Author:Jansen van Vuuren, J; Grobler, M; Zaaiman, JDate:Mar 2012In South Africa, cyber security has been identified as a critical component contributing towards National Security. More rural communities are becoming integrated into the global village due to increased hardware and software corporate ...Read more
Author:Grobler, MMDate:Jul 2010Interfraud is any fraud scheme that uses one or more online service to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others ...Read more
Author:Jansen van Vuuren, Joey; Leenen, LouiseDate:Mar 2018Cyber Defence is a core driver in the attainment of national security for any country. Perceived Cyberpower can be determined by the analysis of the elements of cyberspace as part of national security. In this paper the Perceived Cyberpower ...Read more
Author:Jansen van Vuuren, JCDate:Sep 2010The presentation addresses national security issues and the impact of cyber threats on the average citizen. It classifies cyber threats, analysis national security and provides security tips to safeguard the individual against cyber threats.Read more
Author:Mwim, EM; Mtsweni, Jabu S; Mwim, OSDate:Aug 2022The evolution in digital technologies and the Internet, in particular, has had a profound effect on the way healthcare institutions operate, assist patients, and manage personal healthcare data. In the same vein, various healthcare systems, ...Read more
Author:Veerasamy, Namosha; Pieterse, HeloiseDate:Mar 2022Misinformation can be rapidly spread in cyberspace. It thrives in the social media landscape as well as news platforms. Misinformation can readily gain momentum in the race to influence people or intentionally deceive. With the use of bots, ...Read more
Author:Dawood, Zubeida C; Mashiane, T; Shozi, Nobubele ADate:Mar 2015With roughly 30 million monthly users Snapchat is becoming an increasingly popular photo messaging application. Snapchat allows users to send time-limited photos and videos to other Snapchat users with the promise of it being deleted forever ...Read more
Author:Veerasamy, NamoshaDate:Jun 2021Cyber attacks can affect the confidentiality, integrity and availability of data/ systems. Some attacks aim to steal data whereas others try cause destruction. One such vulnerability stems from the malicious use of USB chargers. When travelling ...Read more
Author:Grobler, M; Dlamini, Z; Ngobeni, Sipho J; Labuschagne, ADate:Aug 2011A large portion of the South African rural community only have intermittent access to computers and are not familiar, nor entirely comfortable, with the use of internet communication or electronic devices. The research conducted by the authors ...Read more
Author:Von Solms, S; Von Solms, RDate:Jul 2014Cyber safety has become critically important to all who are active in cyber space. In most African countries no coordinated activities in this regard are taking place, even though many children are already active on cyber space. This paper ...Read more