Author:Veerasamy, Namosha; Taute, BDate:Apr 2009With technological change and advancement, attackers are increasingly becoming more sophisticated in their attack strategies and techniques. Other global factors and developments also impact the line of attack. This paper provides an introduction ...Read more
Author:Veerasamy, NamoshaDate:Mar 2009Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. Cyber-terrorism reflects a current concern in the way terrorists will seek to strike the innocent and wreak havoc. Since explosives are no longer the ...Read more
Author:Jideani, P; Leenen, Louise; Alexander, B; Barnes, JDate:Aug 2018Cybersecurity is one of the five key technologies that will spell the difference between company success and failure. This study seeks to understand cybersecurity environment of e-retail in South Africa. The focus is intended to offer and/or ...Read more