Author:Grobler, M; Jansen van Vuuren, JDate:Aug 2010Africa has recently seen explosive growth in information and communication technologies, making cyber crime a reality in this part of the world. This paper investigates the possibility of another increase in cyber crime as a result of the ...Read more
Author:Grobler, M; Van Vuuren, JJDate:Dec 2009Combating Transnational & Cross Border Crime in Africa 2009, Southern Sun Hotel OR Tambo International Airport 8 - 10 December 2009Read more
Author:Veerasamy, NamoshaDate:Apr 2009Uneasiness arises from the possibility of random cyber attacks. In the global information and network warfare battle, cyberterrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak havoc due to ...Read more
Author:Pieterse, HeloiseDate:Dec 2021The world is witnessing a rise in cyber-related incidents. As information technology improves and the reliance on technology increases, the frequency and severity of cyber incidents escalate. The impact is felt globally, and South Africa is ...Read more
Author:Mapimele, Fikile V; Mangoale, Bokang CDate:Feb 2019In recent years, cybercrime has become one of the most rapidly growing areas of crime. The emergence of new technologies has presented new cybercrime opportunities that are becoming more sophisticated. As a result, imdividuals, corporations ...Read more
Author:Veerasamy, NamoshaDate:Sep 2020Technological advancements continue to progress and so too grows the prospect of cyberterrorism. Hacking tools are growing in sophistication, and agitated terrorist groups may look for an innovative outlet for their political, religious or ...Read more
Author:Mutemba, M; Mtsweni, Jabu S; Mkhonto, NNDate:Mar 2017Cyber attacks are on the increase in severity, complexity and frequency, negatively affecting the citizens, government, and businesses. Adversely, the security and Defence role-players in developing countries, such as South Africa, are short ...Read more
Author:Shabalala, MB; Moabalobelo, Terrence; Van der Merwe, TDate:Mar 2015As cybercrime is on the rise, individuals would like to rest assured that their authentication information cannot be stolen, and then used to gain access to their privileged information. Smart cards can and have played a pivotal role in ...Read more
Author:Phahlamohlaka, Letlibe J; Hefer, JDate:Jun 2019Our aim in this paper is to analyse the possible impact of the Cybercrimes and Cybersecurity Bill on the institutions charged with the responsibility to enforce it as outlined in chapter 6 of the Bill. The analysis is conducted using selected ...Read more
Author:Phahlamohlaka, Letlibe J; Hefer, JDate:Jun 2019Our aim in this paper is to analyse the possible impact of the Cybercrimes and Cybersecurity Bill on the institutions charged with the responsibility to enforce it as outlined in chapter 6 of the Bill. The analysis is conducted using selected ...Read more
Author:Ngobeni, Sipho J; Venter, H; Burke, Ivan DDate:Jun 2012Over the past decade, wireless mobile communication technology based on the IEEE 802.11 Wireless Local Area Networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the ...Read more
Author:Jansen van Vuuren, J; Grobler, M; Leenen, L; Phahlamohlaka, Letlibe JDate:Jul 2014Most communications in the new era are dependent on Information and Communication Technology (ICT). In addition, infrastructure is becoming increasingly interconnected. This not only makes lives easier, but also leaves technology users more ...Read more
Author:Veerasamy, Namosha; Grobler, M; Von Solms, SDate:Aug 2012Cyberterrorism has emerged as a new threat in the Information and Communication Technology (ICT) landscape. The ease of use, affordability, remote capabilities and access to critical targets makes cyberterrorism a potential threat to cause ...Read more