Home
Preface
Introduction and Focus
Conference Committee
Review Committee
Review Process
Peer-reviewed Papers
Day 1 Day 2
Research-in-Progress Papers
Invited Speakers
Sponsors & Organisers
Contact
Table of Contents - Day 1 - Wednesday 13 August 2014
Stream 1 – Forensics & Information Security Cultures (Reviewed Papers)
Session Chair: Bobby Tait
Stream 2 – Network Security (Reviewed Papers)
Session Chair: Reinhardt Botha
13:30-14:00
Information Security Culture: A General Living Systems Theory Perspective
Rayne Reid, Johan Van Niekerk and Karen Renaud
Towards a Sandbox for the Deobfuscation and Dissection of PHP-based Malware
Peter Wrench
14:00-14:30
From Information Security Cultures to Cyber security Cultures: Organizations to Societies
Rayne Reid and Johan Van Niekerk
An Exploration of Geolocation and Traffic Visualisation Using Network Flows
Sean Pennefather and Barry Irwin
14:30-15:00
An Investigation into Reducing Third Party Privacy Breaches During the Investigation of Cybercrime
Wynand van Staden
Security Foundation for a Distributed Cabin Core Architecture
Nicolai Kuntze, Carsten Rudolph and Oliver Hanka
Stream 3 – Security in Education & IT Governance (Reviewed Papers)
Session Chair: Wynand van Staden
Stream 4 – Social Engineering (Reviewed Papers)
Session Chair: Louise Leenen
15:30-16:00
Information Security Assurance Model (ISAM) for a Higher Education Examination Paper Preparation Process
Miemie Mogale, Mariana Gerber, Mariana Carroll and Rossouw von Solms
Considering the influence of human trust in practical social engineering exercises
Wayne Kearney and Hennie Kruger
16:00-16:30
The Murky Waters of IT Governance
Jacques Coertze and Rossouw von Solms
Social Engineering Attack Framework
Francois Mouton, Mercia Malan, Louise Leenen and Hein Venter
16:30-17:00
Concerns Regarding Service Authorization by IP Address using Eduroam
Luzuko Tekeni, Kerry-Lynn Thomson and Reinhardt Botha
Combatting Phishing: A Holistic Human Approach
Edwin Donald Frauenstein and Rossouw von Solms