Table of Contents - According to First Author Surname

Title Author(s)
An Introduction to Standards related to Information Security Johann Amsenga
Emerging Framework for The Evaluation of Open Source Security Tools Elmarie Biermann and Jan Mentz
The Principle of Security Safeguards: Accidental Activities Rasika Dayarathna
A User Centric Model for Online Identity and Access Management Matthew Deas and Stephen Flowerday
Immune System Based Intrusion Detection System Christoph Ehret and Ulrich Ultes-Nitsche
Spam Over Internet Telephony and How to Deal with it Rachid El Khayari, Nicolai Kuntze and Andreas Schmidt
Social Aspects of Information Security Evangelos Frangopoulos, Mariki Eloff and Lucas Venter
Spam Construction Trends Barry Irwin and Blake Friedman
Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania Geoffrey Karokola and Louise Yngström
The Use of File Timestamps in Digital Forensics Renico Koen and Martin Olivier
UML Modelling of Digital Forensic Process Models (DFPMs) MD Köhn, JHP Eloff and MS Olivier
Password Management: Empirical Results from a RSA and USA Study Hennie Kruger, Tjaart Steyn, Lynette Drevin and Dawn Medlin
A Proof-of-Concept Implementation of EAP-TLS with TPM Support Carolin Latze and Ulrich Ultes-Nitsche
No Age Discrimination for Biometrics Marthie Lessing and Lara Weissenberger
Computer Monitoring in the 21st Century Workplace Sri Warna Mahanamahewa
Application of Message Digests for the Verification of Logical Forensic Data Pontjho Mokhonoana and Martin Olivier
Collective Improvisation: Complementing Information Security Frameworks with Self-Policing Kennedy Njenga and Irwin Brown
The IP Protection of Electronic Databases: Copyright or Copywrong? Tana Pistorius
A Novel Security Metrics Taxonomy for R&D Organisations Reijo Savola
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code Leonard Shand and Theodore Tryfonas
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research Tony Stephanou and Rabelani Dagada
The Information Security of a Bluetooth-Enabled Handheld Device Frankie Tvrz and Marijke Coetzee
Bloom’s Taxonomy for Information Security Education Johan van Niekerk and Rossouw von Solms
Towards a Framework for a Network Warfare Capability Namosha Veerasamy and Jan Eloff