Research Papers: Table of Contents

The conference proceedings for research papers refer to those papers that have been identified as research-in-progress papers and, therefore, are not considered as full papers.  These research papers are listed below according to the paper title:

A Layered Security Architecture

H. M. Tillwick

An Approach To Build A Fortified Network Logger That Is Resilient To Cracking Attempts

Jaco Kroon

Corporate Information Security Governance: A Holistic Approach

Lynette Mears

Cultivating Corporate Information Security Obedience

Kerry-Lynn Thomson

Curtailing Web Defacement Using A Read-Only Strategy

Andrew Cooks

Digital Rights Management: An Overview Of Current Solutions And Challenges

Alapan Arnab

Does The Web Services-Security (WS-S) Standard Suitably Address The Needs Of A Heterogeneous B2B

Allyson Bantom

Dynamic Data Protection Services For Network Transfers:
Concepts And Taxonomy

Stefan Lindskog

Encryption Techniques: A Timeline Approach

T. Morkel

From Secure Wired Networks To Secure Wireless Networks – What Are The Extra Risks?

Basie Von Solms

Institutional Change, Corporate Governance And Corporate Performance In France

Myriam Ben Messaoud

Lessons Learned In The Global Deployment Of An Open Source Security Solution

Barry Irwin

Re-Configurable Programmable Security Processor For Network Applications

Zaheer Ahmed

Risk Management Vs. The Management Of Risk: Does It Matter To The Board?

S. Posthumus

Security Metrics And Evaluation Of Information Systems Security

Job Asheri Chaula

The Emergence Of Obligation Rights In Ethical Information Security Awareness

Cm Reekie

The Role Of Real-Time Information In Risk Management

Hilton Cameron

Towards Managing ICT Security In Non-Commercial Organisations In The Developing Countries

Jabiri Kuwe Bakari

Towards Security In Data Integration: A Framework

Wayne Routly

Using Spam Methodology To Initiate Proactive Spam Controls

Nithen Naidoo