![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
17th ISSA 2018: Pretoria, South Africa: Revised Selected Papers
- Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers. Communications in Computer and Information Science 973, Springer 2019, ISBN 978-3-030-11406-0 - William Thomas Weilbach
, Yusuf Moosa Motara
:
Distributed Ledger Technology to Support Digital Evidence Integrity Verification Processes. 1-15 - Dustin Terence van der Haar:
Real-Time Face Antispoofing Using Shearlets. 16-29 - Pardon Blessings Maoneke
, Stephen Flowerday:
Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses. 30-43 - Edwin Donald Frauenstein
:
An Investigation into Students Responses to Various Phishing Emails and Other Phishing-Related Behaviours. 44-59 - Tetyana Loskutova
, Rivaj Parbhu:
Information Availability and Security in Foreign Corrupt Practices Act Investigations. 60-75 - Lelethu Zazaza
, H. S. Venter
, George Sibiya
:
The Current State of Electronic Consent Systems in e-Health for Privacy Preservation. 76-88 - Heloise Pieterse
, Martin S. Olivier
, Renier van Heerden:
Detecting Manipulated Smartphone Data on Android and iOS Devices. 89-103 - Silas Formunyuy Verkijika
:
An Evaluation of the Password Practices on Leading e-Commerce Websites in South Africa. 104-114 - Jan Hendrik van Niekerk, Elizabeth Marie Ehlers:
SA-EF Cube: An Evaluation Framework for Assessing Intelligent Context-Aware Critical Information Infrastructure Protection Solutions. 115-132 - Moses Moyo
, Marianne Loock:
Small and Medium-Sized Enterprises' Understanding of Security Evaluation of Cloud-Based Business Intelligence Systems and Its Challenges. 133-148 - Zandile Manjezi, Reinhardt A. Botha
:
Preventing and Mitigating Ransomware - A Systematic Literature Review. 149-162 - Jacques Ophoff
, Mcguigan Lakay:
Mitigating the Ransomware Threat: A Protection Motivation Theory Approach. 163-175 - Amaanullah Parker, Irwin Brown
:
Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in South Africa. 176-192
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.