Author:Muronga, Khangwelo; Herselman, Martha E; Botha, Adèle; Da Veiga, ADate:Sep 2019This study aimed to ascertain the types of approaches that are applied in the assessments of information security and cybersecurity user awareness and training programs. The study focused on achieving two objectives. The first objective focused ...Read more
Author:Monamo, Patrick; Marivate, Vukosi N; Twala, BDate:Aug 2016The rampant absorption of Bitcoin as a cryptographic currency, along with rising cybercrime activities, warrants utilization of anomaly detection to identify potential fraud. Anomaly detection plays a pivotal role in data mining since most ...Read more