Author:Shozi, Nobubele A; Mtsweni, Jabu SDate:Jun 2017Social media sites have provided us with the ability to share information about our daily activities. However, users do not understand the implications of sharing their personal data on social media sites. Individuals on these social sites ...Read more
Author:Botha, Johannes G; Van ‘t Wout, Magdalena C; Leenen, LDate:Jul 2019Mobile messaging or chat Applications (Apps) have gained increasing popularity over the past decade. Large amounts of data are being transmitted over the internet when people make use of these Apps. Metadata and personal information are being ...Read more
Author:Mkuzangwe, Nenekazi N; Dawood, Zubeida CDate:Jun 2020Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks. Several cyber-threat information-sharing standards ...Read more
Author:Botha, J; Eloff, M; Grobler, MDate:Sep 2016Pro-actively finding leaked information online can potentially reduce detection times to limit the exposure time of personal information on publicly accessible networks. Often the breaches are discovered by an external third party and not the ...Read more
Author:Botha, Johannes G; Grobler, MM; Eloff, MMDate:Jun 2017Data breaches have gained extensive coverage as businesses and organisations of all sizes become more dependent on digital data, cloud computing and workforce mobility. Companies store sensitive or confidential data on local machines, enterprise ...Read more
Author:Dlodlo, NDate:Apr 2011Cloud computing is a sufficiently new research area. Since it is in its development stages, the information on the field is slowly being compiled by the researchers and practitioners from their experiences. Some of the areas in which there ...Read more
Author:Cooper, Antony K; Coetzee, SerenaDate:Apr 2020Publicly-available mobile data can be used to derive fine grain commuting and travel patterns. These types of data include geocoded or geotagged discrete units of communication: messages, posts, tweets, status updates, check-ins, images and ...Read more
Author:Botha, J; Eloff, MM; Swart, IDate:Mar 2016Data breaches remain a common occurrence affecting both companies and individuals alike, despite promulgated data protection legislation worldwide. It is unlikely that factors causing data breaches such as incorrect device configuration or ...Read more
Author:Mzila, PhiwaDate:Nov 2016The use of biometric technology as a means to improve national security and reduce fraud has been adopted by many countries including South Africa. This technology involves the collection of biometric data which is attributed as part of one’s ...Read more
Author:Mzila, PhiwaDate:Feb 2016With new advances in technologies, biometrics is becoming emerging technology for verification and authentication of individuals. However, the storage of biometric templates still needs necessary attention since it poses major threats to user ...Read more
Author:Moganedi, Mapoung SDate:Jun 2018The introduction of Internet of Things (IoT has revolutionized the healthcare sector through the digitalization with an enormous amount of patient data that is collected, processed, stored and shared amongst different healthcare stakeholders. ...Read more