Home
Preface
Introduction and Focus
Conference Committee
Review Committee
Review Process
Peer-reviewed Papers
Paper title
Author name Day 1 Day 2 Day 3
Research-in-Progress Papers
Invited Speakers
Sponsors & Organisers
Contact
Table of Contents - Day 1 - Monday 2 August 2010
Stream 1 (Reviewed Papers)
Stream 2 (Reviewed Papers)
Stream 3
(Research in Progress)
Digital Evidence Management Plan
Cornelia Grobler and Buks Louwrens
Considering web services security policy compatibility
Tristan Lavarack and Marijke Coetzee
Multi-channel, Multi-level Authentication for More Secure eBanking
Mohamed Al Fairuz and Karen Renaud
A Test Bed for Information Security Skill Development with Virtual Training Environment
Alok Tripathi, Abhinav Mishra and G.V. Raghunathan
Adding digital forensic readiness to the email trace header
Francois Ruan Van Staden and Hein Venter
Towards an Ethical Analysis of the W3C Web Services Architecture Model
Valiya Gangadharan and Laurette Pretorius
Towards a Standardised Digital Forensic Process: E-mail Forensics
Himal Lalla and Stephen Flowerday
A Generalized model for understanding and education of Information and Computer Security
Hendrik Visage and Martin Olivier
A Digital Forensic Readiness Framework for South African SMEs
David Barske, Adrie Stander and Jason Jordaan
The Management of Security in Cloud Computing
Sumant Ramgovind, Mariki Eloff and Elme Smith
Stream 4 (Reviewed Papers)
Stream 5 (Reviewed Papers)
Stream 6 (Research in Progress)
Social Engineering Attack Detection Model: SEADM
Monique Bezuidenhout, Francois Mouton and Hein Venter
Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation Approach
Karen Renaud and Dora Galvez-Cruz
Using Biometrics to Reduce Fraud in the Micro Lending Industry in South Africa
Alain Craven and Mariki Eloff
Inclusive Information Society - Challenges from a South African Rural Primary Healthcare Perspective
Moses Dlamini, Elmarie Venter, Jan Eloff and Danie Smit
Phishing within E-Commerce: A Trust and Confidence Game
Greg Megaw and Stephen Flowerday
Secure Publish-Subscribe Mediated Virtual Organizations
Richard Ssekibuule
Phishing for Fortune
Marthie Grobler
Motivation for Cyberterrorrism
Namosha Veerasamy
Towards a framework to guide compliance with IS Security policies and Regulations in a University
Michael Kyobe
On Monitoring Information Flow of Outsourced Data
Anne Kayem