Login / Signup
SAISMC
2010
2010
2010
Keyphrases
Publications
2010
Shamal Faily
,
Ivan Flechais
A Model of Security Culture for e-Science.
SAISMC
(2010)
Qiming Li
,
Alvin Ong
,
Ponnuthurai N. Suganthan
,
Vrizlynn L. L. Thing
A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification.
SAISMC
(2010)
Yngve Monfelt
,
Sofie Pilemalm
,
Jonas Hallberg
,
Louise Yngström
The 14 layered framework for including social and organisational aspects in security management.
SAISMC
(2010)
Helen Armstrong
,
Colin J. Armstrong
,
Ian McCulloh
A Course Applying Network Analysis to Organizational Risk in Information Security.
SAISMC
(2010)
Ahmed Patel
,
Qais Qassim
,
Zarina Shukor
,
Jose Nogueira
,
Joaquim Celestino Júnior
,
Christopher Wills
Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System.
SAISMC
(2010)
Kenny Olof Robert Jansson
,
Rossouw von Solms
Social Engineering: Towards A Holistic Solution.
SAISMC
(2010)
Benjamin George Sanders
,
Paul Dowland
,
Steven Furnell
Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy.
SAISMC
(2010)
Malcolm Robert Pattinson
,
Cate Jerram
Examining End-user Perceptions of Information Risks: An Application for the Repertory Grid Technique.
SAISMC
(2010)
Lynn Futcher
,
Cheryl Schroder
,
Rossouw von Solms
An Integrative Approach to Information Security Education: A South African Perspective.
SAISMC
(2010)
Schalk Willem Peach
,
Johannes Vorster
,
Renier van Heerden
Heuristic Attack on Graphic Password Generation.
SAISMC
(2010)
Stephen Flowerday
,
Sean Allam
A model to measure the maturity of smartphone security at software consultancies.
SAISMC
(2010)
Hennie A. Kruger
,
Lynette Drevin
,
Tjaart Steyn
The Use of an Information Security Vocabulary Test to Assess Information Security Awareness - An Exploratory Study.
SAISMC
(2010)
Marthie Grobler
Digital forensic standards: international progress.
SAISMC
(2010)
Tite Tuyikeze
,
Dalenca Pottas
An Information Security Policy Development Life Cycle .
SAISMC
(2010)
Hwei-Ming Ying
,
Vrizlynn L. L. Thing
Optimal Path Construction for Fragmented File Carving.
SAISMC
(2010)
Stefan Fenz
From the Resource to the Business Process Risk Level.
SAISMC
(2010)
David Seikokotlelo Bedi
,
Stuart Warden
Information security in hospitality SMMEs in Cape Metropole area: The management and culture perspective.
SAISMC
(2010)
Tatsuo Asai
,
Aline Uwera Hakizabera
Empirical Analysis of Human-Related Problems on Information Security in Cross-Cultural Environment -The Case of the East African Community-.
SAISMC
(2010)
Hassan El Desouki
,
Helen Armstrong
Security and Quality Issues in IT Projects.
SAISMC
(2010)
Sinovuyo Tyali
,
Dalenca Pottas
Information Security Management Systems in the Healthcare Context.
SAISMC
(2010)
Nkqubela Ruxwana
,
Marlien Herselman
,
Dalenca Pottas
Community Awareness and Involvement: An Overlooked Security Control.
SAISMC
(2010)
Edwin Donald Frauenstein
,
Rossouw von Solms
The Wild Wide West of Social Networking.
SAISMC
(2010)
South African Information Security Multi-Conference, SAISMC 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings
SAISMC
(2010)
Aggeliki Tsohou
,
Spyros Kokolakis
,
Costas Lambrinoudakis
,
Stefanos Gritzalis
Unifying ISO Security Standards Practices into a Single Security Framework.
SAISMC
(2010)
Helen Armstrong
,
Ian McCulloh
Organizational Risk using Network Analysis.
SAISMC
(2010)