default search action
SAISMC 2010: Port Elizabeth, South Africa
- Nathan L. Clarke, Steven Furnell, Rossouw von Solms:
South African Information Security Multi-Conference, SAISMC 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings. University of Plymouth 2010, ISBN 978-1-84102-256-7
Human Aspects of Information Security & Assurance
- Malcolm Robert Pattinson, Cate Jerram:
Examining End-user Perceptions of Information Risks: An Application for the Repertory Grid Technique. 7-12 - Hennie A. Kruger, Lynette Drevin, Tjaart Steyn:
The Use of an Information Security Vocabulary Test to Assess Information Security Awareness - An Exploratory Study. 13-22 - Kenny Olof Robert Jansson, Rossouw von Solms:
Social Engineering: Towards A Holistic Solution. 23-34 - Tatsuo Asai, Aline Uwera Hakizabera:
Empirical Analysis of Human-Related Problems on Information Security in Cross-Cultural Environment -The Case of the East African Community-. 35-46 - Nkqubela Ruxwana, Marlien Herselman, Dalenca Pottas:
Community Awareness and Involvement: An Overlooked Security Control. 47-60 - Benjamin George Sanders, Paul Dowland, Steven Furnell:
Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy. 61-73 - Edwin Donald Frauenstein, Rossouw von Solms:
The Wild Wide West of Social Networking. 74-87
Information Security Management and Education
- Yngve Monfelt, Sofie Pilemalm, Jonas Hallberg, Louise Yngström:
The 14 layered framework for including social and organisational aspects in security management. 90-99 - Stefan Fenz:
From the Resource to the Business Process Risk Level. 100-109 - Stephen Flowerday, Sean Allam:
A model to measure the maturity of smartphone security at software consultancies. 110-121 - Hassan El Desouki, Helen Armstrong:
Security and Quality Issues in IT Projects. 122-131 - Helen Armstrong, Ian McCulloh:
Organizational Risk using Network Analysis. 132-141 - David Seikokotlelo Bedi, Stuart Warden:
Information security in hospitality SMMEs in Cape Metropole area: The management and culture perspective. 142-153 - Shamal Faily, Ivan Flechais:
A Model of Security Culture for e-Science. 154-164 - Tite Tuyikeze, Dalenca Pottas:
An Information Security Policy Development Life Cycle . 165-176 - Sinovuyo Tyali, Dalenca Pottas:
Information Security Management Systems in the Healthcare Context. 177-187 - Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis:
Unifying ISO Security Standards Practices into a Single Security Framework. 188-203 - Helen Armstrong, Colin J. Armstrong, Ian McCulloh:
A Course Applying Network Analysis to Organizational Risk in Information Security. 204-214 - Lynn Futcher, Cheryl Schroder, Rossouw von Solms:
An Integrative Approach to Information Security Education: A South African Perspective. 215-222 - Ahmed Patel, Qais Qassim, Zarina Shukor, Jose Nogueira, Joaquim Celestino Júnior, Christopher Wills:
Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System. 223-234
Digital Forensics and Incident Analysis
- Qiming Li, Alvin Ong, Ponnuthurai N. Suganthan, Vrizlynn L. L. Thing:
A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification. 236-247 - Hwei-Ming Ying, Vrizlynn L. L. Thing:
Optimal Path Construction for Fragmented File Carving. 248-260 - Marthie Grobler:
Digital forensic standards: international progress. 261-271 - Schalk Willem Peach, Johannes Vorster, Renier van Heerden:
Heuristic Attack on Graphic Password Generation. 272-284
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.