Home
Preface
Introduction and Focus
Conference Committee
Review Committee
Review Process
Peer-reviewed Papers
Day 1 Day 2
Research-in-Progress Papers
Invited Speakers
Sponsors & Organisers
Contact
Table of Contents - Day 2 - Thursday 13 August 2015
Stream 5 – Digital Forensics / Privacy (Reviewed Papers)
Stream 6 – Human Aspects of Information Security / Privacy (Reviewed Papers)
13:30-13:50
Playing Hide-and-Seek: Detecting the Manipulation of Android Timestamps
Heloise Pieterse, Martin S Olivier and Renier van Heerden
Biometrical Identification: Are we ethically ready?
Karen Renaud, Andrew Hoskins and Rossouw von Solms
13:50-14:10
The Use of Web Beacons To Uniquely Identify a Website
Luke Lubbe
The adversarial threat posed by the NSA to the integrity of the internet
Jared Naude and Lynette Drevin
14:10-14:30
Adding Event Reconstruction to a Cloud Forensic Readiness Model
Hein Venter and Victor Kebande
A Framework of Opportunity-Reducing Techniques to Mitigate the Insider Threat:Towards Best Practice
Keshnee Padayachee
14:30-14:50
Risk-Driven Security Metrics Development for an e-Health IoT Application
Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie and Markus Sihvonen
Unsolicited Short Message Service Marketing: A Preliminary Investigation into Individual Acceptance, Perceptions of Content, and Privacy Concerns
Mac van der Merwe & Wynand v Staden
Stream 7 – Information Security Management (Reviewed Papers)
Stream 8 – Data and Application Security / Security of Architectures (Reviewed Papers)
15:20-15:40
A formal qualitative risk management approach for IT security
Bessy Mahopo, Hanifa Abdullah and Mathias Mujinga
Protection of personal information in the South African Cloud Computing environment: A framework for Cloud Computing adoption
Dayne Skolmen and Mariana Gerber
15:40-16:00
The Effects of the PoPI Act on Small and Medium Enterprises in South Africa
Johnny Botha, Mariki Eloff and Ignus Swart
An investigation into credit card information disclosure through Point of Sale purchases
Sune von Solms
16:00-16:20
Mapping ‘Security Safeguard’ Requirements in a Data Privacy legislation to an International Privacy Framework: A Compliance Methodology
Indren Govender
Data Aggregation Using Homomorphic Encryption in Wireless Sensor Networks
Tsotsope Ramotsoela and Gerhard Hancke
16:20-16:40
Analyzing the Security Posture of South African Websites
Jabu Mtsweni
Cloud Supply Chain Resilience: A Coordination Approach
Andrea Herrera and Lech Janczewski