Author:Gangire, Y; Da Veiga, A; Herselman, Martha EDate:Oct 2021This paper outlines the development of a validated questionnaire for assessing information security behaviour. The purpose of this paper is to present data from the questionnaire validation process and the quantitative study results.Read more
Author:Dlamini, Moses T; Eloff, MM; Eloff, JHP; Hone, KDate:Jul 2009The entire business landscape finds itself on the verge of a recession because of ongoing global economic turmoil. Thus, there is a heightened need to minimise and mitigate business risk and scrutinise information spending while ensuring ...Read more
Author:Grobler, MM; Von Solms, SHDate:Jul 2009The development of the Live Forensic discipline instigates the development of a method that allows forensically sound acquisition to stand fast in a court of law. The study presents the development of a comprehensive model for forensically ...Read more
Author:Pretorius, Morne; Ngejane, Hombakazi CDate:Dec 2019The South African Government’s National Cybersecurity Policy Framework (NCPF) of 2012 provides for the establishment of a national computer security incident response team (CSIRT) in the form of the National Cybersecurity Hub— more correctly ...Read more
Author:Lessing, MMDate:Sep 2008A Security Maturity Model (SMM) provides an organisation with a distinct Information Security framework. Organisations that conform to these models are likely to pursue satisfactory Information Security. Additionally, the use of Security ...Read more
Author:Roodt, JHS; Oosthuizen, Rudolph; Jansen van Vuuren, JCDate:Apr 2010This investigation was launched firstly to direct current Information Warfare definition and capability management activities toward establishing a Require Operational Capability (ROC) statement for a JCD capability, and secondly to provide ...Read more
Author:Grobler, M; Jansen van Vuuren, JDate:Aug 2010Africa has recently seen explosive growth in information and communication technologies, making cyber crime a reality in this part of the world. This paper investigates the possibility of another increase in cyber crime as a result of the ...Read more
Author:Lessing, M; Von Solms, SHDate:May 2008The lack of a fully inclusive guideline document to assist the functioning of sufficient Information Security Governance is common in the business environment. This article focuses on developing such a guideline document, based on a number ...Read more
Author:Veerasamy, Namosha; Grobler, M; Von Solms, BDate:Jul 2012Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, ...Read more
Author:Van Heerden, Renier P; Irwin, B; Burke, Ivan DDate:Mar 2012This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is ...Read more
Author:Grobler, M; Bryk, HDate:Aug 2010A CSIRT is a team of dedicated information security specialists that prepares for and responds to information security incidents. When an incident occurs, members of a CSIRT can assist its constituency in determining what happened and what ...Read more
Author:Bredenkamp, IE; Kritzinger, E; Herselman, Martha EDate:Jul 2021The requirement for consumers to divulge personal data to obtain basic products/services from organizations, is becoming the norm. It has, to a large extent, benefitted consumers as it enabled organizations to profile their customers to provide ...Read more
Author:Veerasamy, NamoshaDate:Apr 2009Uneasiness arises from the possibility of random cyber attacks. In the global information and network warfare battle, cyberterrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak havoc due to ...Read more
Author:Naqvi, KH; Markus, ED; Muthoni, M; Abu-Mahfouz, Adnan MIDate:Apr 2022South Africa as a developing nation is evolving in new healthcare technologies. With an increase in these innovations comes many challenges foremost among which is security. This paper presents a review of challenges faced in IoT connected ...Read more
Author:Zazaza, Lelethu; Venter, Hein S; Sibiya, Mhlupheki GDate:Aug 2018Consent management is a significant function in electronic health information systems as it allows patients to manage the privacy preferences regarding their health information. Placing patients in control of the privacy of their health ...Read more
Author:Grobler, M; Flowerday, S; Von Solms, R; Venter, HDate:May 2011Cyber space, cyber awareness and cyber security play an important role in the online experience of individuals, and need to be addressed accordingly. The paper looks at some of the current cyber security awareness initiatives in South Africa, ...Read more
Author:Mkuzangwe, Nenekazi N; Dawood, Zubeida CDate:Jun 2020Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks. Several cyber-threat information-sharing standards ...Read more
Author:Labuschagne, WA; Eloff, MM; Veerasamy, NamoshaDate:Sep 2012Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these platforms to express ...Read more
Author:Labuschagne, WA; Eloff, MM; Veerasamy, Namosha; Mujinga, MDate:May 2011Africa may have the lowest number of Internet users in the world, but it also has the highest growth rate and the number of users is steadily growing. A majority of the African population is still excluded from global cyber networks and thus ...Read more