Abstract is missing.
- Enriched nudges lead to stronger password replacements ... but implement mindfullyKaren Renaud, Verena Zimmerman. 1-9 [doi]
- The importance of security culture for crowd energy systemsMohammad Aldabbas, Stephanie Teufel, Bernd Teufel. 10-15 [doi]
- Compliance with the protection of personal information act and consumer privacy expectations: A comparison between the retail and medical aid industryAdéle da Veiga, Ruthea Vorster, Colin Pilkington, Hanifa Abdullah. 16-23 [doi]
- Investigating the electromagnetic side channel leakage from a Raspberry PiIbraheem Frieslaar, Barry Irwin. 24-31 [doi]
- Towards the development of an effective intrusion detection modelSarathiel Chaipa, Mariki M. Eloff. 32-39 [doi]
- Big data science for predicting insurance claims fraudDavid Kenyon, Jan H. P. Eloff. 40-47 [doi]
- Design and application of link: A DSL for network frame manipulationSean Pennefather, Barry Irwin. 48-55 [doi]
- Organizational information privacy strategy and the impact of the PoPI actMarc Pelteret, Jacques Ophoff. 56-65 [doi]
- A privacy and security threat assessment framework for consumer health wearablesJavan Mnjama, Greg Foster, Barry Irwin. 66-73 [doi]
- Forensic attribution in NoSQL databasesWerner K. Hauger, Martin S. Olivier. 74-82 [doi]
- Evaluating the severity of trust to identity- management-as-a-serviceNkosinathi Mpofu, Wynand J. C. van Staden. 83-89 [doi]
- Analysis of Mozambican websites: How do they protect their users?Ambrosio Patricio Vumo, Josef Spillner, Stefan Köpsell. 90-97 [doi]
- Underlying finite state machine for the social engineering attack detection modelFrancois Mouton, Alastair Nottingham, Louise Leenen, H. S. Venter. 98-105 [doi]
- Benchmarking a mobile implementation of the social engineering prevention training toolFrancois Mouton, Marcel Teixeira, Thomas Meyer. 106-116 [doi]