|
Stream 1 –
(Reviewed
Papers) |
Stream 2 –
(Reviewed
Papers) |
|
Software security
Session chair:
Michael Kohn |
IS Awareness
Session
chair: Lynette Drevin |
13:00-13:30 |
Informed Software
Installation Through License Agreement Categorization
Anton Borg, Martin Boldt and Niklas Lavesson |
An Assessment of the Role of
Cultural Factors in Information Security Awareness
Hennie Kruger, Stephen Flowerday, Lynette Drevin and Tjaart Steyn |
13:30-14:00 |
cPLC - A Cryptographic
Programming Language and Compiler
Endre Bangerter, Stephan Krenn, Martial Seifriz and Ulrich
Ultes-Nitsche |
An Adaptation of the
Awareness Boundary Model towards Smartphone Security
Sean Allam and Stephen Flowerday |
14:00-14:30 |
Detecting Scareware by
Mining Variable Length Instruction Sequences
Khurram Shahzad Raja and Lavesson Niklas |
Design of Cyber Security
Awareness Game Utilizing a Social Media Framework
Aubrey Labuschagne, Namosha Veerasamy, Ivan Burke and Mariki Eloff |
|
Stream
4
–
(Reviewed
Papers) |
Stream
5
–
(Reviewed
Papers) |
|
Cloud and service providers
Session chair: Professor Reinhardt Botha |
Governance
Session chair: Prof Rossouw von Solms |
15:00–15:30 |
An Architecture for Secure
Searchable Cloud Storage
Robert Koletka and Andrew Hutchison |
Information Security
Governance Control Through Comprehensive Policy Architectures
Rossouw Von Solms, Kerry-Lynn Thomson and Prosecutor Mvikeli
Maninjwa |
15:30-16:00 |
Secure Cloud Computing:
Benefits, Risks and Controls
Mariana Carroll, Paula Kotzé and Alta van der Merwe |
Secure e-Government
Services: Towards A Framework for Integrating IT Security Services
into e-Government Maturity Models
Geoffrey Karokola, Stewart Kowalski, and Louise Yngström |
16:00-16:30 |
Traffic Management in Next
Generation Service Provider Networks – Are we there yet?
Ryan Gavin Goss and Reinhardt A. Botha |
A Web-Based Information
Security Governance Toolbox for Small-to-medium Enterprises in
Southern Africa
Jacques Coertze, Johan Van Niekerk and Rossouw Von Solms |