Table of Contents - Day 2 - Thursday 14 August 2014

 

Stream 5 – Forensics
(
Reviewed Papers)

Session Chair: Martin S Olivier

Stream 6 – Architectures and infrastructures & Trust
(Reviewed Papers)

Session Chair: Reijo Savola

13:30-14:00

Mobile Forensics using the Harmonised Digital Forensic Investigation Process

Emilio Mumba and Hein Venter

A survey of trust issues constraining the growth of Identity Management-as-a-Service (IdMaaS)

Nkosinathi Mpofu and Wynand van Staden

14:00-14:30

The role of triggers in database forensics

Werner Hauger and Martin S Olivier

Testing antivirus engines to determine their effectiveness as a security layer

Jameel Haffejee

14:30-15:00

Privacy: A Review of Publication Trends

Charlie Hinde and Jacques Ophoff

On a Domain Block Based Mechanism to Mitigate DoS Attacks on Shared Caches in Asymmetric Multiprocessing Multi Operating Systems

Pierre Schnarz, Joachim Wietzke, Ingo Stengel and Clemens Fischer

 

Stream 7 – Mobile Security
(
Reviewed Papers)

Session Chair: Francois Mouton

Stream 8 – Forensics & Security in Education
(Reviewed Papers)

Session Chair: Matt Warren

15:30-16:00

Exploring End-User Smartphone Security Awareness

Jacques Ophoff and Mark Robinson

Towards a Prototype for Guidance and Implementation of a Standardized Digital Forensic Investigation Process

Aleksandar Valjarevic, Hein Venter and Melissa Ingles

16:00-16:30

Security Objectives, Controls and Metrics Development for an Android Smartphone Application

Reijo Savola and Markku Kylänpää

A digital forensic model for providing better data provenance in the cloud

Philip Trenwith and Hein Venter

16:30-17:00

Is BYOD an institutional information security risk for small-scale business organisations?

Kudakwashe Madzima, Moses Moyo and Hanifa Abdullah

Online safety in South Africa – a growing concern

Elmarie Kritzinger

 

IWSP: 6th Workshop on ICT uses in Warfare and the Safeguarding of Peace 2014
Organisers: Brett van Niekerk & Louise Leenen
10:00-10:30 Towards a platform to visualize the state of South Africa’s information security
Ignus Swart, Barry Irwin and Marthie Grobler
11:00-12:30

Facebook: The Risk-Taking Attitude amongst Emerging Adults

Sayed Ally, Craig Blewett and Brett van Niekerk
14:00-14:30 Software-Defined Radio (SDR) as a Mechanism for Exploring Cyber-Electronic Warfare (EW) Convergence
Warren du Plessis
14:30-15:00

The Mexican Cartels application of Inform and Influence Activities (IIA) as tools of Asymmetrical Warfare

Juan Castillo
15:30-16:00 Integrity of a Common Operating Picture in Military Situational Awareness
Jaco Robertson
16:00-16:30

Suitability of Quantum Cryptography for National Facilities

Abdul Mirza, Brett van Niekerk, Makhamisa Senekane and Francesco Petruccione
16:30-17:00 An analysis of Facebook's graph search
Zubeida Casmod Khan and Thulani Mashiane