


default search action
SAISMC 2010: Port Elizabeth, South Africa
- Nathan L. Clarke, Steven Furnell, Rossouw von Solms:

South African Information Security Multi-Conference, SAISMC 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings. University of Plymouth 2010, ISBN 978-1-84102-256-7
Human Aspects of Information Security & Assurance
- Malcolm Robert Pattinson, Cate Jerram:

Examining End-user Perceptions of Information Risks: An Application for the Repertory Grid Technique. 7-12 - Hennie A. Kruger, Lynette Drevin, Tjaart Steyn:

The Use of an Information Security Vocabulary Test to Assess Information Security Awareness - An Exploratory Study. 13-22 - Kenny Olof Robert Jansson, Rossouw von Solms:

Social Engineering: Towards A Holistic Solution. 23-34 - Tatsuo Asai, Aline Uwera Hakizabera:

Empirical Analysis of Human-Related Problems on Information Security in Cross-Cultural Environment -The Case of the East African Community-. 35-46 - Nkqubela Ruxwana, Marlien Herselman, Dalenca Pottas:

Community Awareness and Involvement: An Overlooked Security Control. 47-60 - Benjamin George Sanders, Paul Dowland, Steven Furnell:

Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy. 61-73 - Edwin Donald Frauenstein, Rossouw von Solms:

The Wild Wide West of Social Networking. 74-87
Information Security Management and Education
- Yngve Monfelt, Sofie Pilemalm, Jonas Hallberg, Louise Yngström:

The 14 layered framework for including social and organisational aspects in security management. 90-99 - Stefan Fenz:

From the Resource to the Business Process Risk Level. 100-109 - Stephen Flowerday, Sean Allam:

A model to measure the maturity of smartphone security at software consultancies. 110-121 - Hassan El Desouki, Helen Armstrong:

Security and Quality Issues in IT Projects. 122-131 - Helen Armstrong, Ian McCulloh:

Organizational Risk using Network Analysis. 132-141 - David Seikokotlelo Bedi, Stuart Warden:

Information security in hospitality SMMEs in Cape Metropole area: The management and culture perspective. 142-153 - Shamal Faily, Ivan Flechais:

A Model of Security Culture for e-Science. 154-164 - Tite Tuyikeze, Dalenca Pottas:

An Information Security Policy Development Life Cycle . 165-176 - Sinovuyo Tyali, Dalenca Pottas:

Information Security Management Systems in the Healthcare Context. 177-187 - Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis:

Unifying ISO Security Standards Practices into a Single Security Framework. 188-203 - Helen Armstrong, Colin J. Armstrong, Ian McCulloh:

A Course Applying Network Analysis to Organizational Risk in Information Security. 204-214 - Lynn Futcher, Cheryl Schroder, Rossouw von Solms:

An Integrative Approach to Information Security Education: A South African Perspective. 215-222 - Ahmed Patel, Qais Qassim, Zarina Shukor, Jose Nogueira, Joaquim Celestino Júnior, Christopher Wills:

Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System. 223-234
Digital Forensics and Incident Analysis
- Qiming Li, Alvin Ong, Ponnuthurai N. Suganthan, Vrizlynn L. L. Thing:

A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification. 236-247 - Hwei-Ming Ying, Vrizlynn L. L. Thing:

Optimal Path Construction for Fragmented File Carving. 248-260 - Marthie Grobler:

Digital forensic standards: international progress. 261-271 - Schalk Willem Peach, Johannes Vorster, Renier van Heerden:

Heuristic Attack on Graphic Password Generation. 272-284

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














