Author:Mthethwa, Sthembile; Pretorius, MorneDate:Dec 2022The ongoing push for the 4th industrial revolution is setting the stage to digitise, persist and verify identity along with credentials. Academic and skills credentials are currently verified manually and have much scope for automation using ...Read more
Author:Baruni, Kedimotse P; Mokoena, Nthabiseng ME; Veeraragoo, Mahalingam; Holder, Ross PDate:Dec 2021Face recognition is one of the biometric technologies that is mostly used in surveillance and law enforcement for identification and verification. However, face recognition remains a challenge in verifying and identifying individuals due to ...Read more
Author:Botha, Johannes G; Botha-Badenhorst, Danielle P; Leenen, LDate:Mar 2023Blockchain and cryptocurrency adoption has increased significantly since the start of the Covid-19 pandemic. This adoption rate has overtaken the Internet adoption rate in the 90s and early 2000s, but as a result, the instances of crypto scams ...Read more
Author:Botha, Johannes G; Pederson, T; Leenen, LDate:Jun 2023Since the start of the Covid-19 pandemic, blockchain and cryptocurrency adoption has increased significantly. The adoption rate of blockchain-based technologies has surpassed the Internet adoption rate in the 90s and early 2000s. As this ...Read more
Author:Veerasamy, Namosha; Yoolla, Yaseen; Dawood, Zubeida CDate:Jun 2022Geospatial data is often perceived as only being related to maps, compasses and locations. However, the application areas of geospatial data are far wider and even extend to the field of cybersecurity. Not only is there an ability to show ...Read more
Author:Mtsweni, Jabu S; Thaba, James MDate:2022Cyberspace has been designated by organizations such as NATO as the fifth domain for battlespace, and many nations are already having and/or building their capabilities in the cyber defence environment in order to protect and defend their ...Read more
Author:Thaba, James M; Mtsweni, Jabu SDate:Nov 2023The domains of warfare have become complex, where cyberspace is declared as the fifth domain. The complexity of cyber space is that it is borderless, and war could be launched from anywhere, and is a serious concern for national security. ...Read more
Author:Botha-Badenhorst, Danielle P; Veerasamy, NamoshaDate:Apr 2023Globally, women are underrepresented in the fields of Science, Technology, Engineering and Mathematics (STEM). In Sub-Saharan Africa (SSA), this underrepresentation is even more prevalent, as fewer women pursue STEM careers in SSA when compared ...Read more
Author:Botha, Johannes G; Grobler, Marthie M; Hahn, J; Eloff, MMDate:Mar 2017Data protection and management of personal information has become an integral aspect for organisations and individuals in conducting business in the modern era. It has also become a major issue for legislators, regulators and consumers worldwide ...Read more
Author:Shibambu, Ncedisa AM; Moganedi, SDate:Dec 2022The notion of working from home is not a new concept. However, it has become a buzzword amid the COVID19 pandemic. Some scholars were already engaging in the work-from-home concept a few years before the pandemic. However, contextualization ...Read more
Author:Mtsweni, Jabu S; Ndlovu, Lungisani; Mthethwa, Sthembile N; Mkuzangwe, Nenekazi NPDate:Nov 2023Misinformation, disinformation, malinformation, and/or fake news have gained attention for good and bad in South Africa, especially since the COVID-19 pandemic. The research-based and non-research-based interventions to tackle misinformation ...Read more
Author:Dawood, Zubeida C; Van 't Wout, CDate:Oct 2022Although there is an increasing amount of information for counter-terrorism operations freely available online, it is a complex process to extract relevant information and to detect useful patterns in the data in order for intelligence ...Read more
Author:Mtsweni, Jabu SDate:Nov 2023Cybersecurity attacks are classified in the top 10 global risks by the World Economic Forum in 2023. The common cyber-incidents that affect businesses, governments, and individuals across the globe are data breaches. Recent reports indicate ...Read more
Author:Mtsweni, Jabu SDate:Oct 2023Cyber-attacks continue to evolve, circumventing modern security solutions and exploiting discovered software vulnerabilities. Businesses and governments tend to respond in a reactive manner when dealing with these attacks, mostly due to limited ...Read more