Table of Contents - According to Paper Title

Title Author Co author Affiliation Country
A Framework for Evaluation of Information Systems Security Chaula, Job Asheri Louise Yngström & Stewart Kowalski Stockholm University/KTH Sweden
A Framework for Information Security Risk Management Communication Bornman, Werner L Labuschagne  University of Johannesburg South Africa
A holistic framework for the fostering of an information security sub-culture in organizations. Van Niekerk, Johan Rossouw von Solms Nelson Mandela Metropolitan University South Africa
A new Access Control model based on the Chinese Wall Security Policy Model Loock, M Jan Eloff University of Pretoria South Africa
A new framework for bridging the gap between IT Service Management and IT Governance from a security perspective Da Cruz, Eduardo L. Labuschagne University of Johannesburg South Africa
A security framework for an ERP system Marnewick, Carl L Labuschagne  University of Johannesburg South Africa
Access to copyrighted work: right or privelege? Jansen, M   University of South Africa South Africa
Analysis of the financial institutions' strategic e-business security solutions: Technical and non-Technical Baloyi, Norman Tinyiko   ISACA South Africa
An approach to enhance the security of ICT infrastructure through legal, regulatory influences Tarimo, Charles N Louise Yngström & Stewart Kowalski Royal Institute of Technology / Stockholm University Sweden
An assessment of Information Security Policies within the Polokwane area: A case study Mlangeni, SA E. Biermann Tshwane University of Technology South Africa
An overview of image steganography Morkel, T Jan Eloff, Martin Olivier University of Pretoria South Africa
Attacking Signed Binaries Slaviero, Marco Jaco Kroon, Martin Olivier University of Pretoria South Africa
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors Okamura, Shingo Maki Yoshida & Toru Fujiwara Graduate School of Information Science and Technology, Osaka University Japan
Cryptographic Key Management principles applied in South African Internet Banking Parkin, Emile   NamITech South Africa
Developing Threat Networks for Risk Analysis of Information Systems Longley, Dennis Mark Allan Branagan  Queensland University of Technology Australia
Fighting spam in a corporate environment using open-source solutions - a case study Blaauw, Pieter   Pick 'n Pay Info Systems South Africa
Foiling an Attack -- Defeating IPSec Tunnel Fingerprinting Izadinia, Vafa D Jan Eloff and Derrick Kourie University of Pretoria South Africa
Information Security Culture – Status Quo in Switzerland Schlienger, Thomas Stephanie Teufel & Raphael Rues University of Fribourg Switzerland
Information Security Management and Regulatory Compliance in the South African Health Sector Tuyikeze, T D. Pottas Nelson Mandela Metropolitan University South Africa
Introduction to Assessing and Securing Web Services Breytenbach, Christoff   SensePost Information Security     South Africa
Invasion of the RFIDs: are we heading towards “Modern Times”? Ghioni, Fabio   Telecom Italia Italy
IT Forensics: the collection of and presentation of digital evidence Hershensohn, Johann   Computer Security and Forensic Solutions South Africa
Measuring Information Security Awareness - A West Africa Gold Mining Environment Case Kruger, HA WD Kearney North-West University (Potchefstroom Campus) + AngloGold Ashanti South Africa & Australia
Measuring the effectivness of an internal control system List, William Dr David Brewer Gamma Secure Systems Limited United Kingdom
Metadata for trust in service-oriented architectures Coetzee, M J. H. P. Eloff University of Pretoria South Africa
Requirement Analysis of Enterprise DRM Systems Arnab, Alapan Andrew Hutchison University of Cape Town South Africa
Revisiting Reachability Management as a Multilateral Security Mechanism Ophoff, Jacques Reinhardt Botha Nelson Mandela Metropolitan University South Africa
Secure Authentication combined with Anonymity: The end of an oxymoron? Frangopoulos, Evangelos D Lucas M. Venter & Mariki M. Eloff University of South Africa  South Africa
Securing SOAP Messages with a Global Message Handler and a Standardized Envelope Pather, Maree L M Venter Nelson Mandela Metropolitan University South Africa
Security for Distributed Web-Services via Aspect-Oriented Programming Schmidt, Adreas U Nicolai Kuntze & Thomas Rauch Fraunhofer-Institute for Secure Information Technology Germany
Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system. Mwakalinga, Jeffy Louise Yngström  Royal Institute of Technology / Stockholm University Sweden
The building blocks of Information Security Culture Da Veiga, Adele   University of Pretoria South Africa
The Proliferation of Wireless Devices and its Role in Corporate Governance Mulder, R Rossouw von Solms Nelson Mandela Metropolitan University South Africa
Trust on the Web Cloran, Russell Barry Irwin Rhodes University South Africa
Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams Irwin, Barry   Rhodes University South Africa