Author:Veerasamy, NamoshaDate:Mar 2009Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. Cyber-terrorism reflects a current concern in the way terrorists will seek to strike the innocent and wreak havoc. Since explosives are no longer the ...Read more
Author:Jideani, P; Leenen, Louise; Alexander, B; Barnes, JDate:Aug 2018Cybersecurity is one of the five key technologies that will spell the difference between company success and failure. This study seeks to understand cybersecurity environment of e-retail in South Africa. The focus is intended to offer and/or ...Read more