


default search action
17th ISSA 2018: Pretoria, South Africa: Revised Selected Papers
- Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:

Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers. Communications in Computer and Information Science 973, Springer 2019, ISBN 978-3-030-11406-0 - William Thomas Weilbach

, Yusuf Moosa Motara
:
Distributed Ledger Technology to Support Digital Evidence Integrity Verification Processes. 1-15 - Dustin Terence van der Haar:

Real-Time Face Antispoofing Using Shearlets. 16-29 - Pardon Blessings Maoneke

, Stephen Flowerday
:
Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses. 30-43 - Edwin Donald Frauenstein

:
An Investigation into Students Responses to Various Phishing Emails and Other Phishing-Related Behaviours. 44-59 - Tetyana Loskutova

, Rivaj Parbhu:
Information Availability and Security in Foreign Corrupt Practices Act Investigations. 60-75 - Lelethu Zazaza

, H. S. Venter
, George Sibiya
:
The Current State of Electronic Consent Systems in e-Health for Privacy Preservation. 76-88 - Heloise Pieterse

, Martin S. Olivier
, Renier van Heerden:
Detecting Manipulated Smartphone Data on Android and iOS Devices. 89-103 - Silas Formunyuy Verkijika

:
An Evaluation of the Password Practices on Leading e-Commerce Websites in South Africa. 104-114 - Jan Hendrik van Niekerk, Elizabeth Marie Ehlers:

SA-EF Cube: An Evaluation Framework for Assessing Intelligent Context-Aware Critical Information Infrastructure Protection Solutions. 115-132 - Moses Moyo

, Marianne Loock:
Small and Medium-Sized Enterprises' Understanding of Security Evaluation of Cloud-Based Business Intelligence Systems and Its Challenges. 133-148 - Zandile Manjezi, Reinhardt A. Botha

:
Preventing and Mitigating Ransomware - A Systematic Literature Review. 149-162 - Jacques Ophoff

, Mcguigan Lakay:
Mitigating the Ransomware Threat: A Protection Motivation Theory Approach. 163-175 - Amaanullah Parker, Irwin Brown

:
Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in South Africa. 176-192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














