi]
- Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention SystemAhmed Patel, Qais Qassim, Zarina Shukor, Jose Nogueira, Joaquim Celestino Júnior, Christopher Wills. 223-234 [doi]
- A Novel Support Vector Machine Approach to High Entropy Data Fragment ClassificationQiming Li, Alvin Y. Ong, Ponnuthurai N. Suganthan, Vrizlynn L. L. Thing. 236-247 [doi]
- Optimal Path Construction for Fragmented File CarvingHwei-Ming Ying, Vrizlynn L. L. Thing. 248-260 [doi]
- Digital forensic standards: international progressMarthie Grobler. 261-271 [doi]
- Heuristic Attack on Graphic Password GenerationSchalk Willem Peach, Johannes Vorster, Renier van Heerden. 272-284 [doi]