ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2014 Information Security for South Africa
Latest Publications
TOTAL DOCUMENTS
38
(FIVE YEARS 0)
H-INDEX
5
(FIVE YEARS 0)
Published By IEEE
9781479933846, 9781479933839
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Towards a platform to visualize the state of South Africa's information security
2014 Information Security for South Africa
◽
10.1109/issa.2014.6950511
◽
2014
◽
Author(s):
Ignus Swart
◽
Barry Irwin
◽
Marthie Grobler
Keyword(s):
Information Security
◽
The State
Download Full-text
Software-defined radio (SDR) as a mechanism for exploring cyber-electronic warfare (EW) collaboration
2014 Information Security for South Africa
◽
10.1109/issa.2014.6950516
◽
2014
◽
Cited By ~ 3
Author(s):
Warren P. du Plessis
Keyword(s):
Software Defined Radio
◽
Electronic Warfare
Download Full-text
A survey of trust issues constraining the growth of Identity Management-as-a-Service(IdMaaS)
2014 Information Security for South Africa
◽
10.1109/issa.2014.6950490
◽
2014
◽
Cited By ~ 2
Author(s):
Nkosinathi Mpofu
◽
Wynand JC van Staden
Keyword(s):
Identity Management
Download Full-text
The role of triggers in database forensics
2014 Information Security for South Africa
◽
10.1109/issa.2014.6950506
◽
2014
◽
Cited By ~ 6
Author(s):
Werner K. Hauger
◽
Martin S. Olivier
Keyword(s):
Database Forensics
Download Full-text
Is bring your own device an institutional information security risk for small-scale business organisations?
2014 Information Security for South Africa
◽
10.1109/issa.2014.6950497
◽
2014
◽
Cited By ~ 7
Author(s):
Kudakwashe Madzima
◽
Moses Moyo
◽
Hanifa Abdullah
Keyword(s):
Information Security
◽
Bring Your Own Device
◽
Small Scale
◽
Security Risk
◽
Information Security Risk
Download Full-text
Facebook: The risk-taking attitude amongst Emerging Adults
2014 Information Security for South Africa
◽
10.1109/issa.2014.6950515
◽
2014
◽
Author(s):
Sayed Enayat Sayed Ally
◽
Craig Blewett
◽
Brett van Niekerk
Keyword(s):
Emerging Adults
◽
Risk Taking
Download Full-text
An analysis of Facebook's graph search
2014 Information Security for South Africa
◽
10.1109/issa.2014.6950517
◽
2014
◽
Cited By ~ 4
Author(s):
Zubeida Casmod Khan
◽
Thulani Mashiane
Keyword(s):
Graph Search
Download Full-text
A digital forensic model for providing better data provenance in the cloud
2014 Information Security for South Africa
◽
10.1109/issa.2014.6950489
◽
2014
◽
Cited By ~ 1
Author(s):
Philip M. Trenwith
◽
Hein S. Venter
Keyword(s):
Data Provenance
◽
Digital Forensic
Download Full-text
An investigation into reducing third party privacy breaches during the investigation of cybercrime
2014 Information Security for South Africa
◽
10.1109/issa.2014.6950503
◽
2014
◽
Author(s):
Wynand JC van Staden
Keyword(s):
Third Party
◽
Privacy Breaches
Download Full-text
Reviewers
2014 Information Security for South Africa
◽
10.1109/issa.2014.6950485
◽
2014
◽
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close