Abstract is missing.
- A Framework for Evaluating ICT Security AwarenessHennie A. Kruger, Lynette Drevin, Tjaart Steyn. 1-11 [doi]
- Monthly Patch Release Schedules: Do the Benefits Outweigh the Risks?Dominic White, Barry Irwin. 1-18 [doi]
- Integrating Secure RTP into the Open Source VoIP PBX AsteriskBradley Clayton, Barry Irwin, Alfredo Terzoli. 1-12 [doi]
- Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plotJean-Pierre van Riel, Barry Irwin. 1-12 [doi]
- Case Study of the Usage of an Authentication and Authorization Infrastructure (AAI) in an E-Learning ProjectTorsten Braun, Christoph Graf, Ulrich Ultes-Nitsche, Aurelius Baier, Thomas Bernoulli. 1-10 [doi]
- Conceptualising the Influence of Tacit Knowledge in Security Risk Management ActivitiesKennedy Nduati Njenga, Irwin Brown. 1-12 [doi]
- A Profile of The Distance Computing Student SoftlifterThomas McDonald van der Merwe. 1-20 [doi]
- Justifiability of State Surveillance of the Internet as E-Security MechanismMurdoch Watney. 1-11 [doi]
- Information Security Policies - The Legal Risk of Uninformed PersonnelVerine Etsebeth. 1-10 [doi]
- Denial-of-Service & Distributed Denial-of-Service on The InternetKate Ormiston, Mariki M. Eloff. 1-14 [doi]
- Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic InvestigationNeil Croft, Martin S. Olivier. 1-14 [doi]
- A Model for Secure Value-Added Service Subscriptions in Cellular NetworksJacobus A. Ophoff, Stephen Perelson, Reinhardt Botha. 1-9 [doi]
- Using IT Benchmarking Principles to Design an Information Security Benchmark ModelLeonie McManus, Jan H. P. Eloff. 1-11 [doi]
- The Organisational Information Security Profile - A Tool to Assist The BoardMkhululi Tyukala, Dalenca Pottas, Rossouw von Solms, Helen van de Haar. 1-13 [doi]
- The Need for Centralised, Cross Platform Information AggregationFred Otten, Barry Irwin, Hannah Slay. 1-12 [doi]
- Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing WorldJabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström. 1-11 [doi]
- Calculating Compliance StandardsDirk Willie du Preez, Vreda Pieterse. 1-11 [doi]
- A Brokered Approach to Interoperable Security in OGSA-Based Grid SystemsDemetrios Loutsios, Maree Pather. 1-11 [doi]
- A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security – The Case of TanzaniaCharles N. Tarimo, Jabiri Kuwe Bakari, Louise Yngström, Stewart Kowalski. 1-12 [doi]
- Ticket Based Identity System for DRMAlapan Arnab, Andrew Hutchison. 1-10 [doi]
- Understanding Information Security Culture: A Conceptual FrameworkJohan Van Niekerk, Rossouw von Solms. 1-10 [doi]
- The Peculium Model: Information Security Risk Management for the South African SMMELiesl van Niekerk, Les Labuschagne. 1-14 [doi]
- Towards Security Evaluation based on Evidence CollectionReijo Savola. 1-10 [doi]
- Performance Analysis of a Secure Seamless Handover Mechanism in All-IP NetworksAlf Zugenmaier, Anand R. Prasad, Julien Laganier. 1-11 [doi]
- On bidder zones, cell phones and ballot stuffingWesley Brandi, Martin S. Olivier. 1-11 [doi]
- Authorised Translations of Electronic DocumentsAndreas U. Schmidt, Jan Piechalski. 1-14 [doi]
- Towards Regulatory Compliance - A model for the South African Financial SectorRabbie Maphakela, Dalenca Pottas. 1-11 [doi]
- Trusted Computing in Mobile ActionNicolai Kuntze, Andreas U. Schmidt. 1-12 [doi]
- Framework for a Digital Forensic InvestigationMichael Kohn, Martin S. Olivier, Jan H. P. Eloff. 1-7 [doi]
- A Low Bit Architecture for a Very Compact Hardware Implementation of the AES AlgorithmAbdullah Haroon Rasheed, Muhammad Essam, Umair Khalid, Shoab A. Khan, Sheikh M. Farhan. 1-8 [doi]
- Security Risk Analysis for Complex SystemsMark Branagan, Robert Dawson, Dennis Longley. 1-12 [doi]
- Using an Enterprise Architecture for IT Risk ManagementFrank Innerhofer-Oberperfler, Ruth Breu. 1-12 [doi]
- Framework for Securing Mobile Software AgentsJeffy Mwakalinga, Louise Yngström. 1-12 [doi]