Author:Naidoo, KovelinDate:Oct 2017This presentation gives a short history of cybercrimes, and also discusses the main global cybersecurity issues and trends.Read more
Author:Aschmann, M; Jansen van Vuuren, J; Leenen, LDate:Mar 2015Information in the Global Digital Industrial Economic Age is viewed as a strategic resource. This article focus on the establishment of cyber armies within the World Wide Web, commonly known as the Grid, with the emphases on an unseen military ...Read more
Author:Grobler, M; Flowerday, S; Von Solms, R; Venter, HDate:May 2011Cyber space, cyber awareness and cyber security play an important role in the online experience of individuals, and need to be addressed accordingly. The paper looks at some of the current cyber security awareness initiatives in South Africa, ...Read more
Author:Grobler, M; Jansen van Vuuren, J; Zaaiman, JDate:Mar 2012South Africa does not have a coordinated approach in dealing with cyber security, and the various structures that have been established to deal with cyber security issues are inadequate to deal with the issues holistically. It is further noted ...Read more
Author:Von Solms, R; Von Solms, SDate:Jul 2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Von Solms, R; Von Solms, SDate:2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Von Solms, R; Von Solms, SDate:Jul 2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Dlamini, Z; Modise, MDate:Mar 2012Technological advances have changed the manner in which ordinary citizens conduct their daily activities. Many of these activities are carried out over the Internet. These include filling tax returns, online banking, job searching and general ...Read more
Author:Phahlamohlaka, Letlibe J; Jansen van Vuuren, JC; Coetzee, AJDate:May 2011The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives, ...Read more
Author:Phahlamohlaka, Letlibe J; Jansen van Vuuren, JC; Coetzee, AJDate:May 2011The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed Cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives ...Read more
Author:Oosthuizen, Rudolph; Pretorius, L; Mouton, Francois; Molekoa, Malinkeng MDate:Feb 2019As cyber-attacks pose a major threat to organisations, security measures are required to protect networks and information. Defence against these attacks requires substantial resources and investments from organisations. The level of perceived ...Read more
Author:Veerasamy, NamoshaDate:Jun 2017Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and ...Read more
Author:Strauss, PDate:Oct 2017This presentation discusses cybercrimes in the banking sector, and how these crimes are profoundly different to traditional crime.Read more
Author:Mapimele, Fikile V; Mangoale, Bokang CDate:Feb 2019In recent years, cybercrime has become one of the most rapidly growing areas of crime. The emergence of new technologies has presented new cybercrime opportunities that are becoming more sophisticated. As a result, imdividuals, corporations ...Read more
Author:Sithole, Happy M; Staphorst, L; Vahed, AnwarDate:Oct 2015Cyberinfrastructure is a combination of massive processing capability, high-speed connectivity, massive storage facilities and highly skilled personnel. Leading nations have invested significantly in these facilities and closely aligned them ...Read more
Author:Botha, JacoDate:2017This presentation discusses Cybersecurity as an enabler and pre-requisite for industry 4.0. A figure of the progression of cyber and physical threats for each industrial revolution has evolved is discussed.Read more
Author:Gcaza, NoluxoloDate:Aug 2018Information and communication technologies (ICTs) are responsible for the transformation of societies, nations and the world at large. ICTs are considered to improve the quality of life for citizens as they bring about easiness and usefulness ...Read more
Author:Jansen van Rensburg, Gerhardus J; Kok, S; Wilke, DNDate:Oct 2016A constitutive model that captures the dominant strengthening and softening physics or microstructural changes of metallic materials is needed within a numerical environment for the effective prediction and simulation of plasticity during hot ...Read more
Author:Butgereit, L; Botha, RADate:May 2010The mobile phone is quickly becoming the personal computer of Africa. In Africa the cell phone is widely used, for example, in banking, crime prevention, tracking applications for identification documents, and education. C³TO is an architecture ...Read more
Author:Butgereit, L; Botha, RADate:Mar 2010To the mathematics teachers who are comfortable with expressions like Ө, φ, Σ and Δ t, the terms “mxit”, “chatter bot”, “xmpp”, and “jabber” may sound like Greek to them. Although recent research has shown that primary and secondary school ...Read more