Author:Roodt, JHS; Oosthuizen, Rudolph; Jansen van Vuuren, JCDate:Apr 2010This investigation was launched firstly to direct current Information Warfare definition and capability management activities toward establishing a Require Operational Capability (ROC) statement for a JCD capability, and secondly to provide ...Read more
Author:Veerasamy, Namosha; Grobler, M; Von Solms, BDate:Jul 2012Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, ...Read more
Author:Van Heerden, Renier P; Irwin, B; Burke, Ivan DDate:Mar 2012This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is ...Read more
Author:Dlamini, Z; Modise, MDate:Mar 2012Technological advances have changed the manner in which ordinary citizens conduct their daily activities. Many of these activities are carried out over the Internet. These include filling tax returns, online banking, job searching and general ...Read more
Author:Thaba, James M; Mtsweni, Jabu SDate:Nov 2023The domains of warfare have become complex, where cyberspace is declared as the fifth domain. The complexity of cyber space is that it is borderless, and war could be launched from anywhere, and is a serious concern for national security. ...Read more
Author:Leenen, L; Alberts, R; Britz, K; Gerber, A; Meyer, TDate:Mar 2011In this paper we describe a research project to develop an optimal information retrieval system in an Information Operations domain. Information Operations is the application and management of information to gain an advantage over an opponent ...Read more
Author:Jansen van Vuuren, JC; Leenen, L; Phahlamohlaka, Letlibe J; Zaaiman, JJDate:Mar 2013National governments have the responsibility to provide, regulate and maintain national security, which includes cybersecurity for their citizens. Although South Africa has recently published its first draft cybersecurity policy, the ...Read more
Author:Burke, Ivan D; Naidoo, Sasha; Olivier, MSDate:Apr 2010Mobile Ad hoc Networks have become an attractive option for military and disaster-response operations. Its ad hoc nature allows for fast deployment and requires no pre-existing network infrastructure. Most of the MANET protocol development ...Read more
Author:Veerasamy, NamoshaDate:Apr 2010The aim of this paper is to describe how various observations made by sections of the world population direct people into making decisions and committing acts of cyberterror. The paper will thus look at issues like the environmental factors, ...Read more
Author:Jansen van Vuuren, JC; Phahlamohlaka, Letlibe J; Brazzoli, MDate:Apr 2010The central argument in this paper is that the exponential increase in internet broadband will result in an increase in security threats that will also take the battlefield to the home of the average citizen in rural South Africa. The paper ...Read more
Author:Veerasamy, Namosha; Taute, BDate:Apr 2009With technological change and advancement, attackers are increasingly becoming more sophisticated in their attack strategies and techniques. Other global factors and developments also impact the line of attack. This paper provides an introduction ...Read more
Author:Martim, E; Dlamini, M; Van Greunen, D; Eloff, J; Herselman, Martha EDate:Mar 2009Security and usability are crucial factors for the successful of any e-commerce system. However, they have traditionally been considered a design trade-off. In an effort to align them, this paper highlights the design principles and guidelines ...Read more
Author:Leenen, L; Modise, M; Le Roux, WHDate:Mar 2009This paper is part of a long term research project conducted by the Council for Scientific and Industrial Research (CSIR) in South Africa. The objective of the project is to construct a model for the planning and execution of Peace Support ...Read more
Author:Veerasamy, Namosha; Eloff, JHPDate:Jun 2010Individual users and organisations need to be warned about the latest face of warfare that is not only being played out in the military networks, but also on the Internet and cyberspace. Consequently, Network Warfare has various facets which ...Read more
Author:Grobler, MMDate:May 2010The best Information Security infrastructure cannot guarantee that intrusions or other malicious acts will not happen. It is necessary to know the facts and prepare beforehand knowing cyber threats and trends; knowing the broadband impact on ...Read more
Author:Van Niekerk, B; Leenen, L; Ramluckan, T; Maharaj, MDate:Jul 2012The Workshop on ICT Uses in Warfare and the Safeguarding of Peace is a note-worthy initiative that follows on three previous workshops: London (2007), Pretoria (2008), and Bela-Bela (2010). After the success of the workshops held in South ...Read more
Author:De Waal, A; Mouton, FDate:Nov 2013In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be ...Read more
Author:Veerasamy, NamoshaDate:Mar 2009Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. Cyber-terrorism reflects a current concern in the way terrorists will seek to strike the innocent and wreak havoc. Since explosives are no longer the ...Read more
Author:Veerasamy, Namosha; Eloff, JHPDate:Jul 2008Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of various components ranging from its electronic and psychological ...Read more
Author:Labuschagne, WA; Eloff, MDate:Jul 2012A majority of African Internet users do not have access to the Internet. The lack of infrastructure in rural areas affects Internet usage. Since costs are high and the bandwidth low, these factors encourage users to access the Internet using ...Read more