Abstract is missing.
- A framework towards governing "Bring Your Own Device in SMMEs"Noluvuyo Fani, Rossouw von Solms, Mariana Gerber. 1-8 [doi]
- PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experimentPaulus Swartz, Adéle da Veiga. 9-17 [doi]
- An interactive visual library model to improve awareness in handling of business informationPetrus M. J. Delport, Mariana Gerber, Nader Sohrabi Safa. 18-26 [doi]
- Mobile device usage in higher education institutions in South AfricaRyan De Kock, Lynn Ann Futcher. 27-34 [doi]
- SHA-1 and the Strict Avalanche CriterionYusuf Moosa Motara, Barry Irwin. 35-40 [doi]
- Specific emitter identification for enhanced access control securityJ. N. Samuel, W. P. du Plessis. 41-47 [doi]
- Review of data storage protection approaches for POPI complianceNicholas Scharnick, Mariana Gerber, Lynn Futcher. 48-55 [doi]
- CDMA in signal encryption and information securityOlanrewaju B. Wojuola, Stanley H. Mneney, Viranjay M. Srivastava. 56-61 [doi]
- Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocolsLineo Mejaele, Elisha Oketch Ochola. 62-68 [doi]
- The pattern-richness of Graphical passwordsJohannes S. Vorster, Renier P. van Heerden, Barry Irwin. 69-76 [doi]
- Dridex: Analysis of the traffic and automatic generation of IOCsLauren Rudman, Barry Irwin. 77-84 [doi]
- Context Aware Mobile Application for mobile devicesMfundo Masango, Francois Mouton, Alastair Nottingham, Jabu Mtsweni. 85-90 [doi]
- Team formation in digital forensicsWynand J. C. van Staden, Etienne van der Poel. 91-97 [doi]
- Social network phishing: Becoming habituated to clicks and ignorant to threats?Edwin Donald Frauenstein, Stephen V. Flowerday. 98-105 [doi]
- Identity management for e-government Libya as a case studyOthoman Elaswad, Christian Damsgaard Jensen. 106-113 [doi]
- Recognizing surgically altered faces using local edge gradient Gabor magnitude patternChollette C. Olisah, Peter Ogedebe. 114-120 [doi]
- Adaptable exploit detection through scalable NetFlow analysisAlan Herbert, Barry Irwin. 121-128 [doi]
- Unsupervised learning for robust Bitcoin fraud detectionPatrick Monamo, Vukosi Marivate, Bheki Twala. 129-134 [doi]