Table of Contents - According to Author Name

Title Author(s) Affiliation Country
Ticket Based Identity System for DRM Alapan Arnab and Andrew Hutchison University of Cape Town South Africa
Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo and Louise Yngström Stockholm University Sweden
Security Risk Analysis for Complex Systems Mark Branagan, Robert Dawson and Dennis Longley Queensland University of Technology Australia
On bidder zones, cell phones and ballot stuffing Wesley Brandi and Martin Olivier University of Pretoria South Africa
Case Study of the Usage of an Authentication and Authorization Infrastructure (AAI) in an E-Learning Project Torsten Braun, Christoph Graf, Ulrich Ultes-Nitsche, Aurelius Baier and Thomas Bernoulli University of Fribourg Switzerland
Integrating Secure RTP into the Open Source VoIP PBX Asterisk Bradley Clayton, Barry Irwin and Alfredo Terzoli Rhodes University South Africa
Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation Neil Croft and Martin Olivier University of Pretoria South Africa
Calculating Compliance Standards Dirk Willie du Preez and Vreda Pieterse University of Pretoria South Africa
Information Security Policies - The Legal Risk of Uninformed Personnel Verine Etsebeth University of Johannesburg South Africa
Using an Enterprise Architecture for IT Risk Management Frank Innerhofer-Oberperfler and Ruth Breu University of Innsbruck Australia
Framework for a Digital Forensic Investigation Michael Kohn, Martin Olivier and JHP Eloff University of Pretoria South Africa
A Framework for Evaluating ICT Security Awareness HA Kruger, L Drevin and T Steyn North West University South Africa
Trusted Computing in Mobile Action Nicolai Kuntze and Andreas U. Schmidt Fraunhofer-Insitute for Secure Information Technology Germany
A Brokered Approach to Interoperable Security in OGSA-Based Grid Systems  Demetrios Loutsios and Maree Pather Nelson Mandela Metropolitan University South Africa
Towards Regulatory Compliance - A model for the South African Financial Sector Rabbie Maphakela and Dalenca Pottas Nelson Mandela Metropolitan University South Africa
A Profile of The Distance Computing Student Softlifter Thomas Mc Donald van der Merwe University of South Africa South Africa
Using IT Benchmarking Principles to Design an Information Security Benchmark Model Leonie McManus and Jan Eloff University of Pretoria South Africa
Framework for Securing Mobile Software Agents Jeffy Mwakalinga and Louise Yngström Royal Institute of Technology Sweden
Conceptualising the Influence of Tacit Knowledge in Security Risk Management Activities Kennedy Nduati Njenga and Irwin Brown University of Cape Town South Africa
A Model for Secure Value-Added Service Subscriptions in Cellular Networks Jacobus Ophoff, Stephen Perelson and Reinhardt Botha Nelson Mandela Metropolitan University South Africa
Denial-of-Service & Distributed Denial-of-Service on The Internet Kate Ormiston and MM Eloff University of South Africa South Africa
The Need for Centralised, Cross Platform Information Aggregation Fred Otten, Barry Irwin and Hannah Slay Rhodes University South Africa
A Low Bit Architecture for a Very Compact Hardware Implementation of the AES Algorithm Abdullah Haroon Rasheed, Muhammad Essam, Umair Khalid, Shoab A. Khan and Sheikh M. Farhan National University of Sciences and Technology Pakistan
Towards Security Evaluation based on Evidence Collection Reijo Savola VTT Technical Research Centre of Finland Finland
Authorised Translations of Electronic Documents Andreas U. Schmidt and Jan Piechalski Fraunhofer-Insitute for Secure Information Technology Germany
A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security – The Case of Tanzania Charles Ndekarisho Tarimo, Jabiri Kuwe Bakari, Louise Yngström and Stewart Kowalski Stockholm University Sweden
The Organisational Information Security Profile - A Tool to Assist The Board Mkhululi Tyukala, Dalenca Pottas, Rossouw von Solms and Helen van de Haar Nelson Mandela Metropolitan University South Africa
The Peculium Model: Information Security Risk Management for the South African SMME Liesl van Niekerk and Les Labuschagne University of Johannesburg South Africa
Understanding Information Security Culture: A Conceptual Framework Johan Van Niekerk and Rossouw Von Solms Nelson Mandela Metropolitan University South Africa
Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot Jean-Pierre van Riel and Barry Irwin Rhodes University South Africa
Justifiability of State Surveillance of the Internet as E-Security Mechanism Murdoch Watney University of Johannesburg South Africa
Monthly Patch Release Schedules: Do the Benefits Outweigh the Risks? Dominic White and Barry Irwin Rhodes University South Africa
Performance Analysis of a Secure Seamless Handover Mechanism in All-IP Networks Alf Zugenmaier, Anand Prasad and Julien Laganier DoCoMo Euro-Labs Germany