Author:Mthethwa, Sthembile; Pretorius, MorneDate:Dec 2022The ongoing push for the 4th industrial revolution is setting the stage to digitise, persist and verify identity along with credentials. Academic and skills credentials are currently verified manually and have much scope for automation using ...Read more
Author:Dawood, Zubeida C; Mkuzangwe, Nenekazi NPDate:Mar 2022There is a growth of cyber-attacks in South Africa. Seeing that there are over 38 million Internet users in South Africa, this is no surprise. The South African government has published the National Cybersecurity Policy Framework (NCPF) and ...Read more
Author:Baruni, Kedimotse P; Mokoena, Nthabiseng ME; Veeraragoo, Mahalingam; Holder, Ross PDate:Dec 2021Face recognition is one of the biometric technologies that is mostly used in surveillance and law enforcement for identification and verification. However, face recognition remains a challenge in verifying and identifying individuals due to ...Read more
Author:Botha, Johannes G; Botha-Badenhorst, Danielle P; Leenen, LDate:Mar 2023Blockchain and cryptocurrency adoption has increased significantly since the start of the Covid-19 pandemic. This adoption rate has overtaken the Internet adoption rate in the 90s and early 2000s, but as a result, the instances of crypto scams ...Read more
Author:Botha, Johannes G; Pederson, T; Leenen, LDate:Jun 2023Since the start of the Covid-19 pandemic, blockchain and cryptocurrency adoption has increased significantly. The adoption rate of blockchain-based technologies has surpassed the Internet adoption rate in the 90s and early 2000s. As this ...Read more
Author:Veerasamy, Namosha; Yoolla, Yaseen; Dawood, Zubeida CDate:Jun 2022Geospatial data is often perceived as only being related to maps, compasses and locations. However, the application areas of geospatial data are far wider and even extend to the field of cybersecurity. Not only is there an ability to show ...Read more
Author:Mtsweni, Jabu S; Thaba, James MDate:2022Cyberspace has been designated by organizations such as NATO as the fifth domain for battlespace, and many nations are already having and/or building their capabilities in the cyber defence environment in order to protect and defend their ...Read more
Author:Mwim, EN; Mtsweni, Jabu S; Chimbo, BDate:Mar 2023Human related vulnerability challenges continue to increase as organisations intensify their use of interconnected technologies for operations particularly due to the emergence of COVID-19 pandemic. Notwithstanding the challenge of a human ...Read more
Author:Botha, Johannes G; Leenen, LouiseDate:Mar 2024Bitcoin and cryptocurrency adoption has increased significantly over the past few years. The significant growth in the industry has been matched by growth of crimes in this domain; not only in scams and dark-web illegal trading, but also in ...Read more
Author:Mutemwa, Muyowa; Mtsweni, Jabu SDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Thaba, James M; Mtsweni, Jabu SDate:Nov 2023The domains of warfare have become complex, where cyberspace is declared as the fifth domain. The complexity of cyber space is that it is borderless, and war could be launched from anywhere, and is a serious concern for national security. ...Read more
Author:Veerasamy, NamoshaDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Botha-Badenhorst, Danielle P; Veerasamy, NamoshaDate:Apr 2023Globally, women are underrepresented in the fields of Science, Technology, Engineering and Mathematics (STEM). In Sub-Saharan Africa (SSA), this underrepresentation is even more prevalent, as fewer women pursue STEM careers in SSA when compared ...Read more
Author:Mwim, EM; Mtsweni, Jabu S; Chimbo, BDate:Jul 2023The healthcare sector has become a high target of cyber threats due to the nature of the industry and the potential of personal and confidential information. Human related factors have proven to be the major contributor to the challenges ...Read more
Author:Botha, Johannes G; Grobler, Marthie M; Hahn, J; Eloff, MMDate:Mar 2017Data protection and management of personal information has become an integral aspect for organisations and individuals in conducting business in the modern era. It has also become a major issue for legislators, regulators and consumers worldwide ...Read more
Author:Shibambu, Ncedisa AM; Moganedi, SDate:Dec 2022The notion of working from home is not a new concept. However, it has become a buzzword amid the COVID19 pandemic. Some scholars were already engaging in the work-from-home concept a few years before the pandemic. However, contextualization ...Read more
Author:Mtsweni, Jabu S; Ndlovu, Lungisani; Mthethwa, Sthembile N; Mkuzangwe, Nenekazi NPDate:Nov 2023Misinformation, disinformation, malinformation, and/or fake news have gained attention for good and bad in South Africa, especially since the COVID-19 pandemic. The research-based and non-research-based interventions to tackle misinformation ...Read more
Author:Mtshweni, Jabu; Modiba, FSDate:Sep 2021Information and communication technologies (ICTs) have transformed almost every aspect of our lives as citizens, employees, parents, politicians, businesses, leaders, and as members of any type of a community. ICTs have demonstrated across ...Read more
Author:Mtshweni, Jabu; Modiba, FSDate:Sep 2021Information and communication technologies (ICTs) have transformed almost every aspect of our lives as citizens, employees, parents, politicians, businesses, leaders, and as members of any type of a community. ICTs have demonstrated across ...Read more