Table of Contents - Day 2 - Thursday 13 August 2015

 

Stream 5 – Digital Forensics / Privacy
(
Reviewed Papers)

Stream 6 – Human Aspects of Information Security / Privacy
(
Reviewed Papers)

13:30-13:50

Playing Hide-and-Seek: Detecting the Manipulation of Android Timestamps

Heloise Pieterse, Martin S Olivier and Renier van Heerden

Biometrical Identification: Are we ethically ready?

Karen Renaud, Andrew Hoskins and Rossouw von Solms

13:50-14:10

The Use of Web Beacons To Uniquely Identify a Website

Luke Lubbe

The adversarial threat posed by the NSA to the integrity of the internet

 Jared Naude and Lynette Drevin

14:10-14:30

Adding Event Reconstruction to a Cloud Forensic Readiness Model

Hein Venter and Victor Kebande

A Framework of Opportunity-Reducing Techniques to Mitigate the Insider Threat:Towards Best Practice

Keshnee Padayachee

14:30-14:50

Risk-Driven Security Metrics Development for an e-Health IoT Application

Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie and Markus Sihvonen

Unsolicited Short Message Service Marketing: A Preliminary Investigation into Individual Acceptance, Perceptions of Content, and Privacy Concerns

Mac van der Merwe & Wynand v Staden

 

Stream 7 – Information Security Management
(
Reviewed Papers)

Stream 8 – Data and Application Security / Security of Architectures
(
Reviewed Papers)

15:20-15:40

A formal qualitative risk management approach for IT security

Bessy Mahopo, Hanifa Abdullah and Mathias Mujinga

Protection of personal information in the South African Cloud Computing environment: A framework for Cloud Computing adoption

Dayne Skolmen and Mariana Gerber

15:40-16:00

The Effects of the PoPI Act on Small and Medium Enterprises in South Africa

Johnny Botha, Mariki Eloff and Ignus Swart

An investigation into credit card information disclosure through Point of Sale purchases

Sune von Solms

16:00-16:20

Mapping ‘Security Safeguard’ Requirements in a Data Privacy legislation to an International Privacy Framework: A Compliance Methodology

Indren Govender

Data Aggregation Using Homomorphic Encryption in Wireless Sensor Networks

Tsotsope Ramotsoela and Gerhard Hancke

16:20-16:40

Analyzing the Security Posture of South African Websites

Jabu Mtsweni

Cloud Supply Chain Resilience: A Coordination Approach

Andrea Herrera and Lech Janczewski