Table of Contents - According to First Author Surname

Title Author(s)
A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems Richard Barnett and Barry Irwin
E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division) Ryno Boshoff and Johan van Niekerk
Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance Frameworks Jacqui Chetty and Marijke Coetzee
Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant? Rabelani Dagada, Mariki Eloff and Lucas Venter
BC3I – Towards Requirements Specification for Preparing an Information Security Budget M Dlamini, M M Eloff, J H P Eloff and K Hohne
Phishing: How an Organization can Protect Itself Edwin Frauenstein and Rossouw von Solms
Help Us! We Want to be ‘E-Secured’: Digital Banking Customers’ Security Needs in South Africa Arthur Goldstuck and Rabelani Dagada
A high-level overview for Digital Forensics Cornelia Grobler and Buks Louwrens
A Theoretical Approach to Live Forensic Acquisition Marthie Grobler and Basie von Solms
Integrating Information Security with Information System Architecture and Administration Curricula Erik Hjelmas, Nils Kalstad Svendsen and Stephen D. Wolthusen
Discussing E-Government Maturity Models for the Developing World Geoffrey Karokola and Louise Yngström
A Framework for Web Services Security Policy Negotiation Tristan Lavarack and Marijke Coetzee
An examination of the Generic Exploit Prevention Mechanisms on Apple's Leopard Operating System Haroon Meer
The Design of a Wireless Forensic Readiness Model (WFRM) Sipho Josia Ngobeni and Hein Venter
Inductively Deriving an Organisational Information Security Risk Management Agenda by Exploring Process Improvisation Kennedy Njenga and Irwin Brown
Investigating the effect of Genetic Algorithms on filter optimisation within fast packet classifiers Alastair Nottingham and Barry Irwin
Automated Firewall Rule Set Generation Through Passive Traffic Inspection Georg-Christian Pranschke, Barry Irwin and Richard Barnett
Identification of Basic Measurable Security Components in Software-Intensive Systems Reijo Savola
An analysis of authentication for passive RFID tags Gregory Smith and Marijke Coetzee
A Survey of Computer Crime and Security in South Africa Adrie Stander, A Dunnet and J Rizzo
An Introduction to Emerging Threats and Vulnerabilities to Create User Awareness Namosha Veerasamy and Barend Taute
RBAC Enhanced Presence Handling Rudi Victor, Andrew Rutherford and Reinhardt Botha
Investigating identity concealing and email tracing techniques Ickin Vural and Hein Venter
How appropriate is k-anonymity for addressing the conflict between privacy and information utility in microdata anonymisation Marek P. Zielinski and Martin S. Olivier