Table of Contents - Day 1 - Monday 2 August 2010

Stream 1 –
(
Reviewed Papers)

Stream 2 –
(Reviewed Papers)

Stream 3 –

(Research in Progress)

Digital Evidence Management Plan

Cornelia Grobler and Buks Louwrens

Considering web services security policy compatibility

Tristan Lavarack and Marijke Coetzee

Multi-channel, Multi-level Authentication for More Secure eBanking

Mohamed Al Fairuz and Karen Renaud

A Test Bed for Information Security Skill Development with Virtual Training Environment

Alok Tripathi, Abhinav Mishra and G.V. Raghunathan

Adding digital forensic readiness to the email trace header

Francois Ruan Van Staden and Hein Venter

Towards an Ethical Analysis of the W3C Web Services Architecture Model

Valiya Gangadharan and Laurette Pretorius

Towards a Standardised Digital Forensic Process: E-mail Forensics

Himal Lalla and Stephen Flowerday

A Generalized model for understanding and education of Information and Computer Security

Hendrik Visage and Martin Olivier

A Digital Forensic Readiness Framework for South African SME’s

David Barske, Adrie Stander and Jason Jordaan

The Management of Security in Cloud Computing

Sumant Ramgovind, Mariki Eloff and Elme Smith

 

 

Stream 4 –
(
Reviewed Papers)

Stream 5 –
(Reviewed Papers)

Stream 6 –
(Research in Progress)

Social Engineering Attack Detection Model: SEADM

Monique Bezuidenhout, Francois Mouton and Hein Venter

Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation Approach

Karen Renaud and Dora Galvez-Cruz

Using Biometrics to Reduce Fraud in the Micro Lending Industry in South Africa

Alain Craven and Mariki Eloff

Inclusive Information Society - Challenges from a South African Rural Primary Healthcare Perspective

Moses Dlamini, Elmarie Venter, Jan Eloff and Danie Smit

Phishing within E-Commerce: A Trust and Confidence Game

Greg Megaw and Stephen Flowerday

Secure Publish-Subscribe Mediated Virtual Organizations

Richard Ssekibuule

Phishing for Fortune

Marthie Grobler

 

Motivation for Cyberterrorrism

Namosha Veerasamy

Towards a framework to guide compliance with IS Security policies and Regulations in a University

Michael Kyobe

On Monitoring Information Flow of Outsourced Data

Anne Kayem