Abstract is missing.
- Distributed Ledger Technology to Support Digital Evidence Integrity Verification ProcessesWilliam Thomas Weilbach, Yusuf Moosa Motara. 1-15 [doi]
- Real-Time Face Antispoofing Using ShearletsDustin Terence van der Haar. 16-29 [doi]
- Password Policies Adopted by South African Organizations: Influential Factors and WeaknessesPardon Blessings Maoneke, Stephen Flowerday. 30-43 [doi]
- An Investigation into Students Responses to Various Phishing Emails and Other Phishing-Related BehavioursEdwin Donald Frauenstein. 44-59 [doi]
- Information Availability and Security in Foreign Corrupt Practices Act InvestigationsTetyana Loskutova, Rivaj Parbhu. 60-75 [doi]
- The Current State of Electronic Consent Systems in e-Health for Privacy PreservationLelethu Zazaza, H. S. Venter, George Sibiya. 76-88 [doi]
- Detecting Manipulated Smartphone Data on Android and iOS DevicesHeloise Pieterse, Martin S. Olivier, Renier van Heerden. 89-103 [doi]
- An Evaluation of the Password Practices on Leading e-Commerce Websites in South AfricaSilas Formunyuy Verkijika. 104-114 [doi]
- SA-EF Cube: An Evaluation Framework for Assessing Intelligent Context-Aware Critical Information Infrastructure Protection SolutionsJan Hendrik van Niekerk, Elizabeth Marie Ehlers. 115-132 [doi]
- Small and Medium-Sized Enterprises' Understanding of Security Evaluation of Cloud-Based Business Intelligence Systems and Its ChallengesMoses Moyo, Marianne Loock. 133-148 [doi]
- Preventing and Mitigating Ransomware - A Systematic Literature ReviewZandile Manjezi, Reinhardt A. Botha. 149-162 [doi]
- Mitigating the Ransomware Threat: A Protection Motivation Theory ApproachJacques Ophoff, Mcguigan Lakay. 163-175 [doi]
- Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in South AfricaAmaanullah Parker, Irwin Brown. 176-192 [doi]