Home
Preface
Introduction and Focus
Conference Committee
Review Committee
Review Process
Peer-reviewed Papers
Day 1 Day 2
Research-in-Progress Papers
Invited Speakers
Sponsors & Organisers
Contact
Table of Contents - Day 2 - Thursday 14 August 2014
Stream 5 – Forensics (Reviewed Papers)
Session Chair: Martin S Olivier
Stream 6 – Architectures and infrastructures & Trust (Reviewed Papers)
Session Chair: Reijo Savola
13:30-14:00
Mobile Forensics using the Harmonised Digital Forensic Investigation Process
Emilio Mumba and Hein Venter
A survey of trust issues constraining the growth of Identity Management-as-a-Service (IdMaaS)
Nkosinathi Mpofu and Wynand van Staden
14:00-14:30
The role of triggers in database forensics
Werner Hauger and Martin S Olivier
Testing antivirus engines to determine their effectiveness as a security layer
Jameel Haffejee
14:30-15:00
Privacy: A Review of Publication Trends
Charlie Hinde and Jacques Ophoff
On a Domain Block Based Mechanism to Mitigate DoS Attacks on Shared Caches in Asymmetric Multiprocessing Multi Operating Systems
Pierre Schnarz, Joachim Wietzke, Ingo Stengel and Clemens Fischer
Stream 7 – Mobile Security (Reviewed Papers)
Session Chair: Francois Mouton
Stream 8 – Forensics & Security in Education (Reviewed Papers)
Session Chair: Matt Warren
15:30-16:00
Exploring End-User Smartphone Security Awareness
Jacques Ophoff and Mark Robinson
Towards a Prototype for Guidance and Implementation of a Standardized Digital Forensic Investigation Process
Aleksandar Valjarevic, Hein Venter and Melissa Ingles
16:00-16:30
Security Objectives, Controls and Metrics Development for an Android Smartphone Application
Reijo Savola and Markku Kylänpää
A digital forensic model for providing better data provenance in the cloud
Philip Trenwith and Hein Venter
16:30-17:00
Is BYOD an institutional information security risk for small-scale business organisations?
Kudakwashe Madzima, Moses Moyo and Hanifa Abdullah
Online safety in South Africa – a growing concern
Elmarie Kritzinger
Facebook: The Risk-Taking Attitude amongst Emerging Adults
The Mexican Cartels application of Inform and Influence Activities (IIA) as tools of Asymmetrical Warfare
Suitability of Quantum Cryptography for National Facilities