Table of Contents - According to Paper Title

Title Author(s)
A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology Anass Bayaga and Stephen Flowerday
A Digital Evidence Management Plan Cornelia Grobler and Buks Louwrens
A Digital Forensic Readiness Framework for South African SME’s David Barske, Adrie Stander and jason Jordaan
A framework for evaluating IT security investments in a banking environment Eugene Smith and Hennie Kruger
A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System Oliver Spycher and Rolf Haenni
Adding digital forensic readiness to the email trace header Francois Ruan Van Staden and Hein Venter
Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information Ziyad Al-Salloum and Stephen Wolthusen
Broadband broadens scope for cyber crime in Africa Marthie Grobler and Joey Jansen van Vuuren
Common problems faced during the establishment of a CSIRT Marthie Grobler and Harri Bryk
Considering web services security policy compatibility Tristan Lavarack and Marijke Coetzee
Deep Packet Inspection – Fear of the Unknown Ryan Goss and Reinhardt Botha
An investigation and survey of response options for Intrusion Response Systems (IRSs) Nor Badrul Anuar, Maria Papadaki, Steve Furnell and Nathan Clarke
Towards a framework to guide compliance with IS Security policies and Regulations in a university Michael Kyobe
Mobile Security from an Information Warfare Perspective Brett van Niekerk and Manoj Maharaj
On Monitoring Information Flow of Outsourced Data Anne Kayem
Phishing within E-Commerce: A Trust and Confidence Game Greg Megaw and Stephen Flowerday
Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation Approach Karen Renaud and Dora Galvez-Cruz
Secure Publish-Subscribe Mediated Virtual Organizations Richard Ssekibuule
Social Engineering Attack Detection Model: SEADM Monique Bezuidenhout, Francois Mouton and Hein Venter
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation Mark M. Seeger, Stephen D. Wolthusen, Christoph Busch and Harald Baier
The Management of Cloud Computing Security Sumant Ramgovind, Mariki Eloff and Elme Smith
Towards an Ethical Analysis of the W3C Web Services Architecture Model Valiya Gangadharan and Laurette Pretorius
Towards an Information Security Framework for Service-Oriented Architecture  Jacqui Chetty and Marijke Coetzee
Towards Security Effectiveness Measurement utilizing Risk-Based Security Assurance Reijo Savola, Heimo Pentikäinen and Moussa Ouedraogo