Table of Contents - According to Author Surname

Author Title
Al-Salloum Ziyad Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information
Anuar Nor Badrul Incident Responses for Intrusion Response Systems (IRSs)
Bair Harald The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation
Barske David A Digital Forensic Readiness Framework for South African SME’s
Bayaga Anass A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology
Bezuidenhout Monique Social Engineering Attack Detection Model: SEADM
Botha Reinhardt Deep Packet Inspection – Fear of the Unknown
Busch Christopher The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation
Chetty Jacqui Towards an Information Security Framework for Service-Oriented Architecture 
Clarke Nathan Incident Responses for Intrusion Response Systems (IRSs)
Coetzee Marijke Towards an Information Security Framework for Service-Oriented Architecture 
Coetzee Marijke Considering web services security policy compatibility
Eloff Mariki The Management of Cloud Computing Security
Flowerday Stephen Phishing within E-Commerce: A Trust and Confidence Game
Flowerday Stephen A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology
Furnell Steve Incident Responses for Intrusion Response Systems (IRSs)
Galvez-Cruz Dora Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation Approach
Gangadharan Valiya Towards an Ethical Analysis of the W3C Web Services Architecture Model
Goss Ryan Deep Packet Inspection – Fear of the Unknown
Grobler Cornelia A Digital Evidence Management Plan
Grobler Marthie Broadband broadens scope for cyber crime in Africa
Haenni Rolf A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System
Jordaan Jason A Digital Forensic Readiness Framework for South African SME’s
Kayem Anne On Monitoring Information Flow of Outsourced Data
Kruger Hennie A framework for evaluating IT security investments in a banking environment
Kyobe Michael Measuring Compliance with IS security policies and legislations in a University: Key considerations
Lavarack Tristan Considering web services security policy compatibility
Louwrens Buks A Digital Evidence Management Plan
Manoj Maharaj Mobile Security from an Information Warfare Perspective
Megaw Greg  Phishing within E-Commerce: A Trust and Confidence Game
Mouton Francois  Social Engineering Attack Detection Model: SEADM
Ouedraogo Moussa Towards Security Effectiveness Measurement utilizing Risk-Based Security Assurance
Papadaki Maria Incident Responses for Intrusion Response Systems (IRSs)
Pentikäinen Heimo Towards Security Effectiveness Measurement utilizing Risk-Based Security Assurance
Pretorius Laurette Towards an Ethical Analysis of the W3C Web Services Architecture Model
Ramgovind Sumant The Management of Cloud Computing Security
Renaud Karen Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation Approach
Savola Reijo Towards Security Effectiveness Measurement utilizing Risk-Based Security Assurance
Seeger Mark The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation
Smith Elme The Management of Cloud Computing Security
Smith, Eugene A framework for evaluating IT security investments in a banking environment
Spycher Oliver A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System
Ssekibuule Richard Secure Publish-Subscribe Mediated Virtual Organizations
Stander Adrie A Digital Forensic Readiness Framework for South African SME’s
Van Niekerk Brett Mobile Security from an Information Warfare Perspective
Van Staden Francois Ruan Adding digital forensic readiness to the email trace header
Van Vuuren Joey Jansen Broadband broadens scope for cyber crime in Africa
Venter Hein Adding digital forensic readiness to the email trace header
Venter Hein Social Engineering Attack Detection Model: SEADM
Wolthusen Stephen Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information
Wolthusen Stephen The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation