Abstract is missing.
- Social Engineering Attack Detection Model: SEADMMonique Bezuidenhout, Francois Mouton, Hein S. Venter. [doi]
- A Digital Evidence Management PlanCornelia Grobler, Buks Louwrens. [doi]
- Mobile Security from an Information Warfare PerspectiveBrett van Niekerk, Manoj Maharaj. [doi]
- The Management of Cloud Computing SecuritySumant Ramgovind, Mariki M. Eloff, Elme Smith. [doi]
- Broadband broadens scope for cyber crime in AfricaMarthie Grobler, Joey Jansen van Vuuren. [doi]
- A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information TechnologyAnass Bayaga, Stephen Flowerday. [doi]
- Towards an Ethical Analysis of the W3C Web Services Architecture ModelValiya Gangadharan, Laurette Pretorius. [doi]
- Biometrics as an Agent to Reduce Fraud in the Micro Lending Industry in South AfricaAlain Craven, Mariki M. Eloff. [doi]
- Towards an Information Security Framework for Service-Oriented ArchitectureJacqui Chetty, Marijke Coetzee. [doi]
- A Test Bed for Information Security Skill Development with Virtual Training EnvironmentAlok Tripathi, Abhinav Mishra, G. V. Raghunathan. [doi]
- Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology InformationZiyad S. Al-Salloum, Stephen D. Wolthusen. [doi]
- Motivation for CyberterrorrismNamosha Veerasamy. [doi]
- Towards a framework to guide compliance with IS Security policies and Regulations in a universityMichael Kyobe. [doi]
- Multi-channel, Multi-level Authentication for More Secure eBankingMohamed Al Fairuz, Karen Renaud. [doi]
- Phishing for FortuneMarthie Grobler. [doi]
- Towards Security Effectiveness Measurement utilizing Risk-Based Security AssuranceReijo Savola, Heimo Pentikäinen, Moussa Ouedraogo. [doi]
- A framework for evaluating IT security investments in a banking environmentEugene Smith, Hennie Kruger. [doi]
- A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting SystemOliver Spycher, Rolf Haenni. [doi]
- Inclusive Information Society - Challenges from a South African Rural Primary Healthcare PerspectiveMoses Dlamini, Elmarie Venter, Jan H. P. Eloff, Danie Smit. [doi]
- Towards a Standardised Digital Forensic Process: E-mail ForensicsHimal Lalla, Stephen Flowerday. [doi]
- An investigation and survey of response options for Intrusion Response Systems (IRSs)Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke. [doi]
- Common problems faced during the establishment of a CSIRTMarthie Grobler, Harri Bryk. [doi]
- A Digital Forensic Readiness Framework for South African SME'sDavid Barske, Adrie Stander, Jason Jordaan. [doi]
- Deep Packet Inspection - Fear of the UnknownRyan Goss, Reinhardt Botha. [doi]
- On Monitoring Information Flow of Outsourced DataAnne Kayem. [doi]
- Phishing within E-Commerce: A Trust and Confidence GameGreg Megaw, Stephen Flowerday. [doi]
- A Generalized model for understanding and education of Information and Computer SecurityHendrik Visage, Martin S. Olivier. [doi]
- Adding digital forensic readiness to the email trace headerFrancois Ruan Van Staden, Hein S. Venter. [doi]
- Considering web services security policy compatibilityTristan Lavarack, Marijke Coetzee. [doi]
- Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation ApproachKaren Renaud, Dora Galvez-Cruz. [doi]
- The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host ObservationMark M. Seeger, Stephen D. Wolthusen, Christoph Busch, Harald Baier. [doi]
- Secure Publish-Subscribe Mediated Virtual OrganizationsRichard Ssekibuule. [doi]