In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
South African Information Security Multi-Conference (SAISMC 2010)Nathan Clarke, Steven Furnell, Rossouw von Solms (Ed.) |
Human Aspects of Information Security & Assurance
- Examining End-user Perceptions of Information Risks: An Application for the Repertory Grid Technique
Malcolm Robert Pattinson, Cate Jerram
pp7-12
- The Use of an Information Security Vocabulary Test to
Assess Information Security Awareness - An
Exploratory Study
Hennie Kruger, Lynette Drevin, Tjaart Steyn
pp13-22
- Social Engineering: Towards A Holistic Solution
Kenny Olof Robert Jansson, Rossouw Von Solms
pp23-34
- Empirical Analysis of Human-Related Problems on Information Security in Cross-Cultural Environment -The Case of the East African Community-
Tatsuo Asai, Aline Uwera Hakizabera
pp35-46
- Community Awareness and Involvement: An Overlooked Security Control
Nkqubela Ruxwana, Marlien Herselman, Dalenca Pottas
pp47-60
- Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy
Benjamin George Sanders, Paul Dowland, Steven Furnell
pp61-73
- The Wild Wide West of Social Networking
Edwin Donald Frauenstein, Rossouw von Solms
pp74-87
Information Security Management and Education
- The 14 layered framework for including social and organisational aspects in security management
Yngve Monfelt, Sofie Pilemalm, Jonas Hallberg, Louise Yngström
pp90-99
- From the Resource to the Business Process Risk Level
Stefan Fenz
pp100-109
- A model to measure the maturity of smartphone security at software consultancies
Stephen Flowerday, Sean Allam
pp110-121
- Security and Quality Issues in IT Projects
Hassan El Desouki, Helen Armstrong
pp122-131
- Organizational Risk using Network Analysis
Helen Armstrong, Ian McCulloh
pp132-141
- Information security in hospitality SMMEs in Cape Metropole area: The management and culture perspective
David Seikokotlelo Bedi, Stuart Warden
pp142-153
- A Model of Security Culture for e-Science
Shamal Faily, Ivan Flechais
pp154-164
- An Information Security Policy Development Life Cycle
Tite Tuyikeze, Dalenca Pottas
pp165-176
- Information Security Management Systems in the Healthcare Context
Sinovuyo Tyali, Dalenca Pottas
pp177-187
- UNIFYING ISO SECURITY STANDARDS PRACTICES INTO A SINGLE SECURITY FRAMEWORK
Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis
pp188-203
- A Course Applying Network Analysis to Organizational
Risk in Information Security
Helen Armstrong, Colin Armstrong, Ian McCulloh
pp204-214
- An Integrative Approach to Information Security
Education: A South African Perspective
Lynn Ann Futcher, Cheryl Schroder, Rossouw von Solms
pp215-222
- Autonomic Agent-Based Self-Managed Intrusion
Detection and Prevention System
Ahmed Patel, Qais Qassim, Zarina Shukor, Jose Nogueira, Joaquim Júnior, Christopher Wills
pp223-234
Digital Forensics and Incident Analysis
- A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification
Qiming Li, Alvin Y Ong, Ponnuthurai N. Suganthan, Vrizlynn LL Thing
pp236-247
- Optimal Path Construction for Fragmented File Carving
Hwei-Ming Ying, Vrizlynn LL Thing
pp248-260
- Digital forensic standards: international progress
Marthie Grobler
pp261-271
- Heuristic Attack on Graphic Password Generation
Schalk Willem Peach, Johannes Vorster, Renier van Heerden
pp272-284