Author:Ngejane, Hombakazi C; Eloff, JHP; Sefara, Tshephisho J; Marivate, VNDate:Mar 2021Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of law enforcement units. ...Read more
Author:Botha-Badenhorst, Danielle P; Veerasamy, NamoshaDate:Apr 2023Globally, women are underrepresented in the fields of Science, Technology, Engineering and Mathematics (STEM). In Sub-Saharan Africa (SSA), this underrepresentation is even more prevalent, as fewer women pursue STEM careers in SSA when compared ...Read more
Author:Jacobs, PC; Solms, SH; Grobler, MMDate:May 2015Information and Communications Technology is often seen as a critical organisational asset. To prevent loss of revenue and money, as well as to protect organisational reputation, this asset must be protected from threats and vulnerabilities. ...Read more
Author:Jansen van Vuuren, JC; Phahlamohlaka, Letlibe J; Leenen, LDate:Jul 2012This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world. The main contribution is a proposed structure that could be suitable for South Africa, ...Read more
Author:Shibambu, Ncedisa AM; Moganedi, SDate:Dec 2022The notion of working from home is not a new concept. However, it has become a buzzword amid the COVID19 pandemic. Some scholars were already engaging in the work-from-home concept a few years before the pandemic. However, contextualization ...Read more
Author:Phahlamohlaka, Letlibe J; Hefer, JDate:Jun 2019Our aim in this paper is to analyse the possible impact of the Cybercrimes and Cybersecurity Bill on the institutions charged with the responsibility to enforce it as outlined in chapter 6 of the Bill. The analysis is conducted using selected ...Read more
Author:Phahlamohlaka, Letlibe J; Hefer, JDate:Jun 2019Our aim in this paper is to analyse the possible impact of the Cybercrimes and Cybersecurity Bill on the institutions charged with the responsibility to enforce it as outlined in chapter 6 of the Bill. The analysis is conducted using selected ...Read more
Author:Mtsweni, Jabu SDate:Mar 2022Cybersecurity has evolved over the years, and today cyberattacks instigated by cyber-criminals, nation states, or insider threat actors are part of regular headline news. In South Africa and around the world, the number of cyberattacks or ...Read more
Author:Burke, Ivan D; Motlhabi, Michael B; Netshiya, Rofhiwa; Pieterse, HeloiseDate:Feb 2021Recently, well-known and established South African organisations have experienced cyberattacks. South African Bank Risk Information Centre (SABRIC) confirmed in October 2019 that the industry had been hit by a wave of Distributed Denial of ...Read more
Author:Jansen van Vuuren, JC; Leenen, L; Grobler, MM; Chan, Ka Fai P; Dawood, Zubeida CDate:Mar 2015Acquiring, representing, and managing knowledge effectively has a considerable impact on constructing accurate and intelligent systems. A challenge faced by domain experts is the manner in which information about the cybersecurity environment ...Read more
Author:Phahlamohlaka, Letlibe J; Théron, J; Aschmann, MJDate:2022Cybersecurity has evolved over the years, and today cyberattacks instigated by cyber-criminals, nation states, or insider threat actors are part of regular headline news. In South Africa and around the world, the number of cyberattacks or ...Read more
Author:Badenhorst, Danielle PDate:06 Sep 2023Reliance on digital technologies for innovation management is unavoidable in current contexts. While digital processes and business models have been prioritised as key factors to drive innovation and value creation within firms, cybersecurity ...Read more
Author:Mtsweni, Jabu SDate:Oct 2017This presentation discusses how research and development can be used in an Industry 4.0 environment to enhance cybersecurity.Read more
Author:Mtsweni, Jabu SDate:Nov 2023Cybersecurity attacks are classified in the top 10 global risks by the World Economic Forum in 2023. The common cyber-incidents that affect businesses, governments, and individuals across the globe are data breaches. Recent reports indicate ...Read more
Author:Gcaza, Noluxolo; Mtsweni, Jabu SDate:Mar 2020Digital transformation is not without risks as the threats posed by cyber-attacks in this day and age are continually on the rise. Cyber-attacks have become pervasive and thus calling for organisations to be vigilant at all times and intentional ...Read more
Author:Mwim, EN; Mtsweni, Jabu SDate:Jul 2022There is a need to shift from a purely technological approach in addressing cybersecurity threats to a more human inclusive method. As a result, cybersecurity culture is gaining momentum in research as an approach in addressing cybersecurity ...Read more
Author:Labuschagne, WADate:Oct 2012As our dependence on information technology
increases, cyber attacks are becoming complex. The attack vector is growing and there are definite digital footprint dangers. Understanding of threat is critical; and security awareness is paramount ...Read more
Author:Jideani, P; Leenen, Louise; Alexander, B; Barnes, JDate:Aug 2018Cybersecurity is one of the five key technologies that will spell the difference between company success and failure. This study seeks to understand cybersecurity environment of e-retail in South Africa. The focus is intended to offer and/or ...Read more